Welcome!

Virtualization - Data Storage - Security

Katharine Hadow

Subscribe to Katharine Hadow: eMailAlertsEmail Alerts
Get Katharine Hadow via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Katharine Hadow

Jersey City, NJ, November 18, 2009 - Buying or borrowing software on the Internet carries risks, both for the developer and for the person who plans to use it. End users who install malicious software in their computers may lose their purchase price. Worse, they may risk damaging their computers. Developers risk that someone may intercept their software file and alter it, adding deleterious code. Such alterations could damage their professional reputations. Developers who sell or exchange software can protect their code and their reputations by using code-signing certificates. Code-signing certificates create X.509 data files called “signatures” that developers can attach to their software files. The signature disappears from the software if anyone (including the developer) alters the code. The digital signature functions as tamper-proof packaging for intangible f... (more)

Comodo Security Freeware Is Editor's Choice

Comodo Security Solutions, Inc., is proud to announce that Comodo Internet Security has won the 2009 Techsupportalert.com "Editor's Choice" award for Free Vista 64-bit Software. "This editor's choice award is only given to the best product in its category, so this is an honor," said Rik Mayell, Category Editor at Gizmo's Techsupportalert Comodo Internet Security protects computers online. Its first line of defense is a firewall with Host Intrusion Prevention System, combined with a constantly-updated antivirus database. Comodo offers this powerful protection to all Internet use... (more)

Don't Blame the Browser

Malih Abdulhayoglu, in a column for SecurityFocus.com, urges readers to move away from traditional detection-based software and toward a prevention-based technology. http://www.securityfocus.com/columnists/492 ... (more)

The Economist Reports on Cyber Warfare

"Do cyberattacks count as warfare?" in The Economist's Technology Quarterly (December, 2008) explores confusion surrounding botnet attacks on political entities.  What kind of crime are they, and how should governments react?  Read it now--after December, 2009, access is only for Economist print subscribers. ... (more)

Comodo Internet Security Offers Default-Deny Protection

Comodo Internet Security puts power in the hands of the people with a default deny approach to installing software. The award-winning suite includes both firewall and anti-virus software and is available to Internet users entirely free. Melih Abdulhayoglu, Chief Security Architect and CEO of Comodo said, "Other security software works on a default-allow basis. If you allow software in by default, you admit any software as long as that software is not on a blacklist of known malware." Malware is software that can harm computers or can be used to steal personal information. Comod... (more)