MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
T.H.E. Journal
September 2003
Roger Del Russo
Securing Your Computer Network Your entire district could be brought to its knees by a hacker's assault, and the costs of reviving the network could be astronomical. While district administrators may have devised plans for securing the physical plant of the school, they rarely consider the vulnerability of their computer networks. mark for My Articles similar articles
Unix Insider
May 2000
Carole Fennelly & Brian Martin
Hacker's toolchest What is a hacker's approach to penetration testing? What tools do hackers use? I decided to find out. mark for My Articles similar articles
Real Estate Portfolio
Mar/Apr 2002
Scott Laliberte
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... mark for My Articles similar articles
PC Magazine
June 22, 2005
Larry Seltzer
Make Your Network Safer by Attacking It A number of excellent tools can help you find out where you're network is vulnerable. mark for My Articles similar articles
PC Magazine
March 1, 2006
Matthew D. Sarrel
Hack Thyself Discovering security flaws is the first step toward getting your small business's computers in shape. mark for My Articles similar articles
PC Magazine
December 30, 2003
Matthew D. Sarrel
Network Security: Know Your Weaknesses Vulnerability scanners identify your network's insecurities. Which one of these 6 tested products will watch your back? mark for My Articles similar articles
PC Magazine
February 26, 2007
Robert P. Lipschutz
Perimeter eSecurity Vulnerability Assessment Taking a simple step can reveal holes in your small business's network. mark for My Articles similar articles
InternetNews
September 7, 2010
Researcher Unearths Microsoft Zero-Day Flaw A security researcher who also happens to be a Google employee is warning of a new zero-day exploit affecting Internet Explorer 8 that could automatically send out unintended tweets. mark for My Articles similar articles
InternetNews
June 23, 2004
Clint Boulton
OASIS Passes Flaw-Reporting Standard The e-business standards body ratifies Application Vulnerability Description Language to exchange security flaw information. mark for My Articles similar articles
CIO
June 1, 2002
Sarah D. Scalet
Dr. Crime's Terminal of Doom Most computer attacks come from the outside. But the costliest ones come from the inside. Here's how to manage the risk without making honest employees feel like crooks mark for My Articles similar articles
Entrepreneur
May 2004
Cleaver & Penttila
Management Buzz 05/04 Welcoming overweight customers, employing international students and more. mark for My Articles similar articles
InternetNews
December 16, 2005
Jim Wagner
Dasher Worm No Friendly Reindeer Corporations are at the most risk from a recently discovered worm. mark for My Articles similar articles
Global Services
May 27, 2007
Raj Chaturvedi
Defining Security Expectations Documenting and sign offs on security expectations are an essential part of any sourcing deal. mark for My Articles similar articles
InternetNews
December 9, 2005
Sean Michael Kerner
Do Hackers Look Before They Leap? University of Maryland researchers find that port scanning isn't necessarily a harbinger of an attack. mark for My Articles similar articles
Salon.com
August 29, 2001
Damien Cave
How do you fix a leaky Net? Brian West says he was doing a public service when he pointed out a security hole in an Oklahoma newspaper's Web site. So why did the editor in chief call the cops? mark for My Articles similar articles
InternetNews
May 19, 2010
New Vulnerability Surfaces in 64-Bit Windows A new zero-day security vulnerability is at the heart of a new Microsoft Security Advisory, which warns about a flaw that could impact a variety of 64-bit Windows systems. mark for My Articles similar articles
InternetNews
August 5, 2004
Ryan Naraine
Critical Flaws Spoil Opera Tune Opera updates its flagship browser to plug a series of potentially serious security holes. mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
InternetNews
March 30, 2004
Ryan Naraine
Malicious Cisco Code Circulating The release of a hacking toolkit to exploit security holes in Cisco products has sent the networking giant scrambling. mark for My Articles similar articles
InternetNews
August 9, 2005
Jim Wagner
Microsoft Patches 3 Critical Flaws Microsoft Windows issues three critical and three moderate-to-important fixes in its August installment of security fixes. mark for My Articles similar articles
InternetNews
April 20, 2004
Ryan Naraine
Exploit for Windows SSL Flaw Circulating Unpatched systems are at risk of DoS attacks but security experts warn the threat level could grow considerably. mark for My Articles similar articles
PC World
November 9, 2001
Jennifer DiSabatino
IE Hole Reveals Users' Cookie Data Microsoft is working on patch, but for now malicious sites could siphon information from IE 5.5 and 6.0... mark for My Articles similar articles