Similar Articles |
|
PC Magazine June 22, 2005 Larry Seltzer |
Make Your Network Safer by Attacking It A number of excellent tools can help you find out where you're network is vulnerable. |
PC Magazine August 3, 2005 Ryan Naraine |
TCP Port Attack Imminent? An ominous increase in sniffing activity on TCP Port 445 could signal an impending attack targeting a recently patched Microsoft vulnerability. |
Unix Insider November 2000 Sandra Henry-Stocker |
Tapping on the walls Paring down your network services isn't the only way to protect your systems against attacks: port scanning can also be an effective tool. Here's how to stay one step ahead of your enemy... |
PC Magazine December 30, 2003 Matthew D. Sarrel |
Network Security: Know Your Weaknesses Vulnerability scanners identify your network's insecurities. Which one of these 6 tested products will watch your back? |
PC Magazine May 1, 2009 M. David Stone |
Are Your Scans Taking Too Long? Autofocusing is generally a desirable feature for scanners, because it ensures the scanned image will be in focus. |
PC Magazine June 23, 2008 Matthew D. Sarrel |
How Secure Is Your Company? To protect your business, think like a thief. |
PC World November 2003 Andrew Brandt |
Privacy Watch: Make Sure Your Firewall Is Sturdy Test your firewall to find out if it has any holes -- and then plug them up. |
InternetNews January 14, 2010 |
McAfee Fingers Microsoft IE Flaw in Google Attack McAfee's researchers say 'Operation Aurora' used a zero-day vulnerability in Microsoft's browser software to penetrate Google's networks. |
InternetNews January 5, 2005 Sean Michael Kerner |
Hackers After Patched WINS Servers According to the Internet Storm Center (ISC) at the SANS Institute, hackers are trying to exploit an already patched Microsoft WINS Server vulnerability. |
InternetNews April 3, 2009 Stuart J. Johnston |
PowerPoint Hit in Latest Microsoft Office Zero-Day Microsoft issues a security advisory to warn of possible attacks on the company's presentation software. |
InternetNews December 23, 2005 Sean Michael Kerner |
Nessus 3.0 Closes the Book on Open Source Tenable Network Security, the firm that sponsors and commercially provides Nessus, has recently released version 3.0 of the vulnerability scanner, the first version of the scanner not to be released under the GPL. |
PC Magazine March 1, 2006 Matthew D. Sarrel |
Hack Thyself Discovering security flaws is the first step toward getting your small business's computers in shape. |
InternetNews July 25, 2005 Sean Michael Kerner |
SANS: No Safety From Vulnerabilities IE vulnerabilities still abound, but Apple, Mozilla and Real Player users have little to gloat about. |
InternetNews January 29, 2007 Michael Hickins |
Microsoft Warns of New Zero-Day Flaw Microsoft is investigating new public reports of limited "zero-day" attacks using a vulnerability in Microsoft Word 2000. |
InternetNews March 31, 2005 Tim Gray |
Symantec Fixes Security Holes The firm releases fixes for two vulnerabilities found in its anti-virus products. |
Bank Systems & Technology July 22, 2007 Nancy Feig |
Bank's IT Security Vulnerability Growing Improvements in overall security have been achieved in most industry sectors, but the financial services industry has seen an increase in the average number of IT vulnerabilities, according to to a study. |
AskMen.com |
Top 5 Photo Scanners We rounded up five popular scanner models with the right specs to take on film and slides: a rated optical density of at least 3.8 D and a resolution of at least 2,700 ppi. |
InternetNews August 6, 2010 |
Adobe Hurries Patch for PDF Security Flaw The vulnerability in Adobe Reader could give hackers control of a user's computer. |
Macworld April 3, 2007 James Galbraith |
HP Scanjet G4010 Photo Scanner Flatbed scanner delivers scans in six colors. |
InternetNews April 20, 2004 Ryan Naraine |
Exploit for Windows SSL Flaw Circulating Unpatched systems are at risk of DoS attacks but security experts warn the threat level could grow considerably. |
InternetNews September 9, 2008 Sean Michael Kerner |
Microsoft Updates for Media Vulnerabilities Be careful what you listen to on your PC. Hackers may want to get it. |
InternetNews March 16, 2004 Ryan Naraine |
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. |
Macworld August 4, 2006 Jennifer Berger |
Epson GT-2500 document scanner The Epson GT-2500 document scanner is great if you need a combination of high-quality photo scans along with scans of regular text documents and the flat bed for specialized scanning, but it may be overkill for some normal business users |
T.H.E. Journal October 2003 Ronny Richardson |
Hands-On Review: CanoScan 3000F Color Image Scanner The Canon CanoScan 3000F is an inexpensive, yet versatile, color-image scanner that is well suited for classroom applications. |
PC Magazine March 15, 2006 Helen Bradley |
Scanning Made Easy Two hidden Microsoft Office tools could save you hours of work. |
RootPrompt.org June 26, 2000 Lance E. Spitzner |
Knowing When Someone Is Knocking Lance E. Spitzner tells us how you can protect yourself by detecting intrusion attempts and then covers what you can do about them. |
T.H.E. Journal October 2002 Ronny Richardson |
Educator's Review: Pacific Image Electronics' PrimeFilm 1800AFL Unlike most film scanners, which can be expensive, the PrimeFilm 1800AFL from Pacific Image Electronics is inexpensive at $399 and, more important, it does a good job. |
PC Magazine December 20, 2006 |
Should I "Stealth" This Port? The open port 443 on a router is used to access secure websites, so keep it available. |
InternetNews March 13, 2008 Sean Michael Kerner |
A Closed Nessus Still Appeals to Users Tenable released Nessus 3.2, the second point release of Nessus since moving away from the open source GPL in Nessus 3.0 in December 2005. |
PC Magazine September 13, 2006 M. David Stone |
Expert View: The True Blue Document Scanner There must be a simple, one-step option to scan, recognize, and save the file. |
InternetNews November 28, 2006 Ed Sutherland |
Google Catches Phishing Flaw in Appliances Security experts are warning the computing world about a new security vulnerability in Google's Search Appliance and Google Mini device that may yield more phishing attacks. |
InternetNews February 18, 2009 Richard Adhikari |
Hackers Target IE 7 Browser Again Users who failed to patch their computers after Microsoft released its monthly Patch Tuesday update last week could be in trouble - an Internet Explorer browser vulnerability for which the patch was sent out is under attack again. |
Macworld February 22, 2005 James Galbraith |
CanoScan LiDE 500F Flexible scanner has its quirks |
InternetNews May 12, 2010 |
Firm Finds Flaws in Popular Antivirus Software Putting the security software offerings from 35 different vendors through their paces, researchers at Matousec conclude that all are susceptible to an exploit that could hobble Windows-based devices. |
Macworld March 25, 2005 James Galbraith |
Epson Perfection 4990 Photo The Epson Perfection 4990 Photo has lots of great included retouching software, as well as the ability to scan many sizes of transparencies. |
Macworld July 14, 2006 James Galbraith |
Microtek ScanMaker i800 scanner Flatbed scanner goes long for legal scans |
InternetNews April 29, 2005 Jim Wagner |
Tivoli Gets a Handle on New Bugs IBM's network security manager is plugged into the security index for late-breaking bugs, viruses and vulnerabilities. |
InternetNews December 1, 2006 Ed Sutherland |
Apple Patch Plugs AirPort Holes Apple Computer issued a security update targeting 31 flaws in its Mac OS X operating system, including a vulnerability that could open wireless users to attack. |
PC Magazine March 28, 2007 M. David Stone |
Epson Perfection V350 Photo The Epson Perfection V350 Photo is a general-purpose scanner that's best for photographic prints, but it can handle slides, strips of film, and documents, too. |
InternetNews May 2, 2007 Michael Hickins |
Mac Hack Contest Draws Fire A Gartner study takes issue with how vulnerabilities are discovered and disclosed. |
PC Magazine December 21, 2005 Ryan Naraine |
The Lookout: Macromedia Patches Flaw The vulnerability is rated "critical" and was flagged in Flash Player 7.0.19.0 and earlier versions. |
PC Magazine April 30, 2004 M. David Stone |
Microtek ScanMaker 6100 Pro In addition to the usual assortment of document types you'd expect for a flatbed scanner, the ScanMaker 6100 Pro handles slides surprisingly well. |
PC Magazine September 13, 2006 M. David Stone |
Buying Guide: Document Scanners One of the benefits of creating text-based documents on a computer is that it's easy to find the documents again. |
InternetNews July 12, 2005 Jim Wagner |
Microsoft Patch Day Plugs 3 The fixes plug security holes in Word, IE and Windows. |
InternetNews April 2, 2007 Michael Hickins |
Game On: Microsoft to Issue Emergency Patch Microsoft is issuing the patch in advance of its usual Patch Tuesday schedule to counter role-play game hackers. |
PC Magazine February 26, 2007 Robert P. Lipschutz |
Perimeter eSecurity Vulnerability Assessment Taking a simple step can reveal holes in your small business's network. |
Macworld March 15, 2007 James Galbraith |
Epson Perfection V350 Photo scanner This swift flatbed scanner that makes it easy to output colorful and pleasing images. And its ability to load and scan filmstrips automatically is a great no-hassle feature for digitizing older photos. |
InternetNews July 26, 2010 |
Microsoft Updates Bug Reporting Process Extending an olive branch to security researchers, Microsoft says it will provide new mechanisms to make it easier to report vulnerabilities. |
InternetNews August 10, 2004 Ryan Naraine |
MS Exchange 5.5 Spoofing Flaw Fixed Moderately critical vulnerability puts users at risk of cross-site scripting and spoofing attacks. |
InternetNews January 11, 2007 Sean Michael Kerner |
Money For Vista, IE Bugs VeriSign's iDefense Labs has kicked off its Vulnerability Contributor Program, a challenge to find remote arbitrary code execution vulnerabilities in Vista and Internet Explorer 7.0. VCP will pay $8,000 for the first six confirmed vulnerabilities. |