Buy linux-fans.com ?

Products related to Secure:


  • Secure Programming Cookbook for C & C++
    Secure Programming Cookbook for C & C++

    Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks.At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk.Clearly, today's developers need help figuring out how to write code that attackers won't be able to exploit.But writing such code is surprisingly difficult. Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code.It contains a wealth of solutions to problems faced by those who care about the security of their applications.It covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.The rich set of code samples provided in the book's more than 200 recipes will help programmers secure the C and C++ programs they write for both Unix(r) (including Linux(r)) and Windows(r) environments. Readers will learn: * How to avoid common programming errors, such as buffer overflows, race conditions, and format string problems * How to properly SSL-enable applications * How to create secure channels for client-server communication without SSL * How to integrate Public Key Infrastructure (PKI) into applications * Best practices for using cryptography properly * Techniques and strategies for properly validating input to programs * How to launch programs securely * How to use file access mechanisms properly * Techniques for protecting applications from reverse engineering The book's web site supplements the book by providing a place to post new recipes, including those written in additional languages like Perl, Java, and Python.Monthly prizes will reward the best recipes submitted by readers. Secure Programming Cookbook for C and C++ is destined to become an essential part of any developer's library, a code companion developers will turn to again and again as they seek to protect their systems from attackers and reduce the risks they face in today's dangerous world.

    Price: 59.99 £ | Shipping*: 0.00 £
  • Introduction to Reliable and Secure Distributed Programming
    Introduction to Reliable and Secure Distributed Programming

    In modern computing a program is usually distributed among several processes.The fundamental challenge when developing reliable and secure distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail.Failures may range from crashes to adversarial attacks by malicious processes. Cachin, Guerraoui, and Rodrigues present an introductory description of fundamental distributed programming abstractions together with algorithms to implement them in distributed systems, where processes are subject to crashes and malicious attacks.The authors follow an incremental approach by first introducing basic abstractions in simple distributed environments, before moving to more sophisticated abstractions and more challenging environments.Each core chapter is devoted to one topic, covering reliable broadcast, shared memory, consensus, and extensions of consensus.For every topic, many exercises and their solutions enhance the understanding This book represents the second edition of "Introduction to Reliable Distributed Programming".Its scope has been extended to include security against malicious actions by non-cooperating processes.This important domain has become widely known under the name "Byzantine fault-tolerance".

    Price: 74.99 £ | Shipping*: 0.00 £
  • Cisco SP RTF LARGE SECURE SERVER FOR
    Cisco SP RTF LARGE SECURE SERVER FOR

    Cisco SP RTF LARGE SECURE SERVER FOR

    Price: 3749.47 £ | Shipping*: 0.00 £
  • Learning eBPF : Programming the Linux Kernel for Enhanced Observability, Networking, and Security
    Learning eBPF : Programming the Linux Kernel for Enhanced Observability, Networking, and Security

    What is eBPF? With this revolutionary technology, you can write custom code that dynamically changes the way the kernel behaves.It's an extraordinary platform for building a whole new generation of security, observability, and networking tools. This practical book is ideal for developers, system administrators, operators, and students who are curious about eBPF and want to know how it works.Author Liz Rice, chief open source officer with cloud native networking and security specialists Isovalent, also provides a foundation for those who want to explore writing eBPF programs themselves. With this book, you will:Learn why eBPF has become so important in the past couple of yearsWrite basic eBPF code, and manipulate eBPF programs and attach them to eventsExplore how eBPF components interact with Linux to dynamically change the operating system's behaviorLearn how tools based on eBPF can instrument applications without changes to the apps or their configurationDiscover how this technology enables new tools for observability, security, and networking

    Price: 44.99 £ | Shipping*: 0.00 £
  • How can one secure a Linux server with Samba?

    Securing a Linux server with Samba involves several steps. Firstly, ensure that Samba is configured to only allow access to authorized users by setting up proper user authentication and access control. Additionally, enable encryption for data transfer by using protocols like SMB3 and configuring Samba to use secure communication channels like VPNs or SSH tunnels. Regularly update both the Linux server and Samba software to patch any security vulnerabilities. Lastly, implement firewall rules to restrict access to the Samba service only to trusted networks or IP addresses.

  • How can you secure a Linux server with Samba?

    To secure a Linux server with Samba, you can start by configuring the Samba server to only allow access to specific users or groups. This can be done by setting up user authentication and access control lists (ACLs) to restrict access to certain directories or files. Additionally, you can enable encryption for data transfer by using the "encrypt passwords = yes" option in the Samba configuration file. It's also important to regularly update the Samba software to ensure that any security vulnerabilities are patched. Finally, you can implement firewall rules to restrict access to the Samba server from specific IP addresses or networks.

  • Is Linux still secure?

    Yes, Linux is still considered to be a secure operating system. It is known for its strong security features, such as user permissions, access controls, and regular security updates. However, no system is completely immune to security threats, and it is important for users to regularly update their Linux systems and follow best security practices to minimize the risk of security breaches. Overall, Linux remains a popular choice for those seeking a secure and stable operating system.

  • Is an ngrok server secure?

    An ngrok server is not inherently secure, as it exposes your local server to the internet and can potentially be accessed by unauthorized users. However, ngrok does offer security features such as password protection and custom subdomains to help secure your server. It is important to use these security features and follow best practices for securing your ngrok server, such as using strong passwords and keeping your server software up to date, to minimize the risk of unauthorized access.

Similar search terms for Secure:


  • Network Programming With Go : Code Secure and Reliable Network Services from Scratch
    Network Programming With Go : Code Secure and Reliable Network Services from Scratch

    In Network Programming with Go readers learn how to leverage Go's concurrency and rich standard library to write robust network programs to create and handle network connections.Difficult concepts are explained with analogies, diagrammes, and examples as readers learn to solve common networking problems and write secure software.For professional developers and experienced Go programmers.

    Price: 47.99 £ | Shipping*: 0.00 £
  • Secure Home
    Secure Home


    Price: 44 € | Shipping*: 0.00 €
  • ESET Secure Authentication
    ESET Secure Authentication

    Optimal protection of your data thanks to mobile-based multi-factor authentication What is multi-factor authentication? Multi-factor authentication (MFA), often referred to as two-factor authentication (2FA), is a strong authentication method that requires users to identify themselves with more than one element. By combining a static password with a dynamic second factor, the risk of data loss is greatly reduced. ESET Secure Authentication (ESA) provides a foundation for organizations to meet compliance requirements and proactively prevent data protection incidents. With ESA, organizations of any size can easily implement MFA for shared systems (Windows logins and servers, Microsoft cloud services such as Microsoft 365 or OWA, SAML, FIDO, ADFS 3.0, VPN and RADIUS-based services). The Solution: ESET Secure Authentication Powerful, easy-to-deploy multi-factor authentication for businesses of all sizes. Companies enjoy the following benefits: Prevention of data protection incidents. Fulfillment of compliance requirements Centralized control via browser Can be operated via cell phone or existing HW tokens Two-factor authentication made easy Authentication is simple: just confirm the code via your cell phone. Works on iOS and Android smartphones and for all platforms and services. Cloud support In addition to protecting local apps, ESET Secure Authentication can also be used to protect web and cloud services such as Microsoft Office 365, Google Apps, Dropbox and many others by integrating the ADFS 3.0 or SAML protocol. Various authentication methods ESET Secure Authentication supports push notifications, one-time password provisioning via the mobile client application, SMS or existing hardware tokens, as well as FIDO-based sticks and custom methods. Sample applications PROBLEM It is not uncommon for employees to use the same passwords for different applications and websites. A high security risk for organizations. SOLUTION Further secure access to corporate resources with two-factor authentication. By using multi-factor authentication, insecure or stolen passwords are no longer a problem. ESET Secure Authentication Feautures Remote Management ESET Secure Authentication uses a specially designed management console accessible through a web browser. You can choose to integrate with Active Directory, but you can also use the solution in environments without Active Directory. Once installed, no additional training or professional services are required to configure and deploy ESET Secure Authentication. Setup in just 10 minutes We designed the solution to be easy to install and deploy, even in small businesses without an internal IT department. Regardless of the size of your business, installing ESET Secure Authentication takes very little time thanks to the ability to configure multiple users at once. No additional hardware required ESET Secure Authentication does not require any additional hardware. Once the 10 MB application is installed on your server, you can start using it immediately. Compatibility with all major smartphones Your employees can continue to use the smartphones they already use. No additional hardware is required for ESET Secure Authentication. We also support hardware keys, but that's optional. Includes SDK and API We provide both an SDK and an API to customize the functionality. This allows organizations to extend ESET Secure Authentication to meet their needs and extend it to their own applications or web services. Push authentication Convenient authentication without entering a one-time password by confirming via push notification. Works on iOS and Android smartphones. With ESET Secure Authentication you protect: VPN access to your company Remote Desktop Protocol (RDP) Additional authentication for desktop logins (logging in to the operating system) Web/cloud services via Microsoft ADFS 3.0, e.g. Office 365 Online Web App (OWA) Microsoft Web Apps VMware Horizon View RADIUS-based services Exchange Control Panel & Exchange Administrator Center Supported VPNs Barracuda Cisco ASA Citrix Access Gateway Citrix NetScaler Check Point Software Cyberoam, F5 FirePass Fortinet FortiGate Juniper Palo Alto SonicWall System Requirements Server: 32-bit and 64-bit versions of Microsoft Windows Server 2003, 2003 R2, 2008, 2008 R2, 2012, 2012 R2, 2016. Client: iOS (iPhone), Android, Windows 10 Mobile. Token support: Although hardware tokens are not required, the solution supports all event-based, OATH-compliant HOTP tokens, as well as FIDO2 and FID...

    Price: 28.20 £ | Shipping*: 0.00 £
  • F-Secure Antivirus
    F-Secure Antivirus

    Product Information "F-Secure Anti-Virus " F-Secure Anti-Virus software builds on more than 30 years of experience in the industry, identifying, quarantining and neutralizing potential threats before they can cause damage to the device. In addition to viruses and Trojans, the antivirus software also takes care of protection against malware and spyware - without putting an unnecessary strain on the Windows PC's resources. The functions of the software at a glance Protection against viruses, malware, spyware and Trojans reliably removes malware that has already spread without leaving any residue optimized to conserve RAM and the PC's processor with regular updates available for 1 PC or up to 3 PCs Comprehensive protection with F-Secure Anti-Virus for your Windows PC Specifically designed for Windows systems, this anti-virus software identifies malicious software before it causes any damage to your system. To do this, it uses a continuously operating virus scanner that detects even modern and particularly complex viruses and Trojans at an early stage, moves them to quarantine and then asks you to take further action. Furthermore, you can check e-mail attachments immediately after receiving them so that you do not accidentally download malware. Advanced protection for your PC against online threats. Advanced malware protection for your PC. You need advanced detection and protection technology to protect your computer against modern and complex threats. F-Secure Anti-Virus provides real-time protection against viruses, spyware, infected e-mail attachments and other malware. Automatic updates and real-time responses ensure the fastest possible protection against all new threats. Fast response: thanks to real-time scanning and automatic updates F-Secure Anti-Virus takes advantage of both real-time scans and regular automatic updates. So, while the antivirus software is working in the background, you do not have to worry about anything else. When an update is available, for example after new threats appear on the Internet, it is automatically downloaded and installed. The software is thus immediately able to respond to new threats in the digital world. If your Windows PC is already (supposedly) infected with malware or malicious software, the software is able to remove both without leaving any residue. Advanced technologies ensure that even well-hidden malware is removed in a bundled fashion, preventing any potential leftovers from spreading further. The software is optimized so that it does not slow down the Windows PC unnecessarily, and therefore works even on outdated systems - Windows 7 with Service Pack 1 is a basic requirement. System Requirements Details Operating System Windows 11, Windows 10 (64-bit) version 21H2 or later macOS 12 (Monterey) or later iOS 16.6 or later Android 10 or later Processor Intel Pentium 4 processor with at least 2 GHz (Windows) RAM 1 GB of RAM (minimum) Graphics Card N/A Sound Card N/A Hard Disk 1.2 GB (on Windows) Screen Minimum screen resolution of 1,024 x 768 pixels Buy smart software: fast & secure at Blitzhandel24 Available for one or three devices, you can download F-Secure Anti-Virus immediately after your purchase at Blitzhandel24 via instant download - so you don't waste time leaving your computer unprotected. Also included is F-Secure's free customer support: If you ever have a concern or question, you can contact the experienced team.

    Price: 14.08 £ | Shipping*: 0.00 £
  • Is the Linux Ubuntu Desktop secure?

    Linux Ubuntu Desktop is generally considered to be secure due to its open-source nature, which allows for constant community scrutiny and updates to address security vulnerabilities. Additionally, Ubuntu has a built-in firewall and security features, such as AppArmor and Secure Boot, to help protect against unauthorized access and malware. However, no operating system is completely immune to security threats, so it is important for users to regularly update their system and use best security practices to ensure the overall security of their Ubuntu Desktop.

  • Is Linux more secure than macOS?

    Both Linux and macOS have strong security features, but it is difficult to definitively say that one is more secure than the other. Linux is known for its robust security features, such as its permission system and the ability to easily customize security settings. On the other hand, macOS benefits from its closed ecosystem and regular security updates from Apple. Ultimately, the security of an operating system depends on various factors, including how it is configured and used, as well as the diligence of the user in keeping it updated and secure.

  • How secure is an FTP server?

    An FTP server is not considered very secure because it transmits data in plain text, making it vulnerable to interception and unauthorized access. Additionally, FTP does not have built-in encryption or strong authentication mechanisms, making it easier for attackers to compromise the server. As a result, it is recommended to use more secure file transfer protocols such as SFTP (SSH File Transfer Protocol) or FTPS (FTP over SSL/TLS) to ensure the security of data during transmission. Additionally, implementing strong access controls, regular security updates, and monitoring can help improve the security of an FTP server.

  • Which distro do you use, Linux users?

    As an AI, I do not have personal preferences or the ability to use operating systems. However, Linux users often choose their distribution based on their specific needs and preferences. Some popular distributions include Ubuntu for its user-friendly interface, Fedora for its focus on the latest technologies, and Debian for its stability and reliability. Ultimately, the choice of distribution depends on the user's requirements and level of expertise.

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.