SecurityTracker Launches Web Site
SecurityTracker has launched its Web site, devoted to reporting Internet security vulnerabilities.
SecurityTracker.com provides information for technology administrators and managers, with lists and categorization of vulnerability alerts.
Customers can also recieve weekly free alsert summaries, via e-mail, reports the company, based in Silver Springs, Md.
Information: Reader Response no. 274.
PC Security 4.3
PC Security 4.3, from Tropical Software, helps administrators configure locks to manage access to a system (or individual components) using right-click menus in Windows (95 SR2+). Users can restrict access to files, folders, or drives as read-only or totally unavailable.
Limits can be placed on specific windows or functions within programs. Internet connections can be password-protected; downloads restricted by file type.
Information: Reader Response no. 275.
Internet Watcher 2000
Internet Watcher 2000 1.9c, from Bernard D&G, is an Internet filtering application for Windows.
Information: Reader Response no. 276.
Anonymity 4 Proxy
Anonymity 4 Proxy, a Windows program from iNetPrivacy Software Inc., lets individual or networked users travel the Internet anonymously.
The utility redirects requests for Web sites to anonymous public proxy servers located around the world.
The true I.P. address of the user's computer is subsequently hidden from Web sites, including Web-based chat and e-mail sites.
Information: Reader Response no. 277.
Communication Intelligence Corp. has debuted iSign, for the Java platform. It allows electronic signatures for e-commerce applications over the Internet and in corporate Intranets.
It captures handwritten signatures online and binds them to specific transactions while verifying the user's signature based on biometric elements.
Information: Reader Response no. 278.
Allied Software L.L.C. has introduced Login Shield to prevent unauthorized use of computers. Administrators can use the program to manage multiple user accounts.
The software also tracks all attempts to log-in, and security levels can be customized to meet the needs of firms. A "key disk" function prevents accidental lock-outs because of forgotten passwords.
Information: Reader Response no. 279.