• November 30, 2005 30 Nov'05

    virtual local area network�hopping

    VLAN hopping (virtual local area network hopping) is a method of attacking a network by sending packets to a port at a network end point that is not normally accessible to the sender.  Continue Reading

  • November 30, 2005 30 Nov'05

    VLAN hopping

    VLAN hopping (virtual local area network hopping) is a method of attacking a network by sending packets to a port at a network end point that is not normally accessible to the sender.  Continue Reading

  • November 30, 2005 30 Nov'05

    VLAN hopping (virtual local area network hopping)

    VLAN hopping (virtual local area network hopping) is a method of attacking a network by sending packets to a port at a network end point that is not normally accessible to the sender.  Continue Reading

  • November 30, 2005 30 Nov'05

    Cisco patches Security Agent flaw

    The networking giant warned in an advisory Tuesday that local users could exploit a hole in its threat protection software.  Continue Reading

  • November 30, 2005 30 Nov'05

    Apple patches 13 flaws in Mac OS X

    Attackers could gain unauthorized system access, compromise sensitive data and launch malcode by exploiting a series of security holes in Mac OS X. But patches are available.  Continue Reading

  • November 30, 2005 30 Nov'05

    New algorithm promises to secure P2P content

    Three cryptographers have developed a secure P2P content distribution method without creating bottlenecks, and it could prove to be a significant breakthrough in the encryption arena.  Continue Reading

  • November 29, 2005 29 Nov'05

    How to tame Google Desktop

    Although not classified as spyware, if left unmanaged and unmonitored desktop search engines, like Google Desktop, can introduce serious security concerns. This tip examines these risks and explains how to block or secure Google Desktop in the ...  Continue Reading

  • November 29, 2005 29 Nov'05

    Sun fixes multiple Java flaws

    Attackers could exploit flaws in the Java Runtime Environment and Management Extensions to read and write local files or execute applications.  Continue Reading

  • November 28, 2005 28 Nov'05

    Opera: Another contender in the browser wars

    Opera Software removed the ad banners and dropped the licensing fees from its browser, making Opera a viable alternative to Internet Explorer. Learn how Opera compares to Firefox in terms of security measures and the drawbacks of using an ...  Continue Reading

  • November 28, 2005 28 Nov'05

    Zotob

    Zotob is a computer worm used by an attacker to gather personal and financial information from computers running Microsoft Windows that have a buffer overflow vulnerability. Zotob, which has several variants, is an outgrowth of a worm called Mytob.  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close