Hacker alert

Messmer, Ellen
September 1999
Network World;09/27/99, Vol. 16 Issue 39, p87
Trade Publication
Focuses on intrusion-detection software as a tool for stopping computer hacking. Main categories; Effectiveness; Major players in the market for intrusion-detection software. INSET: Intrusion detection: A matter of taste..


Related Articles

  • Secure traces hacks. Kerstetter, Jim // PC Week;10/05/98, Vol. 15 Issue 40, p10 

    Looks at Sidewinder Security Server 4.0, a Unix-based firewall from Secure Computing Corp. that can search for the source of hacker attacks and create an audit trail of any searching performed by hackers. Security protocols it supports; Authentication methods; Pricing and availability.

  • Cyberworld Contains Hacker Traps. Payne, Scott // Grand Rapids Business Journal;5/28/2002, Vol. 20 Issue 21, pB1 

    Describes how cybersecurity firms use honey pot, a software device that lures hackers in order to study their activities and monitor how they are able to break into a system. Installation of honey pot within a firewall; Information being provided by the device to computer security administrators.

  • Israel showcases its talent for IT security.  // Computer Weekly;10/27/2009, p11 

    The article presents information on IT security firms of Israel. White Cyber Knight (WCK)'s Lancelot software is developed to help businesses manage risk, governance and compliance. Another company, GED-i, specialises in data encryption. The Haifa-based firm, Sentry Com, has designed software...

  • Text Steganography Using Quantum Approach in Regional Language with Revised SSCE. Banerjee, Indradip; Bhattacharyya, Souvik; Sanyal, Gautam // International Journal of Computer Network & Information Security;Nov2012, Vol. 4 Issue 12, p73 

    In this contribution we present a work of text steganography. Maintain the security of the secret information has been a great challenge in our day to day life. Sender can send messages habitually through a communication channel like Internet, draws the attention of third parties, hackers and...

  • DATA STASH FOUND.  // APC (Bauer Media Group);Apr2009, Vol. 29 Issue 4, p10 

    The article reports that researchers at the Laboratory of Dependable Systems at the University of Mannheim in Mannheim, Germany have found a network of sites called a dropzone which is the digital equivalent of the dead letterbox technique used by spies. Report co-author Thorsten Holz says that...

  • Avoid web site exploits.  // APC (Bauer Media Group);Feb2011, Vol. 31 Issue 2, p92 

    The article offers information regarding the techniques hackers use, and suggests to fight back. It states that the hackers explore, subvert and destroy the website by using basic tools and a logical approach. It also states that the hackers create a detailed profile of the target called a...

  • 2010: A Security Odyssey.  // ComputerWorld Hong Kong;12/1/2007, Vol. 24 Issue 11, p48 

    The article deals with the failure of organizations to focus resources in protecting high-risk digital information. According to the author, companies allot money in network security, but fail to install safeguard against insider abuse, insider threats, social engineering, and paper theft, which...

  • DETERMINA LAUNCHES MEMORY FIREWALL PROTECTION.  // Computer Security Update;Oct2005, p4 

    This article reports that Determina Inc., based in Redwood City, California, has announced that its patent-pending Memory Firewall product is the only proactive security solution available that can stop mass worm attacks. While traditional intrusion prevention systems rely on attack signatures...

  • New cyberwar doctrine: Business shoots back. Schachter, Ken // Long Island Business News (7/1993 to 5/2009);4/16/2004, Vol. 51 Issue 17, p5A 

    Reports on Austin, Texas-based software manufacturer, Symbiot Inc.'s launched of a software suite designed to protect corporate networks from hackers. Except from the company's brief on the "rules of engagement for information warfare"; Denial of service technique used by hackers; Cybersecurity...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics