Hewlett-Packard / The MITRE Corp. / SGI / Network Associates / Computer Internet Security Systems / Symantec / Web / Internet Security Systems / IBM / Symantic / Sun Microsystems / CVE / Cisco Systems / Remote Command Execution Vulnerability Software / Enterasys Networks / Harris Corporation / Gartner Group / Compaq / Microsoft / MSNBC / Newsbytes / /
Currency
CVE / USD / / /
Event
FDA Phase / Second Stock Issuance / Person Communication and Meetings / /
Facility
Institute Network Computing/SANS SecurityFocus X-Force / Babson College / Purdue University / Vulnerability Tower of Babel / Rensselaer Polytechnic Institute / Security Institute / Vulnerability Tower of Babel If / /
IndustryTerm
open source products / advisory services / exposure tools / secure systems / payroll server / accessible systems / e-business technologies / software infrastructure / intrusion detection systems / software errors / consultation services / open source software systems / open source software / software packages / database update services / software product / stand-alone computer systems / software capabilities / outside systems / software customers / software version information / open source software packages / internal systems / software product vulnerabilities / software suppliers / software supplier / software program / large and complex software / notification services / accessed systems / security-relevant software mistake / security coverage / software fixes / software vendors / software products communities / Internet-resident firewalls / software mistakes / weak encryption algorithm / software elements / access software / open source software errors / vulnerability scanning tool / vulnerability services / software product coverage / communications protocols / Alert and advisory services / backroom systems / software delivery sites / software applications / tailored notification services / software environment / mistakes when writing software / prolific and inventive software programmers / Internet-based technologies / software vulnerabilities / security tools / software patch / self-developed software / searching for software vulnerabilities / /
Movie
To Catch a Thief / /
OperatingSystem
Unix / L3 / Windows NT / /
Organization
ACM / Systems Administration / Networking / and Security Institute / AFCEA / NDIA / Rensselaer Polytechnic Institute / An / National Infrastructure Protection Center / Relay Group Systems Administration / IEEE / Federal Bureau of Investigation / Purdue University / Babson College / Purdue University Computer Emergency Response Team Coordination Center / Research in Information and Security / IEEE Computer Society / MITRE’s Information Technologies Directorate / Advisory Bugtraq Center for Education and Research / /
Person
Jordan Hrycaj / Renaud Deraison / Robert A. Martin / /
Position
principal engineer / member / /
Product
CyberCop Scanner / cve / /
ProvinceOrState
Indiana / /
Technology
e-business technologies / communications protocols / CGI / encryption / Internet-based technologies / Unix / operating systems / weak encryption algorithm / http / Web server / /