Tampilkan postingan dengan label Secuirty Software. Tampilkan semua postingan
Tampilkan postingan dengan label Secuirty Software. Tampilkan semua postingan

Jumat, 18 Juni 2010

Why Care About Database Security?

Overview

In the introduction, we discussed the reasons why we consider database security to be important. In this chapter, we provide a brief overview of several broad categories of security issues, with a few specific details and some discussion of general defenses. We also briefly discuss how to go about finding security flaws in database systems. Before we do so, we should discuss some emerging trends in database security.

In recent years, with the explosion in web-based commerce and information systems, databases have been drawing ever closer to the network perimeter. This is a necessary consequence of doing business on the Web—you need your customers to have access to your information via your web servers, so your web servers need to have access to your databases. Databases that were previously accessible only via several insulating layers of complex business logic are now directly accessible from the much more fluid—and much less secure—web application environment. The result of this is that the databases are closer to the attackers. With the constant march toward a paperless business environment, database systems are increasingly being used to hold more and more sensitive information, so they present an increasingly valuable target. In recent years, database vendors have been competing with each other to provide the most feature-rich environment they can, with most major systems supporting XML, web services, distributed replication, operating system integration, and a host of other useful features. To cap all of this, the legislative burden in terms of corporate security is increasing, with HIPAA, SOX, GLBA, and California Senate Bill No. 1386 imposing an ever-increasing pressure on companies to ensure that their networks are compliant.

So why care about database security? Because your databases are closer to the attacker, present a more valuable target, have more features to configure, and are more closely regulated than they have ever been before.

source :

The Database Hacker's Handbook: Defending Database Servers
by David Litchfield et al.
John Wiley & Sons © 2005

Selasa, 14 Juli 2009

USB FireWall 1.1.2

DOWNLOAD HERE

Download Now (1.88MB)
Tested spyware free
Features

  • License : Free
  • Editor's Rating : Not rated
  • Average User Rating : 2.5 stars (out of 9 votes) Rate it!
  • Downloads : 46,086
  • Operating Systems : Windows Vista, Windows 95, Windows Me, Windows XP, Windows 2000, Windows NT, Windows 98
  • Additional Requirements : Windows 95/98/Me/NT/2000/XP/2003 Server/Vista
  • Limitations : No limitations
  • Date Added : April 08, 2008


From http://download.cnet.com/windows

DOWNLOAD HERE

ThreatFire AntiVirus Free Edition 4.5

DOWNLOAD HERE

Download Now (7.44MB)
Tested spyware free [Image]
Features

  • License : Free (Buy it now)
  • Editor's Rating : 4.0 stars
  • Average User Rating : 3.0 stars (out of 236 votes) Rate it!
  • Downloads : 1,250,365
  • Operating Systems : Windows 2003, Windows Vista, Windows XP
  • Additional Requirements : No additional requirements
  • Limitations : No limitations

Publisher's description of ThreatFire AntiVirus Free Edition
From PC Tools:

Traditional antivirus solutions cannot protect you until after they've discovered a new threat and produced a signature to counter it. ThreatFire does not rely on signatures, but instead provides behavior-based protection. It is designed to be used alongside your existing antivirus software and it fills the gap in protection between your antivirus signature updates. ThreatFire protects you against major security threats including viruses, worms, trojans, rootkits and even some spyware. Its advanced ActiveDefense technology intelligently analyzes the behavior of processes and programs on a system and immediately halts any malicious action. It continuously monitors all activities on your PC at a very low system level and uses a proprietary combination of analytics, risk algorithms, program histories and tolerance thresholds to identify and shut down threats so you are always protected, no matter how new the threat. ThreatFire is easy to use, instantly effective, and very light on system resources. Best of all, choose between the advanced Pro version or the Free Edition.

Version 4.5 includes on-demand antivirus scanner, new Threat Detection map, System Activity Monitor for viewing detailed process information.

  • Provided by: PC Tools
  • Web site : http://www.pctools.com/
  • Support web site: http://www.pctools.com/support/
  • Support e-mail : support@pctools.com
  • Support phone : 1-800-764-5783



From http://download.cnet.com/windows

DOWNLOAD HERE

Rising Antivirus 2009 Free Edition 21.22.30

DOWNLOAD HERE

Download Now (60.92MB)
Tested spyware free
Features

  • License : Free
  • Editor's Rating : Not rated
  • Average User Rating : 4.0 stars (out of 145 votes) Rate it!
  • Downloads : 385,606
  • Operating Systems : Windows 2003, Windows Vista, Windows 95, Windows Me, Windows 2000, Windows NT, Windows XP, Windows 98
  • Additional Requirements : No additional requirements
  • Limitations : No limitations
  • Date Added : January 30, 2009

Rising Antivirus
Software publisher profile

Rising Technology has been a world leader in Internet security software since 1991. Its security solutions fully protect enterprise and home users from virus, worm, Trojan, spam, hackers and any new kind of threats. Rising Antivirus Software is trusted by more than 40,000,000 users around the world.

  • Provided by : Rising Antivirus
  • Web site : http://www.rising-global.com
  • Support web site : http://support.rising-global.com
  • Support e-mail : Not provided
  • Support phone Not provided


From http://download.cnet.com/windows

DOWNLOAD HERE

PC Tools AntiVirus Free Edition 5

DOWNLOAD HERE

Download Now (21.67MB)
Tested spyware free
Features

  • License : Free (Buy it now)
  • Editor's Rating : 4.0 stars
  • Average User Rating : 3.0 stars (out of 362 votes) Rate it!
  • Downloads : 2,827,709
  • Operating Systems : Windows Vista, Windows XP, Windows 2000
  • Additional Requirements : Windows 2000/XP/Vista
  • Limitations : No limitations
  • Date Added : August 27, 2008

PC Tools
oftware publisher profile

PC Tools is a global leader in innovative software products designed to protect the privacy and security of Windows computer users. PC Tools publishes software and provides technical resources for securing, protecting, and maintaining the Windows operating system. PC Tools products are available right throughout the world, to over 196 countries with offices in the US and Australia as well as a presence in Europe. Products and customer service are offered in multiple languages.


From http://download.cnet.com/windows

DOWNLOAD HERE

Multi Virus Cleaner 2009 9.0.1

DOWNLOAD HERE

Download Now (2.88MB)
Tested spyware free
Features

  • License : Free
  • Editor's Rating : Not rated
  • Average User Rating : 3.0 stars (out of 80 votes) Rate it!
  • Downloads : 420,620
  • Operating Systems : Windows 2003, Windows Vista, Windows 95, Windows Me, Windows Server 2008, Windows 3.x, Windows 2000, Windows NT, Windows 7, Windows XP, Windows 98
  • Additional Requirements : No additional requirements
  • Limitations : No limitations
  • Date Added : April 22, 2009

Publisher's description of Multi Virus Cleaner 2009
Multi Virus Cleaner 2009 screenshot
From AxBx:

Multi Virus Cleaner is a stand-alone utility used to detect and remove major viruses and spyware. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when cleaning infected systems. Multi Virus Cleaner is regularly updated and can detect hundreds of common viruses, worms, Trojans, dialers and spyware (including all variants of the Sober, MyDoom, Nyxem and Bagle viruses). The program offers a scanner that requires minimal processing power for repairing a compromised system. Multi Virus Cleaner detects over 6,400 viruses variants. The new 2009 version also detects and removes major spyware.


From http://download.cnet.com/windows

DOWNLOAD HERE

BitDefender Free Edition 10.0

DOWNLOAD HERE

Download Now (49.06MB)
Tested spyware free
Features

  • License : Free
  • Editor's Rating : Not rated
  • Average User Rating : 3.5 stars (out of 69 votes) Rate it!
  • Downloads : 211,760
  • Operating Systems : Windows Me, Windows NT, Windows 2000, Windows XP, Windows 98
  • Additional Requirements : No additional requirements
  • Limitations : No limitations
  • Date Added : April 20, 2009

SoftWin
Software publisher profile

Founded in 1990, winner of the IST Prize in 2002, SOFTWIN is now considered to be the technological leader of the East-European software industry with annual growth rates of more than 50% in the past five years and 70% of annual turnover from exports. With a team of over 800 qualified professionals, and more than 5000 projects managed so far, SOFTWIN focuses on providing complex software solutions and services which enable fast growing companies to solve critical business challenges and to take advantage of new business opportunities. The SOFTWIN development process is ISO 9001 certified. As it is active on the most advanced IT markets of the US and European Union, SOFTWIN develops on 4 interlinked business lines: eContent Solutions, BitDefender, Business Solutions and Customer Relationship Management. SOFTWIN has branch offices in Germany, Spain and USA.

  • Provided by : SoftWin
  • Web site : http://www.bitdefender.com
  • Support web site : http://kb.bitdefender.com/site/index.html
  • Support e-mail : support@bitdefender.com
  • Support phone : 800 388 8062



From http://download.cnet.com/windows

DOWNLOAD HERE

Avira AntiVir Personal - Free Antivirus 9.0.0.403

DOWNLOAD HERE

Download Now (30.8MB)
Tested spyware free
Features

  • License : Free
  • Editor's Rating : 5.0 stars
  • Average User Rating : 3.5 stars (out of 2497 votes) Rate it!
  • Downloads : 47,461,059
  • Operating Systems : Windows Vista 64-bit, Windows Vista 32-bit, Windows XP, Windows 2000
  • Additional Requirements : No additional requirements
  • Limitations : No limitations
  • Date Added : June 19, 2009


From http://download.cnet.com/windows

DOWNLOAD HERE

AVG Anti-Virus Free Edition 8.5.374

DOWNLOAD HERE

Download Now (63.15MB)
Tested spyware free
Features

  • License : Free
  • Editor's Rating : 5.0 stars
  • Average User Rating : 4.0 stars (out of 18901 votes) Rate it!
  • Downloads : 204,782,083
  • Operating Systems : Windows Vista, Windows 2000, Windows XP
  • Additional Requirements : No additional requirements
  • Limitations : No limitations
  • Date Added : June 17, 2009
AVG Technologies USA
Software publisher profile

Founded in 1991, with corporate offices in Europe and the USA, AVG Technologies (formerly Grisoft) is focused on developing software solutions that provide protection from computer viruses. Distributed globally through resellers and through the internet, the AVG product line supports all major operating systems and platforms. More than 50 million users around the world use AVG products to protect their computers and networks. Employing some of the world's leading experts in antivirus software, specifically in the areas of virus analysis and detection, software development, and antivirus support, AVG Technologies is uniquely positioned to continue its leadership in the industry. AVG Technologies continues to invest in R&D, teaming with leading universities to maintain its technological edge.

  • Provided by : AVG Technologies USA
  • Web site : http://www.avg.com/
  • Support web site : http://www.avg.com/support/
  • Support e-mail : Not provided
  • Support phone : Not provided


From http://download.cnet.com/windows

DOWNLOAD HERE

Avast Home Edition 4.8.1335.90416

DOWNLOAD HERE

Download Now (300.94K)
Tested spyware free
Features

  • License: Free
  • Editor's Rating: 5.0 stars
  • Average User Rating: 4.5 stars (out of 10876 votes) Rate it!
  • Downloads: 51,421,154
  • Operating Systems: Windows Vista, Windows 95, Windows Me, Windows NT, Windows 2000, Windows XP, Windows 7, Windows 98
  • Additional Requirements: No additional requirements
  • Limitations: No limitations
  • Date Added: June 28, 2009

ALWIL Software
software publisher profile

Alwil Software is a Czech-based company, established in April 1991. The company specializes in security software, with Avast antivirus being the flagship product line. During the lifetime of the product line, Avast products have become both award winning and a leader in a number of key markets, as well as increasing market share year-on-year since first international release.

* Provided by: ALWIL Software
* Web site: http://www.avast.com
* Support web site: http://forum.avast.com/
* Support e-mail: support@avast.com
* Support phone: Not provided

From http://download.cnet.com/windows

DOWNLOAD HERE

A-squared Free 4.5.0.1

DOWNLOAD HERE

Software publisher profile

Emsi Software GmbH was founded in Oberndorf, Austria by founder and company headChristian Mairoll in 2003. The security specialist concentrates on behavior-based Malwareblocking in the IT security sector. The behavior analysis module of the main product, asquaredAnti-Malware, monitors all active programs in real-time. To do this, the softwareswitches between operating system and program levels in order to monitor the behavior ofall running programs. If damaging actions are suspected then an alarm is emitted and theMalware can be stopped.

Emsi Software introduced the Mamutu pure Behavior Blocker tothe market in 2007. Whereas a-squared Anti-Malware has "Double real-time protection"and combats pests based on their behavior and using Signatures, "Mamutu" focusessolely on behavior analysis and does not contain a virus scanner.Our goal is to become a leading European supplier of behavior-based technology forcomputer pest defense.

* Provided by: Emsi Software
* Web site:
* http://www.emsisoft.com/
* Support web site:
* http://www.emsisoft.com/en/support/
* Support e-mail:
* cc@emsisoft.com
* Support phone:
* Not provided

A-squared Free 4.5.0.1
Download Now (47.5MB)
Tested spyware free
Features

* License: Free
* Editor's Rating: 4.0 stars
* Average User Rating: 3.5 stars (out of 330 votes) Rate it!
* Downloads: 1,470,148
* Operating Systems: Windows Vista, Windows Server 2008, Windows 7 32-bit, Windows XP
Itanium 64-bit, Windows 7, Windows XP
* Additional Requirements: No additional requirements
* Limitations: No limitations
* Date Added: May 19, 2009


From http://download.cnet.com/windows

DOWNLOAD HERE

AntiVirus Software

Oke, please download any software under here. All Antivirus software is free license but with good performance, and can be secure your system computer, minimalize risk from attacks.

Name / Description

Type

Size

A-squared Free 4.5.0.1

Protect your PC from harmful threats.

Free

47.5 MB

Avast Home Edition 4.8.1335.90416

Protect your PC against the latest viruses and spyware.

Free

300.94 KB

AVG Anti-Virus Free Edition 8.5.374

Protect your computer from viruses and malicious programs.

Free

63.15 MB

Avira AntiVir Personal - Free Antivirus 9.0.0.403

Detect and eliminate viruses, get free protection for home users.

Free

30.8 MB

BitDefender Free Edition 10.0

Detect and remove viruses of all kinds.

Free

49.06 MB

Multi Virus Cleaner 2009 9.0.1

Detect and remove viruses, worms, trojans, dialers, and spyware.

Free

2.88 MB

PC Tools AntiVirus Free Edition 5

Protect your PC against viruses, worms, and trojans with rapid updates and IntelliGuard technology.

Free

21.67 MB

Rising Antivirus 2009 Free Edition 21.22.30

Protect your computer from viruses, trojans, and other malicious programs.

Free

60.92 MB

ThreatFire AntiVirus Free Edition 4.5

Protect your PC against viruses, rootkits, buffer overflows, and malware.

Free

7.44 MB

USB FireWall 1.1.2

Block viruses from a USB device.

Free

1.88 MB

Next

Rabu, 08 Juli 2009

Firewall Software

Name / Description

Type

Size

Defzone SSL 2.13

Establish SSL tunnel(s) towards Defzone Firewalls or OpenVPN endpoints.

Free

7.49 MB

Ipfilter 1

Get a packet filter for TCP/IP.

Free

118.62 KB

MyIdnWebShield 1.3

Protect your computer from all Phishing and Pharming attacks.

Free

1.04 MB

Online Armor Personal Firewall 3.5.0.14

Protect your system from parasites, viruses, and identity theft while surfing the Web.

Free

10.29 MB

PC Tools Firewall Plus 4.0.0.45

Protects computer from intruders.

Free

6.1 MB

Securepoint Personal Firewall & VPN Client 3.6.11

Protect your PC against attacks from the Internet.

Free

1.43 MB

Using Internet Security and Acceleration (ISA) Server 2000 as a Firewall 1

Learn how to design and set ISA Server. Tested spyware free

Free

45.18 MB

WyvernWorks Firewall 2004 5.2

Detect and prevent intrusion from outside as well as internal attacks caused by Trojans.Tested spyware free

Free

2.64 MB

ZoneAlarm 8.0.065

Protect your Internet connection from hackers and other security breaches.

Free

26.48 MB

Comodo Internet Security 3.9.95478.509

Protect your PC from harmful threats. Download Now (72.25MB). Tested spyware free [Image]

Free

72.25 MB

Next

The key to network security: intrusion-prevention systems augment the defenses provided by firewalls and antivirus software

Communications News, Sept, 2005 by Mark Heslop

Today, enterprises should seriously consider integrating intrusion-prevention systems (IPS) as a critical element in existing security infastructure to thwart both internal and external network attacks. One of the most misunderstood threats is the one coming from inside the firewall--the credentialed user. The problem is compounded by mobile users with laptops that unwittingly obtain and release threats contracted from other networks they previously interacted with that are less secure than their own enterprise network.

In addition, there are an increasing number of unauthorized services, users and applications living on networks today. These include instant messaging, peer-to-peer applications, rogue e-mail, FTP and Web servers. Most companies have policies in place that prohibit these kinds of services; however, a lack of visibility increases the difficulty in policing this traffic, so many rogue services live on, and networks remain vulnerable.

For example, popular file- and music-sharing applications may open up ports and allow unauthorized back door access, increasing vulnerability. End-users have no idea they are downloading malicious code hidden inside the music, video or other file type.

Worms such as Sobig and Bagle propagate this way and can cause mass mailings to a user's personal contact list, or others can install applications like IRC bots that run at predesignated times and execute specific instructions to cause harm. For example, Internet relay chat bots can issue timed-distributed denial-of-service attacks (DDoS) on well-known Internet sites.

Today's networked businesses are no longer simple architectures requiring just a firewall and antivirus to protect the perimeter. Extension of the business network through virtual private networks (VPNs) and Web-enabled applications has blurred the distinction between internal and external users.

Most businesses are now highly interconnected, and advances in networking and communication technologies, combined with Web-enabled applications, have reduced the financial barriers or the traditional "cost of connectivity." Inexpensive access has created highly efficient communications with both partners and employees, bringing together the right people with essential data and applications at the optimal time.

The benefits of these connections are obvious; however, they come with little control over the security at these "semi-trusted" networks. Traffic of these external networks should be rigorously monitored.

An offshore contractor, for example, directly linked into your software development group, may not be as vigilant regarding security and may deliver some infected traffic into the network. Having an IPS system in place would analyze and mitigate that traffic before it could inflict any significant havoc.

Various emerging threats should cause concern for any network administrator, and could be combated in part or fully by an effective IPS installation. These include:

* Phishing (including pharming and spear phishing). These information traps require some human intervention; however, the reliance on spam to propagate gives the IPS a chance to contribute to their detection and disarming.

* Mobile malicious code. PDAs and smartphones are increasingly becoming targets for viruses and worms. Most of these devices are unprotected and must be monitored as their use for external network access increases.

* Blended threats. Worms with multiple infection and entry methods that require a combination of strong policies, updated signature files and visibility to stop their lightening-quick movement.

* Industrial system security. Power and gas companies, traditionally siloed networks, are becoming internet-worked and increasingly customer facing, which opens up these vital services to external threats.

Today's IPS products support multiple detection methods (signature, protocol anomaly and behavioral anomaly), as well as addressing a range of performance needs. These systems are effective in protecting against a wide range of threats from both inside and outside the network. The real challenge that an IPS faces is in its ability to:

* monitor and manage an ever-increasing volume of network security data;

  • handle a large volume of threats from multiple IPS devices across large enterprise networks; and
  • validate attacks with aggregation and correlation of information from devices like intrusion-detection systems (IDS), firewalls and vulnerability-assessment devices, including accurate analysis and actionable reporting.

A high-performance, low-cost complementary threat-management solution--tightly integrated with the IPS solution and able to manage a wide range of events in real-time across the enterprise--is what is needed. Additionally, these systems should be able to analyze packet flow reports, anomaly warnings and other security information from IPS devices, and rapidly correlate viruses/worms, hackers, spyware and off-policy user behavior.

IPS solutions should scale to manage the volume of security threats occurring across the network. Functionality that aggregates and correlates large amounts of data in real time across hundreds of distributed IPS units is essential. Future IPS requirements will include the ability to collect and analyze threats and data from other devices, such as firewalls, IDS and vulnerability-assessment tools. Improved reporting functionality, including real-time flow monitoring that captures and analyzes every packet flowing through the network, will also become increasingly critical over time.