TITLE

Network intruders

AUTHOR(S)
Messmer, Ellen
PUB. DATE
October 1999
SOURCE
Network World;10/04/99, Vol. 16 Issue 40, p67
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on intrusion-detection software programs, which can be used to prevent unauthorized access to computer networks. Growth of the market for intrusion-detection products; Dominant vendors in the market; Drawbacks to many intrusion-detection products; Availability of intrusion-detection services.
ACCESSION #
2479117

 

Related Articles

  • Security is critical to the success of VPNs. Ptak // Network World;11/30/98, Vol. 15 Issue 48, p40 

    Focuses on the security problems faced by virtual private networks (VPN) as of November 30, 1998. VPN projects' impact on computer network security; Bull's SecurWare VPN security software.

  • Returning fire with ice. Parnell, Tere' // Network World;10/04/99, Vol. 16 Issue 40, p68 

    Evaluates four intrusion-detection software programs. Network ICE's BlackICE and ICEcap; Axent Technologies Inc.'s Intruder Alert; CyberSafe Corp.'s Centrax; Computer Associates International Inc.'s eTrust Intrusion Detection. INSETS: SYN salvo.;Architectures differ.;How we did it..

  • Directories can simplify digital certificates. Lewis, Jamie // PC Week;02/23/98, Vol. 15 Issue 8, p102 

    Discusses the efforts of Netscape Communications Corp. to ease the use of digital certificates in its SuiteSpot server. Integration of key and certificate generation and management with directory-based user administration; Alternative approaches to key distribution and storage; Security...

  • JUST WHAT THE REMOTE MANAGER ORDERED. Kistner, Toni // Network World;05/28/2001, Vol. 18 Issue 22, p30 

    Focuses on the need of network managers for broadband routers with built-in security in the United States. Release of ZoneAlarm Pro Version 2.6 firewall and intrusion-detection software from Linksys; Limitations of the functions on affordable software; Concerns of network managers on technical...

  • The Achilles' heel of remote net mgmt. Connor, Deni // Network World;10/15/2001, Vol. 18 Issue 42, p16 

    Focuses on the ineffeciency of Web-based software to protect the computer networks of organizations. Susceptibility of networks to hacking; List of ways to secure network; Need for organizations to improve network management practices.

  • Windows NT leaks: Two denial-of-service attacks work their way past Service Pack 4. McClure, Stuart; Scambray, Joel // InfoWorld;11/30/98, Vol. 20 Issue 48, p75 

    Identifies two computer network security flaws that are not fixed by the application of Microsoft Windows NT Service Pack 4.0. Vulnerability of the Windows NT Spooler Service to random data being sent to it via the named pipe SPOOLSS; Local Security Authority SubSystem access violation.

  • Modern network complexity needs comprehensive security. Barsanti, Chris // Security: Solutions for Enterprise Security Leaders;Jul99, Vol. 36 Issue 7, p65 

    Focuses on the need of a comprehensive network security in the computer industry in the United States. Sources of network system attacks; Solutions for network security problems; Role of security consultants in providing security services; Integration of firewalls and self-auditing programs in...

  • Web sites are a hacker's heaven. Ward, Mark // New Scientist;01/18/97, Vol. 153 Issue 2065, p4 

    Focuses on the controversy involving the use of the computer program called Security Administrator Tool for Analyzing Networks (SATAN) that automatically scans computer networks to see if they are secure from outside interference. Ability to probe systems electronically for a number of...

  • Reinforcing the Net's worth. Wirthman, Lisa // PC Week;12/16/96, Vol. 13 Issue 50, p45 

    Discusses security data circuit-terminating equipment (DCE) technology. Gradient Technologies Inc.'s WebCrusader 2.0; The Open Group's DCE 1.2.2 with new security features; WebCrusader's support of Java-based application development software; Price; Availability and price of DCE 1.2.2; Company...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics