TITLE

Viruses? -- history

PUB. DATE
April 2003
SOURCE
Management Services;Apr2003, Vol. 47 Issue 4, p26
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
This paper features the Glass Wall computer security system from Avecho for personal computer users. Avecho's Glass Wall system claims to offer 100 percent virus protection. Glass Wall has a means of recognizing the presence of a virus, Trojan or worm in the email and stops it. Signing up for the service on-line is a simple matter of giving Avecho the necessary details to be able to have the Internet Service Provider do the re-routing job. Avecho have launched their first service for stand-alone personal computer users but are working on a solution for corporate networks.
ACCESSION #
11115969

 

Related Articles

  • Snoop doggy lock.  // Australian Personal Computer;Oct2004, Vol. 24 Issue 10, p142 

    This article presents information about USB key. This is wireless medallion and software combo which locks your computer it you move more than two metres away from it. Come back within range and it unlocks. If you leave the medallion at home you can unlock your PC with a password.

  • Client Server Messaging For SMB 3.0.  // Database & Network Journal;Aug2006, Vol. 36 Issue 4, p24 

    The article reports on the results of the independent evaluation for most advantageous small and business (SMB) client security suites by West Coast Labs. The evaluation revealed that Client Server Messaging Security for SMB 3.0 of the Worry-Free Security product of Trend Micro Inc. bagged as...

  • CONFERENCES.  // IT Professional;May/Jun2006, Vol. 8 Issue 3, p50 

    The article presents a list of conferences for the year 2006. The "15th Annual USENIX Security Symposium," which brings together researchers, practitioners, system administrators and other interested in computer systems and network security, will take place in Vancouver, British Columbia from...

  • Microsoft reissues a patch it botched. McMillan, Robert // Network World;8/28/2006, Vol. 23 Issue 33, p16 

    The article reports tat Microsoft Corp. has reissued a critical security update for its Internet Explorer browser in the U.S. The reissued patch is important because it fully resolves a security bug Microsoft introduced with the original update August 8, 2006. Microsoft has released a hot-fix...

  • Worry-Free Security Meets the Needs of Businesses.  // Database & Network Journal;Aug2006, Vol. 36 Issue 4, p17 

    The article reports on the results of the independent evaluation for most advantageous small and business (SMB) client security suites by West Coast Labs. The evaluation revealed that Client Server Messaging Security for SMB 3.0 of the Worry-Free Security product of Trend Micro Inc. bagged as...

  • Intel to take PCs virtual. Spooner, John G.; Hines, Matt // eWeek;5/22/2006, Vol. 23 Issue 21, p25 

    The article focuses on the plan of Intel Corp. to use software to improve computer security. The company is currently contemplating a standard method for adding virtual virtual applications, purpose-built software applications running on top of their own miniature operating systems inside...

  • RECENT RELEASES.  // Information Security;Jan2006, Vol. 9 Issue 1, p56 

    The article presents information on several data protection software. The BreachGate WebDefend from Breach Security provides comprehensive application-specific security against Web-based threats. The NeXpose from Rapid7 builds a vulnerable knowledgebase. Computer Associates offers six Protection...

  • ON THE Line. Skoudis, Ed; Poor, Mike // Information Security;Nov2005, Vol. 8 Issue 11, p32 

    Evaluates five network-based inline intrusion prevention system (IPS) appliances. Intrusion Prevention Sensor 4255 Series from Cisco Systems; Preventia Network Protection Appliance G400 from Internet Security Systems; Defense Pro from Radware; 3D System Intrusion Sensor 3000 from Sourcefire;...

  • Preventing and Detecting High-Level Internet Attack.  // Bank Security Report;Sep2012, Vol. 41 Issue 9, p1 

    The article presents five phases that can be used by financial institution's security team to address high-level Internet attack. These phases are designed to determine what changes need to be made to network and system configurations. They are developed whether new security hardware or software...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics