MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
May 12, 2004
Ryan Naraine
IETF Mulling Changes to Secure TCP An IETF working group has recommended TCP changes to eliminate, or at least minimize, attack scenarios against the widely used data communication protocol. mark for My Articles similar articles
InternetNews
April 21, 2004
Ryan Naraine
Cisco Rolls Major Patches to TCP Flaw Switches, routers, intrusion detection systems and VoIP phones are on the list needing patches to TCP flaw. mark for My Articles similar articles
InternetNews
September 9, 2009
Cisco Patches Critical TCP Vulnerability Cisco patches critical flaw that could trigger massive DoS condition. mark for My Articles similar articles
InternetNews
January 13, 2004
Ryan Naraine
Protocol Flaw Puts VoIP Users at Risk Security vulnerability in a common data transmission protocol is labeled 'moderately critical.' mark for My Articles similar articles
InternetNews
August 30, 2004
Ryan Naraine
Cisco Confirms DoS Flaws Cisco's IOS-powered devices at risk of Denial of Service attacks. mark for My Articles similar articles
InternetNews
March 26, 2010
Cisco Targets Security Threats With IOS Update Cisco issues seven security warnings relating to vulnerabilities in its IOS operating system, which powers many of its routers and switches. mark for My Articles similar articles
InternetNews
January 27, 2005
Sean Michael Kerner
Multiple Flaws Hound Cisco A week after Cisco reported a vulnerability in its Internetwork Operating System (IOS) Software Embedded Call Processing Solutions, the company has, thrice again, been hit. mark for My Articles similar articles
InternetNews
May 25, 2005
Cisco Patches DNS, VoIP Flaws Cisco issued a patch for a domain name system vulnerability that could put some of its routers and Voice Over IP products at risk for exploits. mark for My Articles similar articles
InternetNews
January 25, 2007
Sean Michael Kerner
US-CERT Warns of Cisco Flaws US-CERT has issued an advisory this week that warns of vulnerabilities in Cisco's Internetwork Operating System. Cisco issued three of its own. mark for My Articles similar articles
InternetNews
July 6, 2004
Colin C. Haley
US-CERT Warns on IPv6 Routing Software Some versions of Juniper's JUNOS software, which directs traffic using the IPv6 standard, can be exploited to cause a DoS attack. mark for My Articles similar articles
InternetNews
April 12, 2005
Jim Wagner
Five Critical Fixes in Latest Microsoft Update The software giant introduces new fixes, addressing a number of vulnerabilities in Windows and other software. mark for My Articles similar articles
InternetNews
March 9, 2004
Ryan Naraine
Microsoft Patches Trio of Vulnerabilities Security fixes issued for Microsoft Outlook, MSN Messenger and the Windows Media Services. mark for My Articles similar articles
InternetNews
January 22, 2004
Ryan Naraine
Cisco Warns of Voice Product Security Flaws A repair script is released to fix a security flaw that leaves TCP and UDP ports open to malicious attack. mark for My Articles similar articles
PC Magazine
September 16, 2003
Dennis Fisher
The Lookout: Windows Server 2003 Flaw Microsoft Corp. has issued a patch for the first serious vulnerability to be found in Windows Server 2003, which company officials have said is Microsoft's most secure OS yet. mark for My Articles similar articles
InternetNews
October 12, 2004
Wagner & Naraine
MS Patch Barrage Comes With IE Fix Microsoft released its October batch of security advisories Tuesday with a slew of "critical" patches, including a monster fix for the Internet Explorer browser. mark for My Articles similar articles
RootPrompt.org
June 14, 2000
The Secrets of Snoop Lance Spitzner tell us about the secrets of Snoop: A passive approach to your network security. mark for My Articles similar articles
InternetNews
March 30, 2004
Ryan Naraine
Malicious Cisco Code Circulating The release of a hacking toolkit to exploit security holes in Cisco products has sent the networking giant scrambling. mark for My Articles similar articles
PC Magazine
March 16, 2004
The Lookout: VoIP Vulnerable Applications such as Voice over IP telephony and videoconferencing could be vulnerable to security breaches because of flaws in the way a major telephony standard is being used. mark for My Articles similar articles
InternetNews
October 14, 2008
Sean Michael Kerner
Microsoft Rates Patched Flaws by Exploitability Patch Tuesday addresses 20 vulnerabilities, while Microsoft for the first time reveals its take on how exploitable each may be. mark for My Articles similar articles
IEEE Spectrum
December 2008
Bob Briscoe
A Fairer, Faster Internet Protocol TCP -- the way we share bandwidth -- needs a makeover. mark for My Articles similar articles
RootPrompt.org
August 30, 2000
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. mark for My Articles similar articles
PC Magazine
August 3, 2005
Ryan Naraine
TCP Port Attack Imminent? An ominous increase in sniffing activity on TCP Port 445 could signal an impending attack targeting a recently patched Microsoft vulnerability. mark for My Articles similar articles
Linux Journal
March 2, 2007
Michael Rash
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. mark for My Articles similar articles
PC Magazine
August 19, 2003
Dennis Fisher
The Lookout: New Breed of Trojan Security researchers believe they have identified a new breed of Trojan horse that is infecting machines on the Internet, possibly in preparation for a larger coordinated attack. mark for My Articles similar articles
InternetNews
Haley & Singer
Cisco Readies 'Huge Fast Router' After years of research and development, network equipment giant Cisco Systems has announced its next-generation high-end router as part of its 20th anniversary celebration. mark for My Articles similar articles
InternetNews
March 7, 2005
Sean Michael Kerner
'Land' Bug Back to Bedevil Microsoft Servers Windows Server 2003 and XP SP2 machines without properly configured firewalls are at risk of a Denial of Service attack via the "LAND" bug, according to a security researcher. mark for My Articles similar articles
InternetNews
April 9, 2004
Jim Wagner
IE Vulnerability Flagged Other Web browsers could also be affected because of a flaw in Internet Explorer's ITS protocol handler, CERT warns. mark for My Articles similar articles
InternetNews
September 15, 2008
Sean Michael Kerner
Cisco and Juniper Roll New Networking Gear Networking leaders Cisco and Juniper are both issuing new releases to their product portfolio this week that expand on the promise of speed and service convergence. mark for My Articles similar articles
InternetNews
January 5, 2005
Sean Michael Kerner
Hackers After Patched WINS Servers According to the Internet Storm Center (ISC) at the SANS Institute, hackers are trying to exploit an already patched Microsoft WINS Server vulnerability. mark for My Articles similar articles
InternetNews
December 1, 2004
Tim Gray
Microsoft: WINS Patch Coming Microsoft said it plans to issue a patch for a security flaw in Windows Server software that may allow attackers to gain control over systems running the program. mark for My Articles similar articles
Unix Insider
November 2000
Sandra Henry-Stocker
Tapping on the walls Paring down your network services isn't the only way to protect your systems against attacks: port scanning can also be an effective tool. Here's how to stay one step ahead of your enemy... mark for My Articles similar articles
InternetNews
December 3, 2004
Colin C. Haley
Juniper Routes Core Objective The network equipment maker announces the availability of a new platform for service providers. mark for My Articles similar articles
Linux Journal
September 1, 2007
Jan Newmarch
Introduction to Stream Control Transmission Protocol This article provides a brief introduction to the IETF Stream Control Transmission Protocol and explains how it can be used as a replacement for TCP. mark for My Articles similar articles
InternetNews
February 21, 2007
Andy Patrizio
Cisco Issues Security Alert Related to IP Phones Cisco Systems issued an alert on Wednesday that the security of its IP-based phones could be compromised, allowing hackers to get around the security restrictions and change settings or issue a Denial of Service attack. mark for My Articles similar articles
InternetNews
August 22, 2005
Sean Michael Kerner
Cisco Leads Router Race A new study ranks Cisco in the top spot among enterprise routers, but enterprises have some concerns about pricing. mark for My Articles similar articles
PC Magazine
October 28, 2003
Brett Glass
Batten Down Those Ports Don't let malicious intruders find a way into your system. We tell you how they try to sneak in -- and how to keep them out. mark for My Articles similar articles
The Motley Fool
August 9, 2010
Eric Bleeker
Will Networking Gains Lift All Boats? Booming data traffic should lead to huge gains across the core router market industry, but competition is increasing. mark for My Articles similar articles
InternetNews
July 13, 2005
Susan Kuchinskas
Microsoft Settles With Alacritech In a deal that ends patent infringement litigation, Microsoft and Broadcom will license Alacritech's fast NIC technology. mark for My Articles similar articles
IEEE Spectrum
January 2006
Robert W. Lucky
Tragedy of the Commons Imagine if our cars acted like transmission control protocol -- TCP. You'd be allowed to drive as fast as you wanted, as long as you didn't interfere with others. mark for My Articles similar articles
PC Magazine
June 23, 2008
Matthew D. Sarrel
How Secure Is Your Company? To protect your business, think like a thief. mark for My Articles similar articles
Linux Journal
May 1, 2002
Pedro Paulo Ferreira Bueno
Understanding IDS for Linux A discussion of the different types of intrusion detection systems and how to create signatures to identify attacks... mark for My Articles similar articles
InternetNews
July 24, 2007
Clint Boulton
Security's the Driver For Cisco Branch Services The networking giant introduces encryption for its branch appliances and new storage routers. mark for My Articles similar articles
RootPrompt.org
June 26, 2000
Lance E. Spitzner
Knowing When Someone Is Knocking Lance E. Spitzner tells us how you can protect yourself by detecting intrusion attempts and then covers what you can do about them. mark for My Articles similar articles
The Motley Fool
August 29, 2008
Anders Bylund
Juniper Is No David to Cisco's Goliath Juniper catches some analysts' eyes, but Cisco still rules. mark for My Articles similar articles
Information Today
December 30, 2002
Richard W. Wiggins
The Internet Marks Its 20th Anniversary As you celebrate New Year's Day, pause to contemplate that it marks the 20th anniversary of the birth of the Internet. mark for My Articles similar articles