Recent articles by Jon Tullett

Suspicious Web Services Want YOU!

Suspicious Web Services Want YOU!

The other day, while I was going about my browsing, a pop-under ad stopped by.
Jon Tullett Jan 16 2004 1:02PM Security
Hiding in Plain Sight

Hiding in Plain Sight

Hidden in this column is a secret message.
Jon Tullett Jan 16 2004 12:45PM Security
To Hide or Not to Hide?

To Hide or Not to Hide?

Security through obscurity is always the subject of heated debate, although the relevant parties often wish it wasn’t, since no one likes their dirty laundry being aired in public.
Jon Tullett Jan 16 2004 10:55AM Security
Very Unique Product Will Transform Your Life!

Very Unique Product Will Transform Your Life!

My hype-meter has been jumping in recent weeks, illuminating a rocky road for the security market that will produce some corporate casualties in the near future.
Jon Tullett Jan 16 2004 10:15AM Security
The Art of War

The Art of War

It’s not uncommon to hear wisdom such as “if an attacker has physical access to a PC, you’ve lost the battle,” or, “if a Trojan makes it past the defenses, it’s all over.”
Jon Tullett Jan 16 2004 9:44AM Security
Fighting the Good Fight

Fighting the Good Fight

A couple of weeks ago I had the opportunity to sit in on a class on computer forensics, courtesy of Guidance Software.
Jon Tullett Jan 15 2004 2:07PM Security
Not Every Card Offers Well Wishes

Not Every Card Offers Well Wishes

Internet marketing and viruses have much in common: they are annoying, unwanted, and usually arrive by email.
Jon Tullett Jan 15 2004 12:17PM Security
Guarding the keep: Storage security

Guarding the keep: Storage security

Vital business information should be carefully stored but, Jon Tullett asks, can you be sure it really is locked away safely?
Jon Tullett Jan 13 2004 2:18PM Security
Crying Wolf on Cyberterrorism?

Crying Wolf on Cyberterrorism?

Terrorism (n): the systematic use of violence as a means to intimidate or coerce societies or governments.
Jon Tullett Jan 12 2004 2:35PM Security
Phishers target Bank of England

Phishers target Bank of England

The Bank of England has been targeted by scammers seeking to con users into executing Trojan software.
Jon Tullett Jan 9 2004 12:40PM Security
Sun sets on Cobalt

Sun sets on Cobalt

Sun is quietly discontinuing its Cobalt series of appliance products despite analyst predictions of strong growth in the appliance market in general, and the security appliance market in particular.
Jon Tullett Jan 5 2004 4:33PM Security
Review: eTrust Antivirus

Review: eTrust Antivirus

This software fared well enough in our tests, although some peculiarities raised a few warning signals. It installs easily, with separate AV and Exchange components, and an optional management interface. A reboot is required, after which mail scanning was switched off by default and had to be enabled.

Jon Tullett Jan 1 2004 12:00AM Security
Review: eSafe

Review: eSafe

Aladdin's eSafe did well enough and has some features that would be particularly useful during an outbreak, but performance was nothing special. Although eSafe is up to version 4 now, that version is purely appliance-oriented. The last version to support Exchange was 3.5, which the company still sells and supports (for now) despite its focus on moving away from that side of the business towards its Linux-based appliance version.

Jon Tullett Jan 1 2004 12:00AM Security
Review: Hauri ViRobot

Review: Hauri ViRobot

In last year's anti-virus management group test, Hauri's product impressed us with a slick interface and strong set of features. In this test, first impressions were similar. Configuration was quick and easy and the interface excellent - limited options compared to other products, but ample for most users. No reboot was required and the software demanded confirmation that the empty admin password required was in fact correct.

Jon Tullett Jan 1 2004 12:00AM Security
Review: Kaspersky Anti-Virus

Review: Kaspersky Anti-Virus

Kaspersky has come up trumps with very fast software with some neat features. Queuing the mail was just moments slower than the top runners with 49 minutes, but processing was fastest of the lot at 107, and it nearly tops the efficiency chart too, with 4,055 scanned.

Jon Tullett Jan 1 2004 12:00AM Security
Review: Norman Virus Control

Review: Norman Virus Control

Norman delivered quick and efficient performance, with acceptable, but unexceptional, reporting. Installation required Norman Virus Control to be installed first, for the AV engine. No reboot was required and, if anything, a surprising lack of feedback resulted - the software just quietly went to work with the default server configuration.

Jon Tullett Jan 1 2004 12:00AM Security
Review: Symantec AntiVirus

Review: Symantec AntiVirus

This test was a surprise, with performance and default settings letting Symantec down, although the presentation couldn't be better.

Jon Tullett Jan 1 2004 12:00AM Security
Review: ScanMail for Microsoft Exchange

Review: ScanMail for Microsoft Exchange

Trend Micro offers a product that comes more or less in the middle of the charts throughout this test, doing nothing spectacularly well, but not making any major mistakes either.

Jon Tullett Jan 1 2004 12:00AM Security
Review: CyberGuard SL3200

Review: CyberGuard SL3200

As firewalls go, the CyberGuard SL3200 is a monster: a huge, noisy beast with performance that matches its rugged looks. The name denotes its capacity - 3.2 gigabits of total throughput, shared among a maximum of 26 Ethernet ports. Even more notably, it is able to multiplex several interfaces into a small number of very high-capacity pipes, all secured at wire speed.
Designed for high-demand environments, the box has all the HA features you'd expect - hot-swappable fans and power supplies, as well as RAID 5 storage, with an internal layout designed for maximum airflow and heat dissipation. Fail-over between two boxes is available if you have an extended license.

Jon Tullett Nov 1 2003 12:00AM Security
Review: EnCase Forensic Edition

Review: EnCase Forensic Edition

EnCase from Guid-ance Software has been at the vanguard of forensics software for some time - and with good reason.
Now in version 4.14, the solution is a powerful ­ collection of correlation and analysis tools, designed to make the forensic investigator's job as easy as possible.

Jon Tullett Oct 1 2003 12:00AM Security

Log In

  |  Forgot your password?