NetInfo: Diagnostic and Network Information Utility
NetInfo is a collection of 15 network tools, organized as independent windows, to allow network administrators, webmasters, and internet service providers to isolate faults, process diagnostic data and increase internal network security.Friday, 13 January 2006 08:12 EST
Review: SmartLine DeviceLock
Businesses have spent millions protecting their corporate email and gateway servers from a vast range of security threats such as, malware and identity theft and data loss. But with USB memory, portable storage and media devices, IT professionals take no steps to monitor the usage of these devices, therefore ignoring the threat of internal security breaches at the network end-points.Thursday, 22 December 2005 13:21 EST
Review: SpyWall
Spywall is a Windows-based sandbox and firewall tool designed to protect Internet users from attacks that can be launched through their web browser.Tuesday, 27 September 2005 15:03 EST
Product Insight: Actual Window Manager
When Actual Tools sent me a copy of their Actual Window Manager for Windows, I felt a bit skeptical. Most of the time I work with Windows, I have little respect for eye-candy, transparency effects and beautiful skins.Wednesday, 8 December 2004 11:31 EST
Book Review: High-Tech Crimes Revealed
The title "High-Tech Crimes Revealed" might sound a little too catchy and perhaps attract the wrong crowd, hoping to find the recipes for success in the online crime world.Tuesday, 2 November 2004 13:30 EST
Product Insight: Agnitum Outpost Firewall Pro
Agnitum Outpost Firewall Pro name is a bit deceiving. The term "firewall" to a Windows user implied somewhat limited application capable of monitoring the open ports and reporting on applications engaged in network communications.Wednesday, 27 October 2004 11:36 EST
Know Your Enemy: Learning about Security Threats
Ever wanted to monitor what's going on in the internet by seeing it first hand? Well honeypots enable you to do that. This book is an official release of the HoneyNET Project, the leaders in honeypot technology.Monday, 6 September 2004 13:04 EST
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
After the initial thrill of setting up your own wireless network is gone, you try looking into the ways of making it more secure.Monday, 30 August 2004 13:08 EST
Red Hat Fedora Linux 2
Few people in the industry would ever acknowledge purchasing and reading the “For Dummies” books to expand their knowledge. Red Hat Fedora Linux 2 is a book written specifically with an average user in mind.Wednesday, 18 August 2004 11:01 EST
Defend I.T.: Security by Example
With the recent surge of interest in the IT/IS field, we are seeing many newcomers(myself included). This is resulting in many new books each year. This one is actually one of the more interesting ones I've read lately.Monday, 5 July 2004 11:33 EST
Next