• June 05, 2007 05 Jun'07

    Zero-day flaws affect Firefox, IE

    A researcher published details on four new zero-day flaws affecting Firefox and Internet Explorer. They could be exploited to log keystrokes, download malware and steal cookies.  Continue Reading

  • June 05, 2007 05 Jun'07

    Testing security of apps could put pressure on vendors

    Gartner IT Security Summit: Companies should shoulder some of the responsibility for testing applications to put pressure on vendors to create more secure software, say panelists.  Continue Reading

  • June 05, 2007 05 Jun'07

    Report: New hacking technique shields attackers

    A new report issued by UK-based security vendor Finjan shows that attackers are using IP addresses to mask a malicious Web page and avoid detection.  Continue Reading

  • June 04, 2007 04 Jun'07

    van Eck phreaking

    Van Eck phreaking is a form of eavesdropping in which special equipment is used to pick up telecommunication signals or data within a computer device by monitoring and picking up the electromagnetic fields (EM fields) that are produced by the ...  Continue Reading

  • June 04, 2007 04 Jun'07

    TACACS (Terminal Access Controller Access Control System)

    TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can ...  Continue Reading

  • June 04, 2007 04 Jun'07

    spoof

    Spoof was a game involving trickery and nonsense that was invented by an English comedian, Arthur Roberts, prior to 1884, when it is recorded as having been "revived.  Continue Reading

  • June 04, 2007 04 Jun'07

    spam trap

    A spam trap is the inclusion of an option in an online form that is preselected by default with the expectation that the user will fail to notice the option.  Continue Reading

  • June 04, 2007 04 Jun'07

    user profile

    In a Windows environment, a user profile is a record of user-specific data that define the user's working environment.  Continue Reading

  • June 04, 2007 04 Jun'07

    TACACS+

    TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can ...  Continue Reading

  • June 04, 2007 04 Jun'07

    XTACACS

    TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can ...  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close