Смотрите также связанные темы 09.04.2018 Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA Adaptive Security Appliance and Cisco PIX Security Appliances -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA AdaptiveSecurity Appliance and Cisco PIX Security AppliancesAdvisory ID: cisco-sa-20090408-asahttp://www.cisco.com/warp/public/707/cisco-sa-20090408-asa.shtmlRevision 1.0For Public Release 2009 April 08 1600 UTC (GMT)Summary=======Multiple vulnerabilities exist in the Cisco ASA 5500 Series AdaptiveSecurity Appliances and Cisco PIX Security Appliances. This securityadvisory outlines the details of these vulnerabilities: * VPN Authentication Bypass when Account Override F...
25.04.2018 Kerio Technologies’ CEO, Scott Schreiman, Named a Top Influencer in the SMB Space Schreiman has been voted one of the top 150 worldwide SMB IT channel influencers San Jose, Calif. – April 25, 2012 – Over the past several months, hundreds of IT professionals from around the world have been engaged in the SMB 150 Channel Influencers contest. The SMB 150, a collaboration between SMB Nation and SMB Technology Network, is the SMB technology channel's annual list of its 150 most influential members. read more
21.01.2018 Security and HIPER APARs fixed in DB2 for Linux, UNIX, and Windows Version 9.1 Fix Pack 6a Flash (Alert) Abstract Fix Pack 6a for DB2 V9.1 is now available which includes fixes for some serious vulnerabilities. These fixes, where applicable, are also available in Fixpak 3 for DB2 Version 9.5, Fix Pack 6 for DB2 Version 9.1, and FixPak 17 for DB2 Universal Database™ (DB2 UDB) Version 8.1 (also known as FixPak 10 for DB2 UDB Version 8.2), IBM® recommends that you review the vulnerability descriptions and deploy one of the above fix packs to remove the vulnerabilities on your affected DB2 installations. Content A set of secur...
11.05.2018 CVE-2009-1612 Stack-based buffer overflow in the MPS.StormPlayer.1 ActiveX control in mps.dll 3.9.4.27 in Baofeng Storm allows remote attackers to execute arbitrary code via a long argument to the OnBeforeVideoDownload method, as exploited in the wild in April and May 2009. NOTE: some of these details are obtained from third party information. NOTE: it was later reported that 3.09.04.17 and earlier are also affected.
11.10.2018 CVE-2012-5377 Untrusted search path vulnerability in the installation functionality in ActivePerl 5.16.1.1601, when installed in the top-level C: directory, allows local users to gain privileges via a Trojan horse DLL in the C:PerlSitebin directory, which is added to the PATH system environment variable, as demonstrated by a Trojan horse wlbsctrl.dll file used by the "IKE and AuthIP IPsec Keying Modules" system service in Windows Vista SP1, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 Release Preview.
30.04.2018 Kerio Adds Instant Messaging to its Email Server Kerio Connect 8.1 Also Supports Windows 8 Mail SAN JOSE, Calif., April 30, 2012 – Communication is the lifeblood of productivity. With that in mind, Kerio Technologies has added instant messaging capabilities to Kerio Connect 8.1 so colleagues can send IMs, share files and even conduct audio and video conferences via an IM client. IMs are well suited for internal communication within an organization and tend to be more collaborative than email. read more
21.02.2018 Mirek Kren, Vice President of Worldwide Sales at Kerio Technologies, Recognized as one of CRN’s 2012 Channel Chiefs San Jose, CA, February 21, 2012 – Kerio Technologies announced today that for the fourth consecutive year, Mirek Kren has been named one of CRN’s 2012 Channel Chiefs. This prestigious list of the most influential and powerful leaders in the IT channel recognizes those executives directly responsible for driving channel sales and growth within their organization, while evangelizing and defending the importance of the channel throughout the entire IT Industry. read more
03.04.2018 Kerio Technologies Signs Australian Distribution Partnership with Digital Techniques Agreement with National Distributor Makes Kerio’s Award-Winning Security and IP PBX Hardware Available to Channel Partners Sydney, Australia, April 3, 2012 – Kerio Technologies today announced that it has reached a distribution agreement with Digital Techniques, a Sydney-based IT solutions distributor. Under the terms of the agreement, Digital Techniques will promote and distribute the hardware and software appliance editions of Kerio Control, a UTM security appliance, and Kerio Operator, an IP voice system. The hardware versions of these Kerio solutions were previously unavailable in Austra...
09.04.2018 CPU Intel Ivy Bridge будут представлены 23 апреля Компания Intel уже неоднократно переносила дату выпуска процессоров Ivy Bridge. Сначала предполагалось, что изделия поступят в продажу в конце 2011 года, однако этого, как мы знаем, не произошло. Потом, по ряду причин , Intel отсрочила выпуск Ivy Bridge еще на два квартала: до недавнего времени предполагалось , что CPU нового поколения официально увидят свет 29 апреля. Однако сейчас появилась информация о том, что их выпуск (и одновременное появление в продаже) может состояться на неделю раньше запланированного - уже 23 апреля. Вместе с новой датой, источник приводит и стоимость процессоров, ...
14.05.2018 Delivering a safer Internet experience Is any Web site safe? That was the question posed in a recent article I read after it was reported that net criminals are now targeting major well known Web site destinations. In fact, McAfee estimates that 7.8 billion links that lead people to risky Web sites are served up by search engines each month.
It’s becoming more [...]
|
|