X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 securityfocus com


Cart32 in Need of Duct Tape
With a gaping security hole, anyone using Cart32 can buy all kinds of stuff for free, or whatever price they feel like paying.

securityfocus com  May 22 to the SecurityFocus Bugtraq security bugs list, and as of today, we have found Cart32 sites still using this blatantly insecure product. To change the price of a product being sold using Cart32, on the page that has the price, you simply save the HTML code on your hard drive, and edit the source. For example, if an item is priced at $119.00 you remove the 9 and the price becomes $11.00. This security hole is so easy to exploit, that any transaction systems that dump this information directly into

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » securityfocus com

Lost Your Laptop? The CyberAngel® Brings It Back


A company known as Computer Sentry Software, Inc. has designed an innovative option for laptop recovery. With laptop theft on the rise, investing in an affordable laptop recovery package is well worth the investment.

securityfocus com   Read More

CyberPeepers from Korean Sites Peek at U.S. Networks


Numerous United States Internet sites are being bombarded by cyberpeepers from Korea. Whether or not these network scans constitute an attack depends upon whom you ask, and how far into your infrastructure they get.

securityfocus com   Read More

Vulnerability Assessment and Prevention with Rapid7


Ever hear of a company or government agency’s computer systems falling victim to some individuals' malicious activities? In spite of the frequent news documenting these events, many organizations don't prioritize the security of their own systems. Vendors such as Rapid7, McAfee, or Qualys offer different types of software to assess, manage, or curtail your information technology (IT) systems

securityfocus com   Read More

Security Breach: Now What?


When people's lives or financial transactions are at risk, proper Security Incident handling is of extreme importance.

securityfocus com   Read More

Computer Manufacturers Shifting Their Focus to Start-Ups


Sun Microsystems and Gateway have announced initiatives designed to make their products and services more appealing to start-up companies, especially those where cash may be a little tight.

securityfocus com   Read More

Talent Management: The New Business Imperative


Studies and statistics suggest that, because of demographic trends, companies will soon face a shortage of talent. In response, many companies have begun adopting processes and tools to more effectively recruit, retain, and develop talent. At the top of the list are human capital management (HCM) and talent management systems. Find out how these new technologies can help your company survive the coming talent crunch.

securityfocus com   Read More

Textile and Apparel


Shorter fashion trend cycles, increasing competition, and globalization have brought both challenges and opportunities to the textile and apparel industry. More than ever before, to be successful, companies in this industry have to be able to work with the global extended enterprise environment harmoniously and promptly, in areas such as product development, manufacturing, marketing, and distribution. Challenges that textile and apparel companies are facing include the following.

securityfocus com   Read More

Strategies for Profitable Growth: Aerospace and Defense Manufacturing


The aerospace and defense (A&D) manufacturing industry is always changing. That’s why A&D manufacturers are constantly seeking better ways to manage complexity, cut costs, and boost productivity. In pursuit of these objectives, A&D manufacturers are looking beyond standard practices to new business strategies that promise solid business results. But which strategies and practices are right for your company?

securityfocus com   Read More

Salesforce.com Expands into SAP’s Turf


Salesforce.com dreams of becoming a $1 billion software company, in Germany. The vendor is forging partnerships, expanding its territory, and fostering innovation.

securityfocus com   Read More

FUJITSU GLOVIA INC.


Glovia supports multiple locations, multiple languages, and multiple currencies. Glovia specializes in helping both simple and complex business structures, fitting the needs of engineer-to-order, configure-to-order, make-to-order, make-to-stock, make-to-forecast, ultra-high volume (continuous), and mixed-mode manufacturing.

securityfocus com   Read More