The latest version of Astaro Security Gateway V7 no longer relies on Spamassassin. Commtouch technology is now used to filter unsolicited mail.more »
Motion Detection Detecting movements with MotionAug 24, 2007
The motion detector software, Motion, monitors the video signal from one or multiple cameras and is able to detect whether a significant part of the picture has changed, record and track movement, or launch arbitrary external commands to trigger other actions.more »
Collax has released an update to version 4.2 of its Security Gateway solution. The Unified Threat Management solution (UTM) is now based on kernel 2.6.more »
US security vendor Trusted Computer Solutions (TCS) recently presented a solution for automating server hardening.more »
Novell is extending its portfolio of enterprise management solutions with its acquisition of Senforce Technologies, an endpoint security management specialist.more »
Samba Antivirus Integrating a realtime antivirus scanner with SambaNov 30, 2006
Realtime virus scanning at the file server is an elegant and efficient option for protecting Windows clients. We’ll show you some tools and techniques for realtime scanning with Samba.more »
Squid Bridge HTTP proxy with caching and content filtering on a bridgeOct 31, 2006
Caching proxies remember web pages and serve them up locally, saving both money and time. The most intelligent members of this family also remove dangerous content and provide transparent bridging.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.