All in one Laptop security

July 2004
Management Services;Jul2004, Vol. 48 Issue 7, p31
Academic Journal
This article provides information on an integrated security solution from Zone Labs. The system integrates the Zone Labs firewall technology with antivirus technology from Computer Associates. The antivirus technology of Computer Associates has received the VB100 award for the past four consecutive years from Virus Bulletin, one of the foremost antivirus testing authorities worldwide. It protects at the earliest possible opportunity, providing no window of opportunity for malicious programs to communicate. The Message Encryption protects IM from eavesdropping while other IM security features defend personal computer against IM Spam, risks posed by IM vulnerabilities including common attacks like buffer overflows, invalid messages, unsafe scripts, and executable URL. One can also add a personal stealth mode firewall to shield the PC from unauthorized entry, program control to prevent Trojan horses and spyware from stealing users' information via unauthorized communications with the Internet, as well as simple set-up for networks, including wireless networks.


Related Articles

  • 13 ways through a firewall: What you don't know can hurt you. Ginter, Andrew // InTech;Mar/Apr2013, Vol. 60 Issue 2, p44 

    The article discusses the classes of attacks which target firewalls and outlines the measures to prevent the attack. It highlights the importance of considering the firewall deployment any time and identifying firewall vulnerabilities, and evaluating measures and alternatives. It indicates that...

  • Small Package, Big Firewall. Harbaugh, Logan G. // InfoWorld;10/6/2003, Vol. 25 Issue 39, p33 

    Evaluates the SME550 computer firewall system from Snap Gear. Applications for the SME550 system; Price of the SME550 firewall system; Features of the SME550 system. INSET: SnapGear SME550.

  • Practical firewall policy inspection using anomaly detection and its visualization. Kim, Ui-Hyong; Kang, Jung-Min; Lee, Jae-Sung; Kim, Hyong-Shik; Jung, Soon-Young // Multimedia Tools & Applications;Jul2014, Vol. 71 Issue 2, p627 

    Due to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For this reason, it is highly required to have an automatic tool that is real applicable to...

  • Research and Development of an Embedded Security Network Card based on AM 1808. Haohua Qin; Wusheng Hao; Wei Shao // Applied Mechanics & Materials;2014, Issue 532, p235 

    In this paper, a design scheme is proposed of security network card based on AM 1808 for an embedded system. In the card, embedded firewall, network security device, hard-disk protection and restoration, encryption machine and other network security products are integrated. According to...

  • Is patch mgmt. the best protection against vulnerabilities? No. Hofmeyr, Steven // Network World;3/29/2004, Vol. 21 Issue 13, p44 

    Currently, the most widespread means of preventing intrusions is patching, and it's failing miserably. The number of security incidents reported to CERT has grown exponentially over the past six years, reaching an all-time high of 137,529 in 2003,which was also the year that the Blaster and...

  • BENCHMARKS.  // B to B;10/10/2005, Vol. 90 Issue 12, p28 

    This section presents a ranking of products/services related to the marketing industry. The products/services are ranked according to total impressions of ads bought by companies in each segment. Some of the services listed are: web hosting, online advertising, firewalls, Signs & printing,...

  • A Heuristic Process for Local Inconsistency Diagnosis in Firewall Rule Sets. Pozo, S.; Ceballos, R.; Gasca, R. M. // Journal of Networks;Oct2009, Vol. 4 Issue 8, p698 

    Writing and managing firewall ACLs are hard and error-prone tasks for a wide range of reasons. During these tasks, inconsistent rules can be introduced. An inconsistent firewall ACL implies in general a design error, and indicates that the firewall is accepting traffic that should be denied or...

  • CB Tek Chat. Pacheco, Dennis Costa // Caribbean Business;11/9/2006, Vol. 34 Issue 44, p38 

    The article focuses on the significant uses of Internet Protocol (IP) address. An IP address is considered to be a distinctive identification of a specific computer or other device available in a network. The addresses are usually expressed as four numbers separated by periods, each number...

  • ZoneAlarm Pro 4.  // Australian Personal Computer;Jul2004, Vol. 24 Issue 7, p76 

    Firewalls are evolving to provide protection against pop-ups, advertising and cookies as well as restricting the flow of personal information. ZoneAlarm Pro is unusual in that it's suitable for both the paranoid Internet user and the average home user. It provides home users with a solid level...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics