A small business network needs more security and features than a typical consumer router can provide. Here's our take on the six must-have features to look for in a small business router.
A small business network needs more security and features than a typical consumer router can provide. Here's our take on the six must-have features to look for in a small business router.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2011-3648 Cross-site scripting (XSS) vulnerability
4.3
Thunderbird
Solaris 11
11/11 SRU 04
CVE-2011-3650 Denial of Service(DoS) vulnerability
9.3
CVE-2011-3651 Denial of Service(DoS) vulnerability
10.0
CVE-2011-3652 Denial of Service(DoS) vulnerability
10.0
CVE-2011-3654 Denial of Service(DoS) vulnerability
10.0
CVE-2011-3655 Access Control vulnerability
9.3
This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.
I always create web application using PHP but I always distribute and deploy my works to different kinds of server platforms and web server configurations. Thus I always encounter problems in deployment because some features are enabled and others are disabled. And my question, is there a standard web server configuration that is commonly used by most of web servers worldwide? covering the aspects of reliability, security and maintainability?
SQL Server MVP Brian Kelley brings us a great new article that solves a problem that might help your security. In this short piece, we learn how we can use logon triggers to block users based on their IP address.
New! SQL Monitor HostedStart monitoring your SQL Servers in under 5 minutes. Get clear insights into server performance, whilst we manage the monitoring software. Find out more.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2011-4516 Denial of Service (DoS) vulnerability
6.8
Ghostscript
Solaris 10
SPARC: 122259-06 X86: 122260-06
Solaris 11
11/11 SRU 6.6
CVE-2011-4517 Denial of Service (DoS) vulnerability
6.8
This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.
Microsoft launched a limited public beta of a new Windows 7-based desktop PC security and management service....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2012-2111 Permissions, Privileges, and Access Controls vulnerability
6.5
Samba
Solaris 11
11/11 SRU 8.5
Solaris 10
Contact Support
This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.
The default trace is still the best way of getting important information to provide a security audit of SQL Server, since it records such information as logins, changes to users and roles, changes in object permissions, error events and changes to both database settings and schemas. The only trouble is that the information is volatile. Feodor shows how to squirrel the information away to provide reports, check for unauthorised changes and provide forensic evidence.
Security bulletin MS10-036 is designed to fix an "important" vulnerability in Office XP, Office 2003 and Office 2007....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.
Brought to the forefront in 2010 with Stuxnet, the infamous worm aimed at sabotaging industrial infrastructure, the use of stolen digital certificates is relatively new. Stuxnet's creators digitally signed its rootkit components with stolen certificates from JMicron and RealTek, a pair of semiconductor manufacturers. The worm's existence and complexity caught the security community by surprise. In fact, many researchers predicted that malware creators would begin adopting the same technique to work around driver signature enforcement employed by Microsoft in its 64-bit versions of Windows V...
Microsoft reacted this week to a claim that its Virtual PC hypervisor contains a security hole....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2012-0050 Denial of Service (DoS) vulnerability
5.0
OpenSSL
Solaris 11
11/11 SRU 4a
This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2011-3439 Denial of Service (DoS) vulnerability
9.3
FreeType Font Engine
Solaris 11
Contact Support
Solaris 10
SPARC: 119812-14 X86: 119813-16
Solaris 9
Contact Support
This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.
Following a high-profile security breach, search giant Google begins to phase out in-house use of Microsoft Windows operating systems, according to a report.
Security-software vendors say hackers for months have been repeatedly targeting top-tier executives and government officials using the World Cup soccer tournament as a lure.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2011-2524 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability
5.0
libsoup
Solaris 11
11/11 SRU 11.4
This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.
Before creating a data application in Windows Azure, it is important to make choices based on the type of data you have, as well as the security and the business requirements. There are a wide range of options, because Windows Azure has intrinsic data storage, completely separate from SQL Azure, that is highly available and replicated. Your data requirements are likely to dictate the type of data storage options you choose.
Following the security principle of trust no one, I can't use a service like http://www.serfish.com/. Is there a free software program that I can install on my Ubuntu server to give me secure shell access via a web-interface?
I would prefer a small and light-weight solution, so that I can do at least a rudimentary audit of the source code. I would also prefer something that is in the 'main' repository, so that I get the benefit of stable release upgrades.
I just got a new laptop with Windows 8 pre-installed and I'm trying to make a dual boot with Ubuntu on my other hard drive but I can't make the Live USB work. I followed all the procedure for disabling the Security Boot and the UEFI setting but still doesn't work. It seems to start the installing procedure but I never get to choose anything: after a few seconds the screen turns black with an error message [18.707838] divide error: 0000 [#1] SMP (it goes on for several lines quoting some nouveau problem).
Any ideas?
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2012-0698 Denial of Service (DoS) vulnerability
5.0
tcsd
Solaris 11
11/11 SRU 13.4
This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2011-3597 Improper Input Validation vulnerability
7.5
Perl
Solaris 10
SPARC: 146032-04 X86: 146033-04
Solaris 11
Contact Support
This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2011-2728 Denial of Service Vulnerability
4.3
Perl
Solaris 10
SPARC: 146032-03 X86: 146033-03
Solaris 11
11/11 SRU 3
This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2012-3401 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability
6.8
libtiff
Solaris 11
11/11 SRU 12.4
Solaris 10
Contact Support
This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.
Sometimes it may be needed that a user only has access to a certain application. Running the desktop environment then may be unwanted be it either for security reasons or for acchieving a better accessibility to the given application.
In these cases it may be desired to replace the desktop by an application that runs immediately after login.
Other users should have a normal access to their desktops.