Home
 > search for

Featured Documents related to »  linux security features


Sendmail Takes Security to the Next Level with Version 3.0 for NT
Sendmail 3.0 includes the Sendmail Message Transfer Agent, a Mailing List Server, a POP3 Server and a Message Store.

linux security features  Takes Security to the Next Level with Version 3.0 for NT Event Summary On September 20 1999, Sendmail released Sendmail 3.0 for the NT Server platform. The product targets small to mid-size organizations and Internet Service Providers and offers interoperability with Open Source Sendmail coupled with familiar NT Administrative Tools and Interfaces. Sendmail 3.0 includes the Sendmail Message Transfer Agent, a Mailing List Server, a POP3 Server and a Message Store. Market Impact The Sendmail MTA and Read More
Information Security Selection
Start evaluating software now
Country:

 
   

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » linux security features


NetWare for Small Business - NetWhy?
Remember Novell? They’re a small Utah company that makes network software called NetWare, now aimed at small businesses. Sounds familiar?

linux security features  Small Business Pack for Linux for 100 users, $499, which includes DB2 and Domino. Or we can buy Microsoft's Small Business Server 4.5 for 100 or so users - including Exchange 5.5 and SQL 7.0 -- for $5,840. Or we can buy this Novell bundle, which includes Oracle 8i and GroupWise (still going!), for $7,945. Why, that's the funniest thing we've heard since rumors that Oracle hired private eyes to discover that Microsoft wanted to influence user opinion in their antitrust case. We may be broke, but at Read More
I Want My Private Cloud
Although many organizations are considering reaping the benefits of a cloud computing platform, they have concerns with the handling of sensitive information on

linux security features  to be run on Linux systems . Based on an open source strategy, Eucalyptus can be deployed on most of the currently available Linux distributions, such as Red Hat , Ubuntu , SUSE , and Debian . Some features of Eucalyptus include support and compatibility with Amazon products, a web-based cloud configuration, and tools for easy deployment. Eucalyptus has gained momentum due to the need for private cloud strategy options. VMware VMWare vSphere enables VMware to deliver private cloud solutions using a Read More
Caldera eDesktop Edges Out Microsoft Windows 2000 in Functionality - Part II
TechnologyEvaluation.com has completed its analysis of the innate functionality of three desktop operating systems – Microsoft Windows 2000, Red Hat Linux 6.2

linux security features  significant inroads in the Linux market. OpenLinux eDesktop 2.4 is high-performance desktop software optimized for the Internet. It also includes powerful Internet-ready applications designed specifically for helping you enjoy and maximize the power of the Internet. Windows 2000 Professional Microsoft Windows 2000 Professional is Microsoft's premium desktop operating system. Released in February 2000, Windows 2000 is the successor to Windows NT. Windows 2000 promises cross-compatibility with existing Read More
Buyer’s Guide: Managed Hosting Services
Hosting a Web site in-house can be expensive, as it requires the necessary hardware and software and power and security precautions@not to mention the cost of

linux security features  for both Red Hat Linux and Windows. Again, it is very important to understand your specific needs and to work with vendors to determine which package of services they offer and at what cost. Making an apples-to-apples comparison isn t easy, but the investment of time to match your company s needs and management desires with providers packages and prices can save you dollars in the short term and major headaches as your computing needs change. Most dedicated servers are packaged with a control panel, a Read More
Red Hat’s Linux Domination Weakens
Red Hat still controls the Linux market, but now it’s getting some competition from SuSE, Caldera, and TurboLinux.

linux security features  Hat’s Linux Domination Weakens Red Hat's Linux Domination Weakens R. Krause - September 13, 2000 Event Summary According to recently figures from IDC, Red Hat was still the #1 distributor of the Linux operating system in 1999 by a wide margin, with a 48% share of the copies shipped. Trailing Red Hat were German vendor SuSE with a 15% share, and Caldera Systems and TurboLinux with 10% each. (See Figure 1) Bringing up the rear were MandrakeSoft (4%) and Corel (1%). Figure 1. A potential area of concern Read More
TCO & Security of Enterprise Grade Mobility
While mobility has been a key factor behind the consumerization of IT in the enterprise, it has created a new set of security challenges in the workplace. Read

linux security features  & Security of Enterprise Grade Mobility While mobility has been a key factor behind the consumerization of IT in the enterprise, it has created a new set of security challenges in the workplace. Read this research with IT decision makers from the various departments across the UK public sector to understand the challenges they are encountering in the face of compliance, control, cost, and consumerization, and to gain best-practice lessons in mobile enterprise management. Read More
Five Standard Features Any VoIP System Should Have
Here's a guide to quickly fill you in on the Five Standard Features Any VoIP System Should Have.

linux security features  Standard Features Any VoIP System Should Have Five Standard Features Any VoIP System Should Have Businesses are turning to VoIP phone systems for the cost and productivity benefits they offer. But to make the right choice for your company, you need to know which VoIP features are most important. Here's a guide to quickly fill you in on the Five Standard Features Any VoIP System Should Have . You'll learn about VoIP standardization and flexibility integration options security support extension points Read More
Standard & Poor's Exposes Customers' Security
Due to security vulnerabilities in Standard & Poor's Comstock product, their customer sites throughout the world have been exposed to extensive security holes.

linux security features  via their MultiCSP turnkey Linux box. The stock quote service, which is provided to customers through a leased line, provides stock quotes and news on dedicated circuits. Market Impact Standard & Poor's was notified of this problem in January, and did little to reconcile the many security holes. The problem was first reported to S&P by customer Kevin Kadow, Network Security Analyst for MSG.net, and has been further verified and researched by Stephen Friedl. According to inside sources, as of March, S&P Read More
Ernst & Young Leads Big 5 in Security
Announcing an upgrade to its online security portal, Ernst & Young, takes the lead in big 5 security services.

linux security features  & Young Leads Big 5 in Security Ernst & Young Leads Big 5 in Security L. Taylor - May 19, 2000 Event Summary Announcing an upgrade to its online security portal, Ernst & Young is clearly out in front of the big five when it comes to security consulting services. Its newly expanded online portal, eSecurityOnline.Com, offers a multitude of resources including newsgroups, mailing lists, vulnerability and virus information, a listing of security service offerings, security training, a library, and much mo Read More
Fundamental Principles of Network Security
As the complexity of security threats increases, so do the security measures needed to protect networks. Data center operators, network administrators, and

linux security features  Principles of Network Security As the complexity of security threats increases, so do the security measures needed to protect networks. Data center operators, network administrators, and other data center professionals need to comprehend the basics of security to safely deploy and manage networks today. Find out what you need to know about the fundamentals of secure networking systems, including firewalls, network topology, and secure protocols. Read More
End-to-end Encryption Security Requirements
The Secure POS Vendors Alliance (SPVA) commissioned the End-to-end Security workgroup to provide clear guidelines on the application of encryption technology to

linux security features  to-end Encryption Security Requirements The Secure POS Vendors Alliance (SPVA) commissioned the End-to-end Security workgroup to provide clear guidelines on the application of encryption technology to payment card data used for retail financial transactions. This document addresses encrypting payment card data in tamper-resistant security modules. Read More
Making Gramm-Leach-Bliley Security Compliance Fast and Easy
Designed to improve consumer financial services, the Gramm-Leach-Bliley Act (GLBA) includes security provisions for protecting confidential electronic financial

linux security features  Gramm-Leach-Bliley Security Compliance Fast and Easy Making Gramm-Leach-Bliley Security Compliance Fast & Easy If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. Qualys® is headquartered in Redwood Shores, California, with offices in France, Germany, the U.K., Japan and Hong Kong, and has partners worldwide. Source : Qualys Resources Related to Security Compliance : Regulatory Compliance (Wikipedia) Making Gramm-Leach-Bliley Read More
IBM Jumps on the Linux Bandwagon with Both Feet, Sort Of
IBM is refocusing its corporate-wide Internet software efforts around Linux, creating a new Linux Group within the Enterprise Server Division.

linux security features  Jumps on the Linux Bandwagon with Both Feet, Sort Of Event Summary January 10, 2000 12:30 PM ET - IBM is refocusing its corporate-wide Internet software efforts around Linux, a move it hopes will legitimize the open-source movement for large corporations while reviving its own flagging enterprise server business. In the process, IBM has dismantled the four-year-old Internet Division and has established a new Linux group under the Enterprise Server Division. The new group will be headed by former Read More
Study Shows: FBI Alienates Industry Security Experts
A comprehensive study done by TechnologyEvaluation.Com has shown that, for years the FBI has been alienating industry security experts. Some of the best

linux security features  Shows: FBI Alienates Industry Security Experts Study Study Shows: FBI Alienates Industry Security Experts L. Taylor - August 21, 2000 Problem Fighting cybercrime is complex and time-consuming. One case can involve a multitude of computer systems, networks, and administrators, and requires the cooperation of all system owners, and sometimes many nations, in order to find the perpetrator. Due to their love of technology, their education, training, and experience, it is not uncommon for security Read More

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others