Beating back the hackers

Kates, Jim
October 1997
Network World;10/27/97, Vol. 14 Issue 43, p1
Trade Publication
Evaluates five software products that search for security loopholes in computer networks. Approaches taken by each software to find vulnerabilities in the network; Shareware products; Axent's OmniGuard/ESM; internet Scanner; Stalker; Asmodeus.


Related Articles

  • Daemons defy hackers. Surkan, Michael // PC Week;2/5/96, Vol. 13 Issue 5, pN1 

    Compares the TCP/IP-network security auditing tools Internet Scanner 3.2, NetProbe 1.2, Pingware 2.0.1 and SATAN (Security Administrator Tool for Analyzing Networks) 1.1.1. Source porting; Source routing; Connectionless protocols; Firewall vulnerabilities; Internal vulnerabilities. INSETS:...

  • Firewall defense gets more sophisticated. Nelson, Matthew; Fitzloff, Emily // InfoWorld;01/12/98, Vol. 20 Issue 2, p6 

    Describes some of the computer network security software that are slated for rollout at the RSA Data Security Conference in San Francisco, California in January 1998. International Business Machines' (IBM) open beta version of Firewall 3.1 for Windows NT; Version 1.5 of IBM's Global Sign-On...

  • Buyer's guide. Walters, Kevin // PC Week;10/13/97, Vol. 14 Issue 43, p152 

    Presents a chart of network security auditing tools available for October 1997. Network operating systems supported; Means for network security scanning; Alarms for security weakness; Company and product names; Price information and customer support.

  • NEW RADWARE SECURITY PROTECTS NETWORKS FROM HYBRID ATTACKS.  // Networks Update;Jul2010, Vol. 22 Issue 7, p4 

    The article previews the APSolute Attack Prevention security solution from Radware.

  • At a glance.  // CRN;7/10/2006, Issue 1203, p41 

    A graph is presented showing the product quality of network security vendors in the United States.

  • Does scanning for vulnerabilities mean your firewall is safe? Klaus, Chris W.; Ranum, Marcus J. // InfoWorld;7/29/96, Vol. 18 Issue 31, p79 

    Presents the authors' comments on the use of scanners as an appropriate way to test firewalls for security vulnerabilities. Need to understand the policy implemented while setting up a firewall and how to reflect it in a firewall as it is installed; Use of a security assessment tool to test the...

  • Valicert tackles flaw in E-commerce security. Kutler, Jeffrey // American Banker;10/23/1997, Vol. 162 Issue 205, p14 

    Reports on Valicert Inc.'s certificate revocation tree product which aims to correct a flaw in the digital certification process used for Internet commerce security. Support for the product by Netscape Communications Corp., GTE, Entegrity Solutions and Entrust Technologies; Problems with the...

  • Can Digital watermarking protect you? Abes, Cathy // Macworld;Feb1997, Vol. 14 Issue 2, p38 

    Looks at several digital watermarking products. Features and capabilities of PictureMarc from Digimarc, HighWater Signum, and the FBI Pro; Annual fee for MarcCentre; Contact points; Explanation of digital watermarking; Why it is not a panacea.

  • Firewall software makers tap growing market.  // Indianapolis Business Journal;07/10/2000, Vol. 21 Issue 17, p22A 

    Focuses on the benefits of using a software program called firewall in protecting Internet connections. Effect of blocking suspicious programs and probes; Recommendation of a firewall for anyone in a cable modem or digital subscriber line environment; Kinds of personal firewalls and their...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics