Security Portal: Ask Buffy - Unix security tools, security of named pipes and encrypted stream attack detectionJan 04, 2001, 06:03 (0 Talkback[s])
(Other stories by Buffy)
WEBINAR: On-demand Event
Replace Oracle with the NoSQL Engagement Database: Why and how leading companies are making the switch REGISTER >
"This week's questions are about collecting exploits; Unix security tools; CryptoCard RB-1 token message authentication; removing JS Seeker with Norton AntiVirus 2001; security of named pipes; and encrypted stream attack detection."
"What are your URL suggestions for collecting exploits? We have a test lab and have permission to begin testing our IDS for vulnerabilities...."
"I am compiling a list of cybersecurity Unix tools that are available on the market. Could you point me in the right direction?..."
0 Talkback[s] (click to add your comment)