MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
November 11, 2008
Andy Patrizio
Microsoft Updates Best Practices for Developers At its third developer conference in as many weeks, Microsoft announces new tools and processes for making more secure applications. mark for My Articles similar articles
InternetNews
March 31, 2010
Red Hat Refreshes Flagship Linux Server With version 5.5 of Red Hat Enterprise Linux, the vendor is courting virtualization and Windows improvements, as well as a new crop of processors from Intel and AMD. mark for My Articles similar articles
PC Magazine
July 20, 2004
Richard V. Dragan
SmartRisk Analyzer 1.0 This @stake offering is a useful tool for catching security holes during C/C++ code development, before they become attack points in a finished product. But the price makes it prohibitive for many shops. mark for My Articles similar articles
InternetNews
February 15, 2005
Jim Wagner
Fortify Gauges Code Security Application Risk Analyzer provides hints to possible security leaks in C, and soon Java, code. mark for My Articles similar articles
InternetNews
August 3, 2006
Andy Patrizio
Vista Security Mostly Invisible But Thorough What you can't see in Vista is designed to keep malware from hurting you. mark for My Articles similar articles
InternetNews
July 30, 2007
Sean Michael Kerner
Black Hat Cometh; You Afraid? The Black Hat conference in Las Vegas is a place where bad things are talked about openly and things that we once thought were secure get thrown out the window. mark for My Articles similar articles
InternetNews
February 19, 2008
Sean Michael Kerner
Black Hat Descends on Washington Hackers flock to D.C. during this week's Black Hat conference to talk government, security and going on the defense - for a change. mark for My Articles similar articles
InternetNews
March 21, 2007
Andy Patrizio
Surprise, Microsoft Listed as Most Secure OS Microsoft has the fewest holes and was fastest at plugging them, according to Symantec's security report. mark for My Articles similar articles
InternetNews
February 9, 2005
Tim Gray
Check Point Releases Two Security Measures The security company updates Integrity and secures event management with Eventia Analyzer. mark for My Articles similar articles
The Motley Fool
February 5, 2008
Tim Beyers
A Valentine for Secure Computing Secure Computing is a misunderstood stock, beating Wall Street estimates although the Street says otherwise. Investors, read on to see why. mark for My Articles similar articles
InternetNews
December 22, 2009
Red Hat Earnings Preview: Still Up? How is the Linux leader weathering the recession? mark for My Articles similar articles
The Motley Fool
July 31, 2007
Tim Beyers
Don't Be Deceived by These Numbers If ever a rule of thumb were made to be broken, it's this: Never invest in an unprofitable company. Here's a look at network security specialist Secure Computing. mark for My Articles similar articles
InternetNews
July 30, 2009
Black Hat: Microsoft's Killbit Under the Microscope Researchers roll out a killbit analyzer and take some shots at the software giant, but Microsoft's not worried. mark for My Articles similar articles
InternetNews
March 16, 2004
Ryan Naraine
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. mark for My Articles similar articles