MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
November 1, 2004
Colin C. Haley
AT&T Builds In Network Security AT&T announced a new version of its predictive service designed to help protect far-flung businesses from worms and viruses without deploying firewalls at each location. mark for My Articles similar articles
Technology Research News
May 5, 2004
Speed Limits Could Slow Viruses New throttling method that limits the number of new connections a computer can make in a given period of time, promises to slow computer viruses and worms. mark for My Articles similar articles
Technology Research News
December 17, 2003
Kimberly Patch
Device guards Net against viruses Ordinary computers have no chance of being able to monitor the huge volumes of traffic flowing through the Internet. Specialized hardware, however, can. A device is poised to serve as a network sentry, scanning the full contents of every packet for signs of viruses and the like. mark for My Articles similar articles
PC Magazine
February 15, 2006
Matthew D. Sarrel
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. mark for My Articles similar articles
PC Magazine
September 21, 2004
NAT Enough? A home router is not a complete security solution. mark for My Articles similar articles
InternetNews
August 30, 2005
Tim Gray
Zotob Writer Had Busy Summer One of the programmers arrested last week in connection with the Zotob worm outbreak may have authored at least 20 other worms, according to SophosLabs. mark for My Articles similar articles
Entrepreneur
March 2006
Amanda C. Kooser
Hacker's Paradise Vincent Weafer, senior director of Symantec security response, talks about what internet security threats are shaping up. mark for My Articles similar articles
Inc.
February 18, 2003
Anne Stuart
Security Issues with VoIP Are voice-over Internet protocol phone systems vulnerable to hackers? Can calls be intercepted? Unfortunately, yes. Here's a list VoIP Web sites you can dial into for more information on VoIP and its related security issues. mark for My Articles similar articles
T.H.E. Journal
April 2005
Jackson Ratcliffe
Dominican U. Secures Network to Protect Students and Faculty Dominican University of California takes steps to combat worms, viruses and spyware. mark for My Articles similar articles
PC Magazine
October 5, 2004
Sheryl Canter
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. mark for My Articles similar articles
Entrepreneur
May 2006
Liane Cassavoy
The Next Generation Don't get left behind - try out these new software solutions for your business. mark for My Articles similar articles
CIO
September 15, 2005
Susannah Patton
Dial VoIP For Vulnerability Voice over Internet Protocol offers great savings in long-distance calls. But without extensive safeguards, VoIP can expose your phone system to the havoc affecting the rest of the Web. mark for My Articles similar articles
Bank Technology News
December 2005
Glen Fest
Voip Security Threats: Swimming With The Sleeping Sharks? Banks' enthusiasm for installing VoIP shows no signs of waning. Will hackers, spammers, phishers and other criminals soon notice and start to take advantage? mark for My Articles similar articles
Science News
January 19, 2008
Science Safari: Secret Lives of Worms This website offers an up-close glimpse into the weird world of segmented worms. mark for My Articles similar articles
Insurance & Technology
July 19, 2004
Peggy Bresnick Kendler
Victory Over Viruses? Insurers must rely on a combination of tools - such as e-mail filters and firewalls - training and common sense to safeguard their systems and their operations from viruses and worms. mark for My Articles similar articles
CIO
January 1, 2002
Scott Berinato
How to Make a Firewall Sandwich A high-performance security checkpoint to replace a low-performing single point of failure at the border between your network and the Internet. mark for My Articles similar articles
T.H.E. Journal
November 2001
Sharon Ruckman
Computer Parasitology: 8 Proactive Steps for Protection Computer worms pose a great threat to school network systems. Over the next decade they will change the nature of anti-virus software and require paradigm shifts in network infrastructure. Here are eight proactive steps your institution can take for protection... mark for My Articles similar articles
InternetNews
March 16, 2004
Sharon Gaudin
Report: Threats Coming from all Sides A Symantec study shows that the number of software security flaws has leveled off over the past year. That sounds like good news until you find out that it's leveled off at seven new vulnerabilities a day, or 2,636 a year. mark for My Articles similar articles
PC Magazine
August 19, 2003
Sheryl Canter
Effective Immunity Viruses keep spreading, and PCs keep getting infected. What can you do to stay secure? mark for My Articles similar articles
InternetNews
August 23, 2006
Andy Patrizio
AV Vendors Flip Over CU's 'Dummy Viruses' The antivirus community is crying foul over a consumer magazine's tests of their products, which included creating 5,500 dummy viruses to see how well the AV programs handle the unknown. mark for My Articles similar articles
Bank Systems & Technology
July 5, 2004
Peggy Bresnick Kendler
Virus Vigilance A virus can grind a bank's operations to a halt and expose billions of dollars. To really safeguard their systems, banks must implement strict security policies - and communicate them to employees and technology partners. mark for My Articles similar articles
InternetNews
December 23, 2003
Sharon Gaudin
2003 'Worst Year Ever' for Viruses, Worms In no other year have computer viruses and worms wreaked so much havoc and caused so much damage as in this past year, according to security analysts. mark for My Articles similar articles
Inc.
March 2007
What We're Worrying About These days, computer security threats are coming from all directions. Here's what is keeping entrepreneurs up at night, according to a recent survey by the research firm Forrester. mark for My Articles similar articles
Information Today
February 2001
Marshall Breeding
A Prescription for Computer Health We finished the year with little to no damage to our computer systems. Read on to learn more about how to develop a successful strategy for computing in an increasingly dangerous world... mark for My Articles similar articles
BusinessWeek
February 19, 2007
Stephen H. Wildstrom
Mischief-Proofing Your PC Vista comes with only some of the protection you'll need. mark for My Articles similar articles
The Motley Fool
January 14, 2005
Kelvin Taylor
Talking in Style With VoIP VoIP is finally reaching consumers, and several companies are looking to cash in. mark for My Articles similar articles
InternetNews
June 16, 2005
Tim Gray
Browser-Based Attacks on the Rise Browser-based attacks such as pharming and phishing scams are now the fastest-growing security threat on the Internet. mark for My Articles similar articles
T.H.E. Journal
April 2004
Security Leaders Launch Initiative to Combat Emerging Threats An industrywide collaboration led by Cisco Systems Inc. is trying to limit damage from emerging security threats such as viruses and worms. mark for My Articles similar articles