A small business network needs more security and features than a typical consumer router can provide. Here's our take on the six must-have features to look for in a small business router.
A small business network needs more security and features than a typical consumer router can provide. Here's our take on the six must-have features to look for in a small business router.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2011-2697 Improper Input Validation vulnerability
6.8
Foomatic
Solaris 11
11/11 SRU 8.5
Solaris 10
Contact Support
Solaris 9
Contact Support
CVE-2011-2964 Improper Control of Generation of Code ('Code Injection') vulnerability
6.8
This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.
SQL Server MVP Brian Kelley brings us a great new article that solves a problem that might help your security. In this short piece, we learn how we can use logon triggers to block users based on their IP address.
New! SQL Monitor HostedStart monitoring your SQL Servers in under 5 minutes. Get clear insights into server performance, whilst we manage the monitoring software. Find out more.
Microsoft says it's working on a patch for a security vulnerability discovered in some 64-bit versions of Windows and Windows Server, but downplays the risk of system takeovers.
Microsoft today issued a new security advisory on a Windows help function flaw....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2014-0191 Denial of Service(DOS) vulnerability
null
Libxml2
Solaris 11.2
11.2.1.5.0
This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.
Security bulletin MS10-036 is designed to fix an "important" vulnerability in Office XP, Office 2003 and Office 2007....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2012-5526 Configuration vulnerability
5.0
Perl
Solaris 10
Patches planned but not yet available
Solaris 11.1
11.1.7.5.0
Solaris 9
Patches planned but not yet available
This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2011-3648 Cross-site scripting (XSS) vulnerability
4.3
Thunderbird
Solaris 11
11/11 SRU 04
CVE-2011-3650 Denial of Service(DoS) vulnerability
9.3
CVE-2011-3651 Denial of Service(DoS) vulnerability
10.0
CVE-2011-3652 Denial of Service(DoS) vulnerability
10.0
CVE-2011-3654 Denial of Service(DoS) vulnerability
10.0
CVE-2011-3655 Access Control vulnerability
9.3
This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.
Security-software vendors say hackers for months have been repeatedly targeting top-tier executives and government officials using the World Cup soccer tournament as a lure.
Following a high-profile security breach, search giant Google begins to phase out in-house use of Microsoft Windows operating systems, according to a report.
I always create web application using PHP but I always distribute and deploy my works to different kinds of server platforms and web server configurations. Thus I always encounter problems in deployment because some features are enabled and others are disabled. And my question, is there a standard web server configuration that is commonly used by most of web servers worldwide? covering the aspects of reliability, security and maintainability?
Microsoft launched a limited public beta of a new Windows 7-based desktop PC security and management service....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.
The default trace is still the best way of getting important information to provide a security audit of SQL Server, since it records such information as logins, changes to users and roles, changes in object permissions, error events and changes to both database settings and schemas. The only trouble is that the information is volatile. Feodor shows how to squirrel the information away to provide reports, check for unauthorised changes and provide forensic evidence.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2011-4516 Denial of Service (DoS) vulnerability
6.8
Ghostscript
Solaris 10
SPARC: 122259-06 X86: 122260-06
Solaris 11
11/11 SRU 6.6
CVE-2011-4517 Denial of Service (DoS) vulnerability
6.8
This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2012-2111 Permissions, Privileges, and Access Controls vulnerability
6.5
Samba
Solaris 11
11/11 SRU 8.5
Solaris 10
Contact Support
This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.
Microsoft reacted this week to a claim that its Virtual PC hypervisor contains a security hole....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2012-0050 Denial of Service (DoS) vulnerability
5.0
OpenSSL
Solaris 11
11/11 SRU 4a
This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2011-3439 Denial of Service (DoS) vulnerability
9.3
FreeType Font Engine
Solaris 11
Contact Support
Solaris 10
SPARC: 119812-14 X86: 119813-16
Solaris 9
Contact Support
This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.
Brought to the forefront in 2010 with Stuxnet, the infamous worm aimed at sabotaging industrial infrastructure, the use of stolen digital certificates is relatively new. Stuxnet's creators digitally signed its rootkit components with stolen certificates from JMicron and RealTek, a pair of semiconductor manufacturers. The worm's existence and complexity caught the security community by surprise. In fact, many researchers predicted that malware creators would begin adopting the same technique to work around driver signature enforcement employed by Microsoft in its 64-bit versions of Windows V...
Before creating a data application in Windows Azure, it is important to make choices based on the type of data you have, as well as the security and the business requirements. There are a wide range of options, because Windows Azure has intrinsic data storage, completely separate from SQL Azure, that is highly available and replicated. Your data requirements are likely to dictate the type of data storage options you choose.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2011-2524 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability
5.0
libsoup
Solaris 11
11/11 SRU 11.4
This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.
Security requires defense in depth. The cleverest intrusion detection system, combined with the best antivirus, won’t help you if a malicious person can gain physical access to your PC or server. A routine job, helping a family member remove a malware infection, brings it home to Wesley just how easy it is to get a command prompt with SYSTEM access on any PC, and inspires him to give a warning about the consequences.
Following the security principle of trust no one, I can't use a service like http://www.serfish.com/. Is there a free software program that I can install on my Ubuntu server to give me secure shell access via a web-interface?
I would prefer a small and light-weight solution, so that I can do at least a rudimentary audit of the source code. I would also prefer something that is in the 'main' repository, so that I get the benefit of stable release upgrades.