Tuesday, November 27, 2007

Free password generators, Part 2

Security Strategies Alert Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Free password generators, Part 2

M. E. Kabay By M. E. Kabay
Last time I asked, "What's a good password?" and discussed a Web-based service for creating random passwords. This time I�m looking at the Bytes Interactive Password Generators. Read full story

M. E. Kabay, PhD, CISSP-ISSMP is Program Director of the Master of Science in Information Assurance and CTO of the School of Graduate Studies at Norwich University in Northfield, Vt. Mich can be reached by e-mail and his Web site.


SPONSORED BY SOPHOS INC.
rule

NAC: Bridging the network security gap
Enterprises must take a robust policy-driven approach to enforcing security compliance in order to protect against network vulnerabilities and meet regulatory requirements. This paper examines technology and initiatives designed to capitalize on existing investments and prevent any gaps in security.

rule
RELATED NEWS:

Microsoft working to close 8-year-old Web proxy vulnerability: Microsoft is working on a fix for an eight-year-old flaw in Windows that lets hackers exploit a Web proxy autoconfiguration protocol and take over groups of machines via a single attack. Microsoft has yet to release the update it has been working on since last week that addresses the vulnerability in the Web Proxy Autodiscovery Protocol (WPAD) in Windows.

Blog: IPv6 more secure? Forget it... : So you heard as well that IPv6 is going to make the Internet more secure? Well, think again... In my opinion IPv6 is going to add a lot of complexity to our networks, and generally security goes DOWN when complexity increases.

Blog: Comparing Microsoft security with open source security: We all must remember that open source isn't perfect, warns Microsoft Subnet blogger Mitchell Ashley, but it still has raised the bar on how to build secure software. What could Microsoft learn from that?

Blog: To use a Windows offline root or not…: Don't count Windows out as an offline root certificate authority because you fear Microsoft's general security reputation, says Microsoft Subnet blogger Tyson Kopczynski.

Blog: How to secure Cisco routers: Michael Behringer, MPLS security expert has advice on how to secure your Cisco routers - make them unreachable and auto-secure them.

FINAL WEEK TO ENTER TO WIN: Free copies of MPLS VPN Security book: Enter to win a free copy of MPLS VPN Security by Michael Behringer and Monique Morrow, published by Cisco Press.


BIG THREATS IN '08
Top 5 security threats in 2008Top 5 security-menace predictions for next year.

ALL-IN-ONE FIREWALL TEST
idemandJuniper, Check Point, Cisco lead way in test of 13 UTM devices.

SPONSORED BY SOPHOS INC.
rule

NAC: Bridging the network security gap
Enterprises must take a robust policy-driven approach to enforcing security compliance in order to protect against network vulnerabilities and meet regulatory requirements. This paper examines technology and initiatives designed to capitalize on existing investments and prevent any gaps in security.

rule

Join Network World's Technology Opinion Panel
Here is your chance to help shape the future of IT. You know what products and enhancements are needed, you have the insight and foresight to be out front and provide direction to Network Word and the network industry. To join the panel, complete a brief registration survey
. The panel is strictly for technology professionals to share their vision.

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

11/27/07

TODAY'S MOST-READ STORIES:

  1. BSA, software giants target little guys
  2. 2007 Cool Yule Tools Gift Guide
  3. Teleworkers called back to cubicle life
  4. '07 Enterprise all-stars
  5. Testing all-in-one firewalls
  6. Security concerns cloud virtualization
  7. Hackers jack Monster.com
  8. Google building 10G Ethernet switches
  9. Cutting-edge spam research projects
  10. Verizon tests 100Gbps network

MOST-READ TEST:
Testing all-in-one firewalls


Executive Guide The Security Treadmill

This Executive Guide offers interviews with leading, real-world security experts who tell you how to get inside users' heads, fight for a bigger security budget, and whether VoIP security issues are overstated or underrated, and much more. Review this informative guide today.

Click Here for More Information



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security Strategies Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments:

Post a Comment