Skip to main content

Technology

Trend Micro Offers HTTP Virus-Scanning Tool

posted onSeptember 9, 2003
by hitbsecnews

Trend Micro Inc. on Monday announced a new gateway anti-virus product designed specifically to stop viruses coming in through Web traffic. InterScan Web Security Suite inspects HTTP and FTP traffic and is meant for the high-end enterprise market, where speed and performance are major considerations.

Webcams let surfers play security guard

posted onSeptember 5, 2003
by hitbsecnews

It sounds like a chapter out of "Spy vs. Spy": Researchers at Carnegie Mellon University have launched a project called Camera Watch that lists Internet cameras that monitor public spaces, letting Web surfers try the role of bored security guard.

The project is part of "Surveillance of Surveillances," an effort by the school's Data Privacy Lab to monitor the exploding number of cameras watching the public. The group hopes to learn enough to propose policies to govern the cameras' use.

Back-up for blackouts

posted onSeptember 2, 2003
by hitbsecnews

The UK’s small businesses are being warned to take heed of last week’s London power cut by ensuring their computer systems are backed up.

Last Thursday’s blackout, while nowhere near on the scale of recent power failures in New York and Canade, left many businesses in the south east without power for more than 30 minutes, rendering some computer systems unusable.

Even a short spell without computer systems can affect profits but the unexpected loss of data and information can be devastating, especially for small businesses.

Network Associates sniffs out VoIP patent

posted onAugust 29, 2003
by hitbsecnews

Network Associates (NAI) has been awarded a patent for technology that uses the filtering of Voice over Internet Protocol (VoIP) for network optimisation and troubleshooting.
The technology, covered by US Patent 6,604,139 and entitled Voice Protocol Filtering System and Method, is designed to allow users to select particular voice protocols and monitor network parameters specific to VoIP calls.

NAI said that by looking at these protocols and parameters, users could receive more accurate information. And collected data requires less storage, it added.

Machine Thinks, Therefore It Is

posted onAugust 27, 2003
by hitbsecnews

A new type of thinking machine that could completely change how people interact with computers is being developed at the Department of Energy's Sandia National Laboratories.

Free ride over for VoIP?

posted onAugust 25, 2003
by hitbsecnews

A cheap, Internet-based alternative to traditional telephone service is facing a sudden regulatory backlash that could slow adoption of the fast-growing technology, raise prices and put financially shaky start-ups out of business.

Postfix: A Secure and Easy-to-Use MTA

posted onAugust 23, 2003
by hitbsecnews

On March 3rd, 2003, Internet Security Systems, in cooperation with the Department of Homeland Security, issued a warning regarding a hole found in Sendmail. Sendmail, of course, is responsible for handling over half of the world's e-mail traffic. The warning, echoed by CERT, warned system admins that any version lower than 8.12.8 was vulnerable to a serious root exploit. I heard the warning loud and clear, so I wasted little time upgrading each system on our network.

A visual tour of Open Grid Services Architecture

posted onAugust 23, 2003
by hitbsecnews

Grid computing is a promising emerging technology that is growing in mindshare and relevance in the industry. Applications that take advantage of grids are under development in both academic and commercial organizations. You can find many definitions of Grid computing (see Resources), but the essence of the grid is the federation of computing resources to accelerate application processing, plus the virtualization of these resources. At its core, the grid is all about distributed computing and resource management.

Tiny, powerful computers based on DNA

posted onAugust 19, 2003
by hitbsecnews

It almost sounds too fantastic to be true, but a growing amount of research supports the idea that DNA, the basic building block of life, could also be the basis of a staggeringly powerful new generation of computers.

If it happens, the revolution someday might be traced to the night a decade ago when University of Southern California computer scientist Leonard Adleman lay in bed reading James Watson's textbook "Molecular Biology of the Gene."

The Benefits of Clustering

posted onAugust 19, 2003
by hitbsecnews

Clustering is not a new term. The era of clustering began in 1983 and now a days its becomes more and more popular as a solution of different problems in computing networking environment. With Clustering Technology, multiple servers are connected to form a "cluster" of computers. Each computer in the "cluster" is connected to the Internet through a Load Balancing Router (LBR). When a request comes through to the LBR for information or services, the LBR checks to see which server is least busy and "routes" the request to that server.