Search:
Type: Posts; User: kautilya; Keyword(s):
Search:
Search took 0.03 seconds.
-
I read in some presentation that des, 3 des, aes are all acceptable by hipaa but not RSA.
Is it so? Why?
I am looking for the least complex algo that I should use if I were to pass HIPAA...
-
April 24th, 2006, 04:45 AM
I am surprised looking at the speed of most AV scanners. Let us say there is a 1 MB file which may potentially have one or more of 89000 viruses. All their signatures have to be searched in the...
-
April 24th, 2006, 04:42 AM
they say that China's economy is improving, they are also promoting capitalism etc - so what does all that mean? do the people have no control on the government? who are this government anyway? like...
-
why was there a restriction of key strength more than some "48" bits prevented by US to be exported ? is there a nice article that narrates this ?
-
By the way, what is that setting in IE you are referring to ?
-
Thanks a lot for the enlightenment- will use "hackthis" and get the log.
-
i understand that some websites knowingly set some cookies to do tracking and if other websites retrieve those third-party cookies, they may tend to open new pop-up browser instances with...
-
March 26th, 2005, 08:20 PM
Yes and No
In the RSS Feed, we only get a single line text and a link to the original artcie. I am unable to get structured vulnerability information.
Secondly, this is not real time.
-
March 25th, 2005, 08:03 PM
-
March 24th, 2005, 11:05 PM
-
March 24th, 2005, 09:59 PM
I read the below description for man-in-the-middle attack -
"The client (Bob) initiates a connection with the server (Alice). Unknown to both Bob and Alice, an attacker (Eve) is waiting to...
-
March 23rd, 2005, 11:30 PM
I am looking for vulnerability information (such as Bugtraq) linked in the above list. However, I am looking at the following:
I need to develop a small program that will pull data from online...
-
March 23rd, 2005, 08:12 PM
Hi,
I want to know in what format is the vulnerability information available and from which sources. Some consultant advised me of buying a service from TruSecure who send feeds with vulnerability...
-
February 2nd, 2005, 05:30 PM
sure - teros.com netcontinuum.com imperva
-
February 2nd, 2005, 01:19 PM
I am talking about "application firewalls" not "network firewalls"
-
February 2nd, 2005, 12:06 PM
If I were to start a small company and offer services in the GLBA compliance area
what is the approach that I should take ?
What tools do I need ? (Do I need tools ?)
What legal formalities...
-
February 1st, 2005, 06:36 PM
"web application security testing products "
-
February 1st, 2005, 08:38 AM
1. Is there any article/post anywhere that lists different web application security testing products and compare them ?
2. What are the "n" things that a human consultant should do in testing a...
-
January 31st, 2005, 02:46 PM
Thanks
1. Is there any article/post anywhere that lists different web application security testing products and compare them ?
2. What are the "n" things that a human consultant should do in...
-
January 31st, 2005, 01:48 PM
hi,
Is there any opensource tool to test web application security for known vulnerabilities ?
How do they compare to tools like AppScan QA ?
Any information is highly appreciated and am sure...
-
January 28th, 2005, 12:29 PM
Sorry guys, I posted an unordered reply...
I am talking about "application firewalls" not "network firewalls"
-
January 28th, 2005, 11:48 AM
There are tools and then there are services
What is the market composition ?
Anti Virus
Antispam
Firewall Products
-
January 28th, 2005, 08:17 AM
Yes, I do hope and pray that what I said above should indeed become bullshit.
The point here is that "application firewalls" filter most vulnerabilities before they reach the "application".
If...
-
January 27th, 2005, 12:22 PM
In the interest of Security, I believe it to be bullshit and pray god that the following will not turn out to be true:
The introduction of Application Firewalls has eliminated the need for a...
-
January 27th, 2005, 07:04 AM
The introduction of Application Firewalls has eliminated the need for a comprehnsive application security audit.
|
|