TITLE

All in one Laptop security

PUB. DATE
July 2004
SOURCE
Management Services;Jul2004, Vol. 48 Issue 7, p31
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
This article provides information on an integrated security solution from Zone Labs. The system integrates the Zone Labs firewall technology with antivirus technology from Computer Associates. The antivirus technology of Computer Associates has received the VB100 award for the past four consecutive years from Virus Bulletin, one of the foremost antivirus testing authorities worldwide. It protects at the earliest possible opportunity, providing no window of opportunity for malicious programs to communicate. The Message Encryption protects IM from eavesdropping while other IM security features defend personal computer against IM Spam, risks posed by IM vulnerabilities including common attacks like buffer overflows, invalid messages, unsafe scripts, and executable URL. One can also add a personal stealth mode firewall to shield the PC from unauthorized entry, program control to prevent Trojan horses and spyware from stealing users' information via unauthorized communications with the Internet, as well as simple set-up for networks, including wireless networks.
ACCESSION #
13854498

 

Related Articles

  • 13 ways through a firewall: What you don't know can hurt you. Ginter, Andrew // InTech;Mar/Apr2013, Vol. 60 Issue 2, p44 

    The article discusses the classes of attacks which target firewalls and outlines the measures to prevent the attack. It highlights the importance of considering the firewall deployment any time and identifying firewall vulnerabilities, and evaluating measures and alternatives. It indicates that...

  • Small Package, Big Firewall. Harbaugh, Logan G. // InfoWorld;10/6/2003, Vol. 25 Issue 39, p33 

    Evaluates the SME550 computer firewall system from Snap Gear. Applications for the SME550 system; Price of the SME550 firewall system; Features of the SME550 system. INSET: SnapGear SME550.

  • Practical firewall policy inspection using anomaly detection and its visualization. Kim, Ui-Hyong; Kang, Jung-Min; Lee, Jae-Sung; Kim, Hyong-Shik; Jung, Soon-Young // Multimedia Tools & Applications;Jul2014, Vol. 71 Issue 2, p627 

    Due to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For this reason, it is highly required to have an automatic tool that is real applicable to...

  • Research and Development of an Embedded Security Network Card based on AM 1808. Haohua Qin; Wusheng Hao; Wei Shao // Applied Mechanics & Materials;2014, Issue 532, p235 

    In this paper, a design scheme is proposed of security network card based on AM 1808 for an embedded system. In the card, embedded firewall, network security device, hard-disk protection and restoration, encryption machine and other network security products are integrated. According to...

  • Is patch mgmt. the best protection against vulnerabilities? No. Hofmeyr, Steven // Network World;3/29/2004, Vol. 21 Issue 13, p44 

    Currently, the most widespread means of preventing intrusions is patching, and it's failing miserably. The number of security incidents reported to CERT has grown exponentially over the past six years, reaching an all-time high of 137,529 in 2003,which was also the year that the Blaster and...

  • BENCHMARKS.  // B to B;10/10/2005, Vol. 90 Issue 12, p28 

    This section presents a ranking of products/services related to the marketing industry. The products/services are ranked according to total impressions of ads bought by companies in each segment. Some of the services listed are: web hosting, online advertising, firewalls, Signs & printing,...

  • CB Tek Chat. Pacheco, Dennis Costa // Caribbean Business;11/9/2006, Vol. 34 Issue 44, p38 

    The article focuses on the significant uses of Internet Protocol (IP) address. An IP address is considered to be a distinctive identification of a specific computer or other device available in a network. The addresses are usually expressed as four numbers separated by periods, each number...

  • ZoneAlarm Pro 4.  // Australian Personal Computer;Jul2004, Vol. 24 Issue 7, p76 

    Firewalls are evolving to provide protection against pop-ups, advertising and cookies as well as restricting the flow of personal information. ZoneAlarm Pro is unusual in that it's suitable for both the paranoid Internet user and the average home user. It provides home users with a solid level...

  • NEC tightens control of internal network. Goodwill, Bill // Computer Weekly;2/18/2005, p6 

    This article informs that the National Exhibition Centre (NEC) has installed specialist firewalls to protect its internal networks against viruses and worms after a spate of infections caused by exhibitors failing to secure their own PCs used on display stands. The problem arose because...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics