Don't Overlook Network Printer Ports

Rodcay, Gayle
July 2006
Windows IT Pro;Jul2006, Vol. 12 Issue 7, p18
Provides information on the network-monitoring application software ConsoleWorks 3.1 from TECSys Develpment Inc. Security features of the product; Applications of the software.


Related Articles

  • Prehistoric Patching 'Back in Spades.'. Mimoso, Michael S. // Information Security;Jan2006, Vol. 9 Issue 1, p17 

    The article offers advice for security managers on how cope with the lack automated patching in computer software used in data protection. Security managers should establish relationship with their application inventory. Users should demand software vendors of their responsibility to improve...

  • Storming the Application Gates. Schultz, Keith // InfoWorld;3/7/2005, Vol. 27 Issue 10, p10 

    Evaluates the Cenzic Hailstorm 2.0 automated application security assessment tool. Ease of use; Features; Cost.

  • NetIQ Security Manager.  // SC Magazine: For IT Security Professionals (UK Edition);Nov2005, p64 

    Reviews the computer network security application software NetIG Security Manager from NetIQ.

  • C++ - Security = 0. Damore, Kelley // Information Security;Mar2006, Vol. 9 Issue 3, p8 

    Emphasizes the importance of security development in creating an application software for an organization. Setbacks to implementing secure coding in an organization; Factors that lead to the trend of embracing secure coding; Actions that need to be taken if secure coding is to be universally...

  • Kill Really Stubborn Spyware With This Tool. Brandt, Andrew // PCWorld;Jan2005, Vol. 23 Issue 1, p40 

    Reviews the HijackThis anti-spyware application software.

  • Flaws in Eudora. Johnston, Stuart J. // PCWorld;Apr2005, Vol. 23 Issue 4, p47 

    This article reports that QUALCOMM has patched several security holes in Eudora and has released a new version as of April 2005. Security firm Secunia rates these holes as highly critical. All versions of Eudora are vulnerable.

  • Are web applications more defect-prone than desktop applications? Torchiano, Marco; Ricca, Filippo; Marchetto, Alessandro // International Journal on Software Tools for Technology Transfer;Apr2011, Vol. 13 Issue 2, p151 

    lot of effort in the literature has been devoted to define and validate fault taxonomies and models related to different domains, e.g. Service-oriented and Web systems, and properties, e.g. software quality and security. Nevertheless, few attempts were carried out to understand the specific...

  • Security on Fragile and Semi-fragile Watermarks Authentication.  // International Journal of Computer Applications;Jun2010, Vol. 3, p23 

    The article discusses on the security aspects of the fragile and semi-fragile watermarks authentication. It looks into some possible attacks that are farmful on different watermaking techniques. It also suggests the need to generate information security when increasing the amount of digital...

  • PRODUCT PREVIEWS.  // InfoWorld;6/7/2004, Vol. 26 Issue 23, p20 

    The article evaluates computer and application software. XcelleNet's Afria Patch Manager provides information technology administrators with a variety of options for improving the efficiency of their patch management strategies, even when bandwidth is scarce. Administrators can target groups...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics