Capability Theory by Sound Bytes
Abstraction Mechanisms for Access Control shows how capabilities are ... Mark Miller gives this Security Taxonomy, and his capabilities based language E. ...
http://www.cap-lore.com/CapTheory/index.html
popularity:
security
capabilities
os
research
capability
papers
software
programming
theory
transaction
|
Nessus
Free, open-source vulnerability and remote security scanner.
similarity:
popularity:
security
network
software
tools
scanner
linux
opensource
networking
vulnerability
sysadmin
|
VeriSign - Security (SSL Certificate), Communications, and Information Services
Certificate authority providing public-key infrastructure (PKI) security solutions. Issues digital IDs to enable authenticated, 128-bit SSL encryption that secure e-commerce and online payments across the Internet.
similarity:
popularity:
security
ssl
verisign
internet
certificates
e-commerce
business
web
software
webdesign
|
Main - browsersec - Google Code - Browser Security Handbook landing page
No information avaiable
similarity:
popularity:
security
browser
web
google
reference
webdev
programming
tutorial
webdevelopment
development
|
Protection from Adware, Spam, Viruses, Online Scams | McAfee SiteAdvisor
Plug-in for Internet Explorer and Firefox which helps protect users from web-based security threats like spyware, adware, spam, viruses, phishing, and identity theft.
similarity:
popularity:
security
spyware
tools
internet
software
web
firefox
spam
antivirus
virus
|
Home of Gibson Research Corporation
Publishes the SpinRite hard disk utility and the ChromaZone screen saver construction set. Also offers a tool to test the security of a computer's Internet connection.
similarity:
popularity:
security
software
tools
internet
computer
network
firewall
windows
tech
networking
|
Uninformed
In August 2008 Verizon Wireless released a firmware upgrade for their xv6800 ... In particular, support for accessing the device's built-in Qualcomm gpsOne ...
similarity:
popularity:
security
hacking
programming
magazine
exploits
reverse-engineer
hack
journal
blog
windows
|
TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP, Mac OS X and Linux
Open source on-the-fly disk encryption software for Windows XP/2000 and Linux.
similarity:
popularity:
security
encryption
software
opensource
tools
cryptography
windows
linux
freeware
privacy
|
Home - Web Application Security Consortium
http://projects.webappsec.org/Web-Application-Security-Statistics ... PDF formats: http://projects.webappsec.org/Web-Application-Security-Scanner ...
similarity:
popularity:
security
web
application
webapp
reference
webdev
infosec
hacking
development
programming
|
Information Security Experts, Network Security | SecureWorks
Network security monitoring and response service.
similarity:
popularity:
security
network
infosec
software
news
reference
technology
networking
penetration
malware
|
Darik's Boot and Nuke (Hard Drive Disk Wipe)
Self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, also prevents or thoroughly hinders all known techniques of hard disk forensic analysis.
similarity:
popularity:
security
software
tools
utilities
wipe
utility
erase
linux
sysadmin
computer
|