Archive

Archive for October, 2004

Is Open Source Really More Secure?

October 28th, 2004
Comments Off on Is Open Source Really More Secure?

In this article we´ll discuss the claim made by proponents of open source software that such software is more secure. Is open source really inherently more secure than closed source commercial software? If so, why? And if not, why do so many have that perception?
Read more…

Articles

Google vs. Yahoo! – Conquering the mobile market

October 28th, 2004
Comments Off on Google vs. Yahoo! – Conquering the mobile market

Just a few weeks after Google introduced Google SMS – Google’s mobile search service, the Sunnyvale, Calif.-based Internet media company Yahoo! expanded its search services to the mobile market, said the company on Wednesday.
Read more…

Articles

Google vs. Yahoo! – Conquering the mobile market

October 28th, 2004
Comments Off on Google vs. Yahoo! – Conquering the mobile market

Just a few weeks after Google introduced Google SMS – Google’s mobile search service, the Sunnyvale, Calif.-based Internet media company Yahoo! expanded its search services to the mobile market, said the company on Wednesday.
Read more…

Articles

SingleClick Systems Unveils Wireless Management Solution

October 28th, 2004
Comments Off on SingleClick Systems Unveils Wireless Management Solution

SingleClick Systems announced a software solution – Wireless Network Ignition – for wireless network configuration and management that simplifies the complex processes associated in deploying wireless network infrastructure.
Read more…

Articles

Java and .NET security

October 27th, 2004
Comments Off on Java and .NET security

SUN Microsystems Java and Microsoft´s .NET platforms are no more than programming languages that exploit network potential with the idea that the same software should function on different platforms. Both systems are centered around the principle of running software that doesn´t reside on the client machine to provide greater functionality or faster execution, saving connection time and improving public perception of the server to which the client connects.
Read more…

Articles

Product Insight: Agnitum Outpost Firewall Pro

October 27th, 2004
Comments Off on Product Insight: Agnitum Outpost Firewall Pro

Agnitum Outpost Firewall Pro name is a bit deceiving. The term “firewall” to a Windows user implied somewhat limited application capable of monitoring the open ports and reporting on applications engaged in network communications. If you ever worked with ZoneAlarm, BlackICE or Windows XP Service Pack 2, you probably don´t expect much more out of the firewall software package.
Read more…

Articles, Reviews

Securing the (Increasingly) Mobile Client

October 26th, 2004
Comments Off on Securing the (Increasingly) Mobile Client

Enterprise deployments of notebook PCs, tablet PCs, and PDAs continue to grow by leaps and bounds. In fact, researcher Gartner Inc. recently predicted that, by the year 2010, 80 percent of key business processes will involve the exchange of real-time information involving mobile workers.
Read more…

Articles

10 IT Nightmares and How to Avoid Them

October 21st, 2004
Comments Off on 10 IT Nightmares and How to Avoid Them

Most companies’ IT support departments have a difficult enough time balancing operational and support requirements amidst staff turn-over, holidays, sick-leave, training, etc. Add to that, unforeseen incidents, technical issues and security breaches and you have an instant recipe for pandemonium amongst your critical systems.
Read more…

Articles

Security Appliances and Your Enterprise

October 18th, 2004
Comments Off on Security Appliances and Your Enterprise

Here’s a critical challenge for today’s enterprises: How do you create a trusted and available networking environment in the face of constant Internet threats? For an increasing number of enterprises, adding security appliances to their infrastructure helps them detect new threats earlier and implement effective mitigation strategies before their business is impacted. This article looks at how these appliances can help protect any business against today’s most dangerous and sophisticated Internet security threats.
Read more…

Articles

How to use passwords securely

October 15th, 2004
Comments Off on How to use passwords securely

Passwords have become, without doubt, users’ ID cards in the Internet. Thanks to passwords, you can prove who you are and unauthorized access can be blocked. However, by the same token, should a malicious user steal or discover this data, they can take on your digital identity.
Read more…

Articles