TITLE

Washing the web

PUB. DATE
December 2004
SOURCE
Management Services;Dec2004, Vol. 48 Issue 12, p30
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
This article provides information on the Webwasher Content Security Management software developed by CyberGuard Corp. Hackers are scheming about how to exploit the announced vulnerability in a number of Microsoft operating systems and applications, including Office and several versions of Internet Explorer. The reported weakness allows malignant JPEG images to enter users' computers undetected via e-mail, web site and instant message downloads, enabling an attacker to gain control of the computer. Webwasher's solution has built-in provisions that defend against new threats from file types that have previously been considered harmless. Rather than spending all day updating patches and scanning for new threats just to keep up, Webwasher relies on a deeper examination of files to prevent malicious viruses and worms from infiltrating networks. Virtual LAN support allows administrators to connect network nodes physically located on different segments of a network and apply the same high degree of network security control to the 'virtual group' treating them the same as if they resided on a single physical network segment. With the availability of an optional 6-port Gigabit Ethernet network interface card, CyberGuard claims it can deliver throughputs similar to competitive products offered at more than twice the price.
ACCESSION #
15688202

 

Related Articles

  • A Model for Performance Enhancement of Steganography through Dynamic Key Cryptography. Singh Sikarwar, Navneet // International Journal of Advanced Networking & Applications;May/Jun2012, Vol. 3 Issue 6, p1395 

    In Today's, Security are a big and challenging issues, for where the information has been transmitted. There are lots of techniques come in existence, but most of them are struggle against hackers and unauthorized users from last many decades. There are two most popular and reliable techniques...

  • CYBERGUARD UNVEILS NEW DESKTOP SECURITY APPLIANCE.  // Computer Security Update;Aug2005, p6 

    The article reports that CyberGuard Corp. has unveiled a new all-in-one, centrally managed desktop security appliance to protect small and mid-sized enterprises against external and internal threats to their network. A robust network security solution that unifies layers of defense and response...

  • Webwasher Fills Gap In Internet Explorer Hole.  // Database & Network Journal;Dec2004, Vol. 34 Issue 6, p23 

    This article explains that CyberGuard Corp.'s Webwasher Content Security Management solution proactively secures networks against common threats from holes in Microsoft Internet Explorer regardless of point of origin.

  • Webwasher 5.1.  // Database & Network Journal;Dec2004, Vol. 34 Issue 6, p25 

    This article reports that CyberGuard has released a new version of its Webwasher Content Management Suite, which proactively filters against adware/spyware at the gateway before it has a chance to get inside.

  • FIREWALLS AS A MEANS TO PROVIDE INTERNET SECURITY. Tejasvit, Kour // International Journal of Engineering & Management Sciences;2013, Vol. 4 Issue 3, p405 

    With the grand scale use of the internet arises the need of its security. Every now and then various threats and viruses are created to disrupt the system. Hacking poses another serious threat to internet as it may lead to mishandling of highly confidential and important data concerning with...

  • Ignorance is Bliss. ROHMEYER, PAUL // Information Security;Mar2010, Vol. 12 Issue 2, p8 

    The article explains why many organizations fail to put together a comprehensive intrusion detection architecture that brings out genuine threats. It states that weak detection capabilities can lead to organizations being victimized by network intruders for lengthy periods. Periodic network...

  • Google hacking. McMillan, Robert // Network World;9/5/2005, Vol. 22 Issue 35, p1 

    This article focuses on the use of Google search engines to break into computer networks and to study security vulnerabilities. This Google hacking movement was started by Johnny Long, who made his living as a penetration tester or a white hat hacker. His johnny.ihackstuff.com Web site is the...

  • Hacking the old-fashioned way. Tanner, John C. // Telecom Asia;Jul2005, Vol. 16 Issue 7, p4 

    Discusses the challenges of computer and network security. Increasing complexity of viruses and worms; Possibilities of propagation from file sharing and spyware; Career criminals hacking for pure profit; Phishing scams; Extortion and blackmailed with denial-of-service attacks; Difficulty of...

  • Threats. Lindenmayer, Isabelle // American Banker;11/4/2005, Vol. 170 Issue 213, p5 

    The article offers news briefs related to computer security. Many companies in China have not yet implemented comprehensive security measures on computer networks and systems. Companies are vulnerable to breaches of computer security due to their lack of an information-security strategy....

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics