Norwich IT
Articles News Reviews Releases Downloads Contact Us White Papers

Secure Coding

The primary cause of commonly exploited software vulnerabilities is software defects that could have been avoided. Through our analysis of thousands of vulnerability reports, the CERT/CC has observed that most of them stemmed from a relatively small number of root causes.

Configuring a free VPN solution in your home

VPNs or Virtual Private Networks continue to increase in popularity due to the rise of inexpensive, high capacity Internet connectivity. Therefore lots of people are now using secure VPNs in order to connect to their home based networks as well as their office networks. If you have stumbled across this article and do not know the meaning of the term VPN it would be as follows:

What Is Steganography?

Steganography is a subject which is rarely touched upon by most IT Security Enthusiasts. Most people don't see Steganography has a potential threat, some people don't even know what Steganography is. With this FAQ I hope to answer any questions anyone may want to ask about Steganography, and to educate people so they can understand what exactly Steganography is. Is Steganography a potential threat? Well your about to find out.

IT Professionals Express Concerns Over VoIP

48 per cent of networking professionals remain concerned about the general reliability and robustness of Voice over IP (VoIP) for serious business use according to a recent UK survey. 52 per cent of respondents also admitted to concerns about the ability of their network to withstand VoIP traffic. This was despite over 62 per cent of those questioned having implemented the technology, or planning to do so in the next 12 months.

Engineering Firm White Lists Vulnerable Apps

When Patton Harris Rust & Associates found out that Microsoft's Windows MetaFile (WMF) had a security vulnerability that might be exploited for zero-day attacks, PHR&A's IT team quickly removed the offending WMF dynamic link library file from its application whitelist.

Compliance and mobility govern security

The one segment in IT that has seen tremendous growth over the past few years is security. Despite advances in technology, security threats are growing at an alarming rate. The Indian network security market experienced a healthy growth in 2005 reaching about $116 million, up 70 percent compared to last year, says business consulting firm Frost & Sullivan.

Guide to Installing a Cisco PIX 501 Firewall

A firewall acts as a security guard, standing watch over data as it travels in and out of your network. Yet unlike a security guard, it doesn't rely on magic passwords or secret keystrokes to determine whether to accept or deny data.

SMS encryption

Two Czech programmers, Dr. Marian Kechlibar and Jiří Šatánek, have developed SMS007, which is a program that advertises that no third party would be able to read text messages sent with this method.

Ten Remote-Access Failures to Avoid in an Emergency

Remote-access solutions are a critical part of a successful disaster recovery plan, according to industry experts. However, enterprises must make sure a remote-access system is properly deployed and prepared if disaster strikes. In a recent report, Gartner VP distinguished analyst John Girard outlines the most common mistakes enterprises make and provides steps to avoid such failures.

Standards-Based Network Security Tools

These days, when your core main switch starts throwing errors, you can match IPs and MAC addresses from the console of one network tool to another, trace cables in closets, and read switch logs to track down the problem device and its user. Or you can enter the problem IP in your Locate network appliance and go directly to the problem machine and its user to resolve the issue—typically a bad network card or an incorrect network protocol.

Next




Site Meter