Search:

Type: Posts; User: kautilya; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.03 seconds.

  1. Thread: hipaa

    by kautilya
    Replies
    4
    Views
    9,896

    hipaa

    I read in some presentation that des, 3 des, aes are all acceptable by hipaa but not RSA.

    Is it so? Why?

    I am looking for the least complex algo that I should use if I were to pass HIPAA...
  2. Replies
    6
    Views
    11,178

    AV execution speed

    I am surprised looking at the speed of most AV scanners. Let us say there is a 1 MB file which may potentially have one or more of 89000 viruses. All their signatures have to be searched in the...
  3. Replies
    5
    Views
    2,974

    they say that China's economy is improving, they...

    they say that China's economy is improving, they are also promoting capitalism etc - so what does all that mean? do the people have no control on the government? who are this government anyway? like...
  4. Thread: key strength

    by kautilya
    Replies
    1
    Views
    3,380

    key strength

    why was there a restriction of key strength more than some "48" bits prevented by US to be exported ? is there a nice article that narrates this ?
  5. Replies
    4
    Views
    5,984

    By the way, what is that setting in IE you are...

    By the way, what is that setting in IE you are referring to ?
  6. Replies
    4
    Views
    5,984

    Thanks a lot for the enlightenment- will use...

    Thanks a lot for the enlightenment- will use "hackthis" and get the log.
  7. Replies
    4
    Views
    5,984

    how are spywares architected

    i understand that some websites knowingly set some cookies to do tracking and if other websites retrieve those third-party cookies, they may tend to open new pop-up browser instances with...
  8. Replies
    7
    Views
    6,880

    Yes and No In the RSS Feed, we only get a...

    Yes and No

    In the RSS Feed, we only get a single line text and a link to the original artcie. I am unable to get structured vulnerability information.

    Secondly, this is not real time.
  9. Replies
    7
    Views
    6,880

    ??

    ??
  10. Replies
    7
    Views
    6,823

    Thanks. Clear.

    Thanks. Clear.
  11. Replies
    7
    Views
    6,823

    Man-in-the-middle ?

    I read the below description for man-in-the-middle attack -

    "The client (Bob) initiates a connection with the server (Alice). Unknown to both Bob and Alice, an attacker (Eve) is waiting to...
  12. Replies
    7
    Views
    6,880

    I am looking for vulnerability information (such...

    I am looking for vulnerability information (such as Bugtraq) linked in the above list. However, I am looking at the following:

    I need to develop a small program that will pull data from online...
  13. Replies
    7
    Views
    6,880

    vulnerabilities db

    Hi,

    I want to know in what format is the vulnerability information available and from which sources. Some consultant advised me of buying a service from TruSecure who send feeds with vulnerability...
  14. Replies
    19
    Views
    5,007

    sure - teros.com netcontinuum.com imperva

    sure - teros.com netcontinuum.com imperva
  15. Replies
    19
    Views
    5,007

    I am talking about "application firewalls" not...

    I am talking about "application firewalls" not "network firewalls"
  16. Replies
    13
    Views
    10,895

    If I were to start a small company and offer...

    If I were to start a small company and offer services in the GLBA compliance area

    what is the approach that I should take ?

    What tools do I need ? (Do I need tools ?)

    What legal formalities...
  17. Replies
    13
    Views
    10,895

    "web application security testing products "

    "web application security testing products "
  18. Replies
    13
    Views
    10,895

    1. Is there any article/post anywhere that lists...

    1. Is there any article/post anywhere that lists different web application security testing products and compare them ?

    2. What are the "n" things that a human consultant should do in testing a...
  19. Replies
    13
    Views
    10,895

    Thanks 1. Is there any article/post anywhere...

    Thanks

    1. Is there any article/post anywhere that lists different web application security testing products and compare them ?

    2. What are the "n" things that a human consultant should do in...
  20. Replies
    13
    Views
    10,895

    testing tools availability/comparison

    hi,

    Is there any opensource tool to test web application security for known vulnerabilities ?

    How do they compare to tools like AppScan QA ?

    Any information is highly appreciated and am sure...
  21. Replies
    19
    Views
    5,007

    Sorry guys, I posted an unordered reply... I...

    Sorry guys, I posted an unordered reply...

    I am talking about "application firewalls" not "network firewalls"
  22. Replies
    2
    Views
    3,684

    industry composition for security domain

    There are tools and then there are services

    What is the market composition ?

    Anti Virus

    Antispam

    Firewall Products
  23. Replies
    19
    Views
    5,007

    Yes, I do hope and pray that what I said above...

    Yes, I do hope and pray that what I said above should indeed become bullshit.

    The point here is that "application firewalls" filter most vulnerabilities before they reach the "application".

    If...
  24. Replies
    19
    Views
    5,007

    In the interest of Security, I believe it to be...

    In the interest of Security, I believe it to be bullshit and pray god that the following will not turn out to be true:

    The introduction of Application Firewalls has eliminated the need for a...
  25. Replies
    19
    Views
    5,007

    The introduction of Application Firewalls has...

    The introduction of Application Firewalls has eliminated the need for a comprehnsive application security audit.
Results 1 to 25 of 36
Page 1 of 2 1 2