Keeping PCs Safe on the Internet

PC Security Journal

Subscribe to PC Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get PC Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories

…all this and more in this week’s compendium of open source news!   Two Steps Forward, One Step Back Sounds like a Strauss Waltz? Almost. After 10 years the city of Munich’s love affair with open source may be coming to an end.  Despite saving $16 million by using the custom Linux distribution LiMux, the city is considering switching back to Windows due to user complaints.  Read more about the motives surrounding the discussion at Network World.    Governments on GitHub Governments across the globe have long been dabbling with open source software.  Use of Open Source products like OpenOffice, Linux and Drupal are becoming commonplace. To further this trend, many governments are beginning to open source their own code as illustrated by the 10,000 active government users on GitHub. You could argue that since it is our taxes, then the code should be open.  Read more abo... (more)

Altor VF 2.0 Provides Defense-in-Depth Security to Virtualized Environments

Altor Networks, creator of the first purpose-built virtual firewall, today announced the availability of the Altor VF 2.0 virtual firewall which now provides additional defense-in-depth security to virtualized environments as well as tighter integration with VMware and a new customer-driven advanced reporting module.  "There are considerable security implications of virtualizing a physical environment," said Brett Waldman, IDC Research Analyst. "Security solutions today are trained to monitor traffic between servers, not within one, thus virtual infrastructures can create blind-spots where malicious activity can occur. Traditional hardware appliances and security software are not designed to meet this challenge, so security solutions will need to adapt to this environment. Altor Networks has taken on this problem by providing virtual defense-in-depth as an easily ... (more)

Comodo Enhances EasyVPN with Two-Factor Authentication

Jersey City, NJ, October 06, 2009 - Knowledge workers have nothing to lose but their chains. With a Virtual Private Network (VPN) like Comodo EasyVPN, people working on computer-intensive files are no longer bound to their desks. Files that demand a lot of computation must be processed on large computers with sufficient memory. Typically, these computers sit on desktops and are too bulky to tote. With the latest release of Comodo EasyVPN, knowledge workers can leave their desktop computers behind. Bearing only 3-pound netbooks connected to the Internet, they can still use their desktop computers remotely to best advantage—even from a hemisphere away. Scalable EasyVPN software creates a secure tunnel through the Internet, a private "network-within-the-Internet," allowing two or more PCs to communicate without threat of interception. And with its latest release Eas... (more)

Comodo Issues Ultra-Secure Browser, Comodo Dragon

Comodo has announced its new Internet browser, Comodo Dragon. Like Google Chrome, Comodo Dragon is constructed on the open-source Chromium Project browser. Dragon's enhancements increase security and protect user privacy. Comodo Dragon offers a new feature for Internet users. Websites all have digital certificates attesting to their identities, but some certificates offer more security than others. If Comodo Dragon encounters a Domain-only certificate, it warns the user that the website may not be reliable. Domain-only certificates are available to any webmaster at low cost and with no verification, providing no guarantee of authentication. With Comodo Dragon, information about online exploration stays as much as possible within the user's PC. Comodo Dragon does not transmit information about a browsing session to a remote server. Such a transmission exposes informa... (more)

Choosing a Cloud Strategy? Here's What You Need to Know About IaaS

IaaS Session at Cloud Expo Intel's co-founder, Gordon Moore, famously predicted [PDF file link] way back in 1965 that transistors on a chip will double every 2 years. And so they have ever since (therefore, Moore's Law). With increased processing power, computers are increasingly able to process more data in less time - helping users be more productive. So the cycle has been that every few years, hardware in data centers gets obsolete (even though they are in perfectly good working condition), requiring IT departments to spend capital to refresh their data centers to keep productivity levels high and their companies competitive. Application designs, for their part, have also changed drastically over the past 10 years - with newer technologies built to use that raw processing power. Upgrading applications, therefore, is a routine job these days in all IT environment... (more)

Intercloud: Are You Moving Applications or Architectures?

The former is easy. The latter? Not so much. In the many, many – really, many – posts I’ve penned regarding cloud computing , and in particular the notion of Intercloud, I’ve struggled to come up with a way to simply articulate the problem inherent in current migratory and, for that matter, interoperability models. Recently I found the word I had long been groping for: architecture. Efforts from various working groups, standards bodies and even individual vendors still remain focused on an application; a packaged up application with a sprinkling of meta-data designed to make a migration from data center A to data center B less fraught with potential disaster. But therein lies the continuing problem – it is focused on the application as a discrete entity, with very little consideration for the architecture that enables it, delivers it and supports it. The underlying... (more)

CloudPassage Extends Cloud Infrastructure Security to Large Enterprises

CloudPassage®, the leading cloud infrastructure security provider, Thursday announced the availability of Halo Enterprise, a security-as-a-service solution built specifically for large-scale, heterogeneous cloud infrastructure environments. Halo Enterprise extends CloudPassage's patented Halo cloud security platform to large enterprises with complex security and compliance requirements. Halo currently protects more than 400 production cloud deployments and automates security for more than 10,000 new cloud instances monthly. According to an August 2013 Forrester Research report "Security's Cloud Revolution Is Upon Us" by Ed Ferrara and Andras Cser, "2013 will turn out to be remembered as the year cloud disrupted the information security market. It's clear that cloud architectures (IaaS, PaaS, and SaaS) have already had significant disruptive effects on security techn... (more)

Predictions for VMWorld 2014

Major industry events are a great venue for companies to make announcements and communicate important market and product information. As the 2014 version of VMWorld fast approaches, what might we hear more about? Here are five predictions. NSX customers will be on display Industry chatter since the Nicira acquisition has been focused on NSX adoption (or lack thereof). When VMWare bought Nicira, they knew they were buying a nascent technology that had yet to gain traction. That said, they understood that the underlying technology both solved a current problem and could be applied to different problem spaces over time. But after dropping a cool billion, it is time to start naming customers. Pressure will be even higher after Cisco pointed out more than 580 adopters of its ACI offering (though that number refers to Nexus 9k adoption, not the full APIC vision). Expectat... (more)

Microsoft's Azure a Danger for Storage Vendors?

Yup! Dark days, Chris. All Storage vendors are going to die! Now seriously, lets sit back and think about it. What we may have forgotten, is: Data Center build-up is great, there will be Data Centers that communities will choose. Reasons will be a lot more, a lot local and yet cloud happy data centers, that will be quick to setup, that will be literally agile and that will cost a lot less! So, are IBM, Cisco, Intel, Microsoft all betting too much on one farm? We'll find out pretty soon. We are building up data centers, we still don't know how to get those customers into those data centers. That still needs to happen. A lot of effective evangelism needs to take place. Data Centers for 50 years, huh? Do you know that your data centers will also have a very expensive refresh cycle? How are you going to do that while charging bare minimum, in order to compete with others? ... (more)

Altor Networks at announced today that "Virtualization New Coverage" was initiated for Altor Networks ( Catherine Edwards (,  Director of Corporate Communications at Altor Networks was also named a Ulitzer author. Altor Networks is pioneering a new class of virtual security solutions to secure production-oriented virtualized data centers. The company's initial product line includes the industry's first-ever purpose-built virtual firewall, a software security appliance that runs in a virtualized environment and enforces security policy on a per virtual machine basis. About Initiating news coverage on any topic or launching a magazine at, which is currently in pre-beta, is designed to be as easy as boiling an egg and doesn't take much longer. For details of how to become a Ulitzer user, pl... (more)

10 Tips for Recovering Data After Loss

So, you have just lost your most business critical application or worse yet the entire data center. What do you do? Unfortunately I have experienced these exact situations more than I would like but here are ten tips to get you through and more importantly what not to do. 10 Tips for Data Recovery Don’t panic and remain calm! If there is a disaster event the priority number one of any business continuity plan is to ensure the safety of the employees. Evaluate the disaster! The best business continuity plan is the one that doesn’t have to be implemented and being able to quickly evaluate the level of disaster will be critical in making the decision to implement the procedures or not. Communicate! Make regular communication to your team, managers as well as contact your vendors to help determine your options and recruit assistance if needed. Even if there is no status ... (more)