Monthly Archives: October 2004

Is Open Source Really More Secure?

In this article we´ll discuss the claim made by proponents of open source software that such software is more secure. Is open source really inherently more secure than closed source commercial software? If so, why? And if not, why do so many have that perception?

Google vs. Yahoo! – Conquering the mobile market

Just a few weeks after Google introduced Google SMS – Google’s mobile search service, the Sunnyvale, Calif.-based Internet media company Yahoo! expanded its search services to the mobile market, said the company on Wednesday.

Google vs. Yahoo! – Conquering the mobile market

Just a few weeks after Google introduced Google SMS – Google’s mobile search service, the Sunnyvale, Calif.-based Internet media company Yahoo! expanded its search services to the mobile market, said the company on Wednesday.

Java and .NET security

SUN Microsystems Java and Microsoft´s .NET platforms are no more than programming languages that exploit network potential with the idea that the same software should function on different platforms. Both systems are centered around the principle of running software that doesn´t reside on the client machine to provide greater functionality or faster execution, saving connection… Read More »

Product Insight: Agnitum Outpost Firewall Pro

Agnitum Outpost Firewall Pro name is a bit deceiving. The term “firewall” to a Windows user implied somewhat limited application capable of monitoring the open ports and reporting on applications engaged in network communications. If you ever worked with ZoneAlarm, BlackICE or Windows XP Service Pack 2, you probably don´t expect much more out of… Read More »

Securing the (Increasingly) Mobile Client

Enterprise deployments of notebook PCs, tablet PCs, and PDAs continue to grow by leaps and bounds. In fact, researcher Gartner Inc. recently predicted that, by the year 2010, 80 percent of key business processes will involve the exchange of real-time information involving mobile workers.

10 IT Nightmares and How to Avoid Them

Most companies’ IT support departments have a difficult enough time balancing operational and support requirements amidst staff turn-over, holidays, sick-leave, training, etc. Add to that, unforeseen incidents, technical issues and security breaches and you have an instant recipe for pandemonium amongst your critical systems.

Security Appliances and Your Enterprise

Here’s a critical challenge for today’s enterprises: How do you create a trusted and available networking environment in the face of constant Internet threats? For an increasing number of enterprises, adding security appliances to their infrastructure helps them detect new threats earlier and implement effective mitigation strategies before their business is impacted. This article looks… Read More »

How to use passwords securely

Passwords have become, without doubt, users’ ID cards in the Internet. Thanks to passwords, you can prove who you are and unauthorized access can be blocked. However, by the same token, should a malicious user steal or discover this data, they can take on your digital identity.