Attacks that blend techniques to evade detection are slipping past network defences, according to security company Stonesoft.Individual evasion techniques such as packet fragmentation and IP header spoofing are currently detected by network defence tools, Stonesoft chief executive Ilkka Hiidenheimo told ZDNet UK on Monday.
Showing results 1 to 9 of 9
The equipment manufacturer has added collaboration tools using voice, instant messaging, presence and video to IP Office
Cisco has introduced a package of data center tools for carriers wishing to deliver cloud services over next-generation IP networks.
In Network World, Nemertes Research executive vice president and senior founding partner Robin Gareiss provides highlights of a study that quantifies the cost savings of specialty IP telephony management tools for enterprises that are deploying VoIP.
This is an extremely easy-to-use load balancing system with lots of support for HTTP and SSL web-based applications.
A CopyBot tool that replicates in-game assets has some Second Life users in an uproar. But is the best solution to ban such tools or, as with real world copy machines and digital media, let them find their place in the Second Life economy and intellectual property framework? Linden Labs' answer to this question will say much about how its in-world IP system will mirror or perhaps improve on that which exists in the real world.
Not all of my VoIP blogger colleagues get turned on by network IP performance measuring tools. I mean, packet analysis is not the "sexiest" part of the IP phone resolution.
The VoIP testing market isn't exactly the sexiest sector in the IP telephony industry. Without testing tools, though, VoIP service providers would have to build and maintain their offerings via guesswork.
A new group of very sophisticated Internet worms are now on the loose, all with the ability to upgrade themselves via the Internet at any time, and come ominously on the heels of a fresh FBI warning about a new round of denial-of-service attacks. Although their initial payloads are relatively harmless, potential upgrades may include more destructive payloads or tools that target specific IP addresses.