Home
 > search for

Featured Documents related to »  linux security


The Linux Box
The Linux Box is a project management and consulting practice, specializing in open source technology and the Linux platform. The company helps its customers

linux security  Linux Box The Linux Box is a project management and consulting practice, specializing in open source technology and the Linux platform. The company helps its customers assess, select, customize, and deploy best-of-breed open source solutions. The Linux Box concentrates on knowledge transfer and training, applications development and porting, and network support services. The Linux Box was formed in 1999 and is headquartered in Michigan, USA. Read More...
Information Security Selection
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » linux security


The Whitelisting of America: Security for IT
Once upon a time around 1995, the well-known American agency, the National Security Agency (NSA), decided that there was no computer operating system that was

linux security  have recognized that if Linux systems can do it, then so can they do it for the Microsoft platforms. Several companies have brought their whitelist product to market. Each has developed its own whitelisting facility, sold to compliment the traditional anti-virus software for Microsoft platforms. Whitelisting for other platforms works in a similar manner to Selinux. Rather then block bad applications that it recognizes by signature, it allows execution of those applications and processes that match the Read More...
Sendmail Takes Security to the Next Level with Version 3.0 for NT
Sendmail 3.0 includes the Sendmail Message Transfer Agent, a Mailing List Server, a POP3 Server and a Message Store.

linux security  Takes Security to the Next Level with Version 3.0 for NT Event Summary On September 20 1999, Sendmail released Sendmail 3.0 for the NT Server platform. The product targets small to mid-size organizations and Internet Service Providers and offers interoperability with Open Source Sendmail coupled with familiar NT Administrative Tools and Interfaces. Sendmail 3.0 includes the Sendmail Message Transfer Agent, a Mailing List Server, a POP3 Server and a Message Store. Market Impact The Sendmail MTA and Read More...
Fixing Security Backdoors: Red Hat 1, Microsoft 0
April is the cruelest month for operating system security holes. Red Hat posted a fix within six hours, but Microsoft leaves us… still waiting!

linux security  door in Red Hat Linux 6.2. The backdoor involves an extra , but undocumented, administrative password that allows users to run rogue programs on a Red Hat server via a Web-based administrator's interface. To its credit, Red Hat responded and posted a fix within six hours of the report. The news comes on the heels of reports earlier in the month that Microsoft had buried a secret password in its Web server software for Windows NT that derided Netscape engineers. The affected file was originally a part Read More...
Dell to Factory-Install Red Hat Linux on Servers
Red Hat, Inc., and Dell Computer Corporation today extended their strategic alliance, with Dell committing to factory-install Red Hat Linux on all future and

linux security  is ~65% of the Linux market, the remaining vendors (Corel, Caldera, TurboLinux, et al.) may find it difficult to make a compelling business argument for Dell to FIS their product(s). User Recommendations This announcement will give fence-sitting users a greater feeling of security regarding Linux's acceptance by the major PC/server manufacturers. In addition, Dell's market share strength will help customers consider a move to Linux which hitherto might have been unthinkable. There are two issues which Read More...
Integrated Security: A New Network Approach
The challenge is to ensure that the right people gain access and the wrong people do not, making the role of information security even more critical to enabling

linux security  Security: A New Network Approach Executive Summary As organizations become more dependent on their networks for business transactions, external data sharing, and simple day-to-day communications, the need increases for these networks to be more accessible and operational. But as accessibility to the network becomes easier, so does gaining access to the critical data they are storing. The challenge is to ensure that the right people gain access and the wrong people do not, making the role of Read More...
IBM Announces IBM Security Intelligence with Big Data
IBM has announced IBM Security Intelligence with Big Data, an offering that combine big data analytics with security intelligence capabilities for addressing

linux security  Announces IBM Security Intelligence with Big Data IBM has announced IBM Security Intelligence with Big Data , an offering that combine big data analytics with security intelligence capabilities for addressing both internal and external cyber security threats. The solution aims to provide a comprehensive offering for security analysts to extend their capabilities in detection and prevention. Made in IBM Labs, Security Intelligence with Big Data enables big data analysis with real-time correlation Read More...
Which is Best: Cloud-Based or on-Premise Web security?
As you'll discover in the Aberdeen report, Web Security in the Cloud: More Secure!

linux security  is Best: Cloud-Based or on-Premise Web security? With so many Internet-based threats, what provides the best protection for your network—cloud-based or on-premise security solutions? As you'll discover in the Aberdeen report , Web Security in the Cloud: More Secure! Compliant! Less Expensive! , cloud-based security solutions out-perform their on-premise counterparts in every critical area: security, compliance, reliability, and cost. Over a recent 12 month period, users of cloud-based Web security Read More...
Effective Operational Security Metrics
Due to the changing regulatory environment and the complexity of business today, organizations are facing increased accountability. Security risks, however, can

linux security  Operational Security Metrics Due to the changing regulatory environment and the complexity of business today, organizations are facing increased accountability. Security risks, however, can often be difficult to measure and even more difficult to understand by people outside of the department. The key to demonstrating improvement is to translate security information in to business terms. Organizations must align, manage, and measure security around business operations. Read More...
Understanding the PCI Data Security Standard
The payment card industry data security standard (PCI DSS) defines a comprehensive set of requirements to enhance and enforce payment account data security in a

linux security  the PCI Data Security Standard MessageLabs Hosted Web Security and Content Filtering service operates at the Internet level, intercepting viruses, and spyware. Source : MessageLabs | Now part of Symantec Resources Related to Understanding the PCI Data Security Standard : Payment Card Industry Data Security Standard (PCI DSS) (Wikipedia) Understanding the PCI Data Security Standard Data Security is also known as : Data Security Architecture , Data Security Articles , Data Security Audit , Read More...
Network Security Best Practices: Competitive Analysis
When it comes to security architecture, choosing a system that’s scalable and applicable to a broad set of security needs is a wise move. New security services

linux security  Security Best Practices: Competitive Analysis Network Security Best Practices: Competitive Analysis If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. At CipherOptics, we make data protection simple. Whether you need to secure data flows over your application environment or encrypt data in motion across the network, CipherOptics makes it easy. Source : CipherOptics Resources Related to Network Security Best Practices: Competitive Read More...
GNOME Will Try to Buff Up Linux
In its fight to catch up to Windows for desktop mindshare and market share, Linux has received a boost from the Gnome Foundation and a number of key systems

linux security  Try to Buff Up Linux GNOME Will Try to Buff Up Linux R. Krause - September 8, 2000 Event Summary In August at LinuxWorld, the GNOME project announced five major initiatives aimed at delivering an industry-wide open user environment. These initiatives are: To establish the GNOME user environment as the unifying desktop for the Linux and Unix communities. Adoption of OpenOffice.org technologies for integration into GNOME. Integration of the Mozilla browser technology into GNOME. Industry leaders to work Read More...
VA Linux Releases NAS Server
Trying to break into the growing Network-Attached Storage market, Linux-based hardware manufacturer VA Linux has announced the release of its 9205 NAS storage

linux security  Linux Releases NAS Server VA Linux Releases NAS Server R. Krause - September 26, 2000 Event Summary VA Linux Systems, Inc. recently introduced the VA Linux 9205 NAS system, a 2U (3.5-inch-high) storage appliance that leverages VA's expertise in Open Source software and high-density Linux systems engineering. The VA Linux 9205 NAS is VA's first network-attached storage (NAS) solution, complementing the company's product line, which is the industry's broadest selection of 1U and 2U rackmount Linux Read More...
Financial Mobility-Balancing Security and Success
No financial services company can afford to relax when it comes to IT security. Banks, investment firms, and insurance providers must follow government

linux security  Mobility-Balancing Security and Success No financial services company can afford to relax when it comes to IT security. Banks, investment firms, and insurance providers must follow government regulations, to ensure a secure environment for processing, storing, and transmitting credit card information. At the same time, most companies need mobile technology to compete. Know how to provide financial services mobility while ensuring that no breaches occur? Read more. Read More...
Popular Searches

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others