TITLE

Spec adds content fuel to firewalls

AUTHOR(S)
Messmer, Ellen
PUB. DATE
October 1998
SOURCE
Network World;10/12/98, Vol. 15 Issue 41, p8
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports on a proposed set of application programming interfaces (API) that will let virus checkers and Web-filtering software run on any gateway or firewall supporting the Common Content Inspection API. Goal, rationale, origins and supporters of the standards.
ACCESSION #
2519816

 

Related Articles

  • Managing malware. Stephenson, Peter // SC Magazine: For IT Security Professionals (15476693);Apr2010, Vol. 21 Issue 4, p35 

    The article presents tips on managing malware. Malware can be addressed using management systems and gateways. Management systems take several approaches. The more traditional approach is the use of antivirus products while the more sophisticated approach involves keeping the bugs off the...

  • WEB SITE SECURITY, DESIGN AND DEVELOPMENT. Colby, Kent L. // Alaska Business Monthly;Sep2007, Vol. 23 Issue 9, p20 

    The article focuses on the risks in companies' operation brought by the spread of malicious Internet softwares. It discusses the responsibilities of web administrator regarding web site security. It also presents common practices used by badly written script and security measures to avoid the...

  • There Are A Lot Of People Who've Had Their Fill Of Bloatware. McLaughlin, Kevin // CRN;Oct2009, Issue 1290, p67 

    The article focuses on the trouble caused by preloaded bloatware, which is said to be a marketing strategy of security vendors to sell their products. It relates the experience of Colin Powell on dealing with bloatware after purchasing a netbook during his term as U.S. Secretary of State under...

  • Towards a Collaborative and Systematic Approach to Alert Verification. Xuejiao Liu; Debao Xiao; Xi Peng // Journal of Software (1796217X);Dec2008, Vol. 3 Issue 9, p77 

    With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for the corporate world. Traditionally, the tools used for network security involve the firewall systems, the intrusion...

  • Microsoft maps future of Windows: Redmond enlists security vendors to automate policy compliance. Messmer, Ellen; Fontana, John // Network World;5/17/2004, Vol. 21 Issue 20, p1 

    Microsoft Corp. is working with antivirus vendors to ensure that in the future its software will be able to verify a user's desktop is secure and updated anti-virus signatures are in place before granting access to corporate resources. With its forthcoming security-policy compliance strategy,...

  • Burning Question. Kuang, Cliff // Wired;Oct2008, Vol. 16 Issue 10, p82 

    The article provides tips related to computer security. An antivirus program paired with anti-spyware or malware will protect computer from any threats. Software like AVG and Ad-Aware are free, and need not to be upgraded. It is suggested not to click mysterious email attachments and never open....

  • Layering it on thick. Gittlen, Sandra // Network World;11/5/2007, Vol. 24 Issue 43, p58 

    The article focuses on the competition between software providers of Web gateways in addressing security risks in the U.S. Web gateways are found to provide network security, but are found to be not enough because not all computer viruses are said to be signature based. Such competition has...

  • Computer network security threats and security technology research. Yankun Zhang // Advanced Materials Research;2014, Vol. 971-973, p1440 

    Network security network system is presented, including hardware, software, and its transmission in the network information security, network security threats mainly include: software vulnerabilities, improper configuration, safety consciousness is not strong, virus, hacker attacks, etc. Is not...

  • Learning Lessons from Code Red. Snyder, Joel // Network World;9/10/2001, Vol. 18 Issue 37, p53 

    Focuses on security issues pertaining to the code red computer virus in the United States. Vulnerability of companies on code red computer virus infection; Issuance of security bulletins against the code red virus by Microsoft Inc.; Suggestions for the prevention of computer system infiltration...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics