• Core Security Technologies acquired Damballa for $US 9 million. In 2017, Core Security merged with SecureAuth. In 2019, HelpSystems acquired the Core...
    12 KB (886 words) - 10:34, 3 June 2024
  • Absolute Home & Office (category Security software)
    Rootkit: Attacks on BIOS anti-theft technologies (PDF). Black Hat USA 2009 (PDF). Boston, MA: Core Security Technologies. Retrieved 2014-06-12. Kamlyuk, Vitaliy;...
    13 KB (1,315 words) - 15:26, 5 July 2024
  • Networks Check Point Chronicle Security Clavister Columbitech Comodo Cybersecurity Core Security Technologies Credant Technologies Critical Start CronLab Crossbeam...
    3 KB (208 words) - 14:44, 19 September 2024
  • Thumbnail for Check Point
    Software Technologies Ltd. is an American-Israeli multinational provider of software and combined hardware and software products for IT security, including...
    14 KB (1,232 words) - 09:06, 31 August 2024
  • Thumbnail for Dell Technologies
    Dell Technologies Inc. is an American multinational technology company headquartered in Round Rock, Texas. It was formed as a result of the September...
    15 KB (1,046 words) - 19:55, 21 September 2024
  • Virtual machine escape (category Computer security exploits)
    2008, a vulnerability (CVE-2008-0923) in VMware discovered by Core Security Technologies made VM escape possible on VMware Workstation 6.0.2 and 5.5.4...
    10 KB (1,046 words) - 15:14, 1 October 2024
  • Rootkit: Attacks on BIOS anti-theft technologies (PDF). Black Hat USA 2009 (PDF). Boston, MA: Core Security Technologies. Retrieved 2014-06-12. Kleissner...
    69 KB (7,095 words) - 13:31, 9 August 2024
  • Protocol. doi:10.17487/RFC5647. RFC 5647. "SSH Insertion Attack". Core Security Technologies. Archived from the original on 2011-07-08. "Vulnerability Note...
    38 KB (4,267 words) - 23:01, 30 September 2024
  • Thumbnail for OpenBSD
    OpenBSD (section Security)
    buffer overflow". Core Security Technologies. 13 March 2007. Brindle, Joshua (30 March 2008), "Secure doesn't mean anything", Security Blog, retrieved 13...
    105 KB (7,301 words) - 05:46, 26 September 2024
  • Metasploit (category Security testing tools)
    comparable commercial products such as Immunity's Canvas or Core Security Technologies' Core Impact, Metasploit can be used to test the vulnerability of computer...
    17 KB (1,566 words) - 01:32, 6 September 2024
  • Thumbnail for Phoenix Technologies
    compatibility, connectivity, security and management of the various components and technologies used in such devices. Phoenix Technologies and IBM developed the...
    20 KB (2,192 words) - 10:20, 29 September 2024
  • Panda Security is a Spanish cybersecurity software company. Panda Security's core offering is antivirus software and other cybersecurity software. This...
    9 KB (794 words) - 06:48, 2 October 2024
  • Thumbnail for BWX Technologies
    BWX Technologies, Inc., headquartered in Lynchburg, Virginia, USA is a supplier of nuclear components and fuel to the U.S. On July 1, 2015, BWX Technologies...
    9 KB (833 words) - 07:49, 10 September 2024
  • Thumbnail for Broadcom
    software development. Broadcom's core technologies and franchise products include networking devices, optical technologies, network interface controllers...
    45 KB (3,930 words) - 06:12, 3 August 2024
  • Teledyne Technologies, Allegheny Technologies, and Water Pik Technologies, were spun off as free-standing public companies. Allegheny Technologies retained...
    25 KB (2,820 words) - 12:56, 16 August 2024
  • Thumbnail for Demon core
    on the core. He was working alone; a security guard, Private Robert J. Hemmerly, was seated at a desk 10 to 12 feet (3 to 4 m) away. The core was placed...
    28 KB (2,570 words) - 21:43, 2 October 2024
  • Thumbnail for L3 Technologies
    Kubasik became chief executive officer and president of L3 Technologies. L3 Technologies was originally named L-3 Communications for the last initials...
    27 KB (2,274 words) - 20:53, 25 September 2024
  • Thumbnail for Intel vPro
    security technologies and methodologies to secure the remote vPro communication channel. These technologies and methodologies also improve security for...
    43 KB (4,373 words) - 16:40, 8 September 2024
  • Thumbnail for 5G
    5G (redirect from Next Generation Core)
    communications technologies were designed in the context of providing voice services and Internet access. Today a new era of innovative tools and technologies is...
    155 KB (14,297 words) - 21:13, 29 September 2024
  • Thumbnail for Fast flux
    Understanding the intricacies of botnet Command-and-Control" (PDF). Core Security Technologies. Archived (PDF) from the original on 26 March 2020. Retrieved...
    15 KB (1,660 words) - 03:59, 17 December 2023
  • Apr 2006 "Core Security Technologies Discovers Critical Vulnerability In Vmware's Desktop Virtualization Software" Core Security Technologies, Feb 2008...
    17 KB (2,108 words) - 02:07, 26 March 2023
  • Thumbnail for BIOS
    BIOS (category CP/M technology)
    Insyde Software, Phoenix Technologies, and Byosoft. Microid Research and Award Software were acquired by Phoenix Technologies in 1998; Phoenix later phased...
    88 KB (9,486 words) - 20:56, 1 October 2024
  • Lumen Technologies, Inc. (formerly CenturyLink) is an American telecommunications company headquartered in Monroe, Louisiana, which offers communications...
    62 KB (5,506 words) - 19:01, 23 September 2024
  • Thumbnail for Juniper Networks
    Juniper Networks (category Technology companies based in the San Francisco Bay Area)
    Juniper entered the IT security market with its own JProtect security toolkit before acquiring security company NetScreen Technologies the following year...
    76 KB (6,992 words) - 06:59, 2 October 2024
  • Thumbnail for Bitcoin Core
    Bitcoin Core is free and open-source software that serves as a bitcoin node (the set of which form the Bitcoin network) and provides a bitcoin wallet which...
    7 KB (684 words) - 17:01, 16 September 2024
  • L3Harris Technologies, Inc. is an American technology company, defense contractor, and information technology services provider that produces command and...
    31 KB (2,392 words) - 13:54, 19 September 2024
  • Thumbnail for List of Intel processors
    million transistors 64 KB of L1 cache per core (32+32 KB 8-way) Intel VT-x, multiple OS support TXT, enhanced security hardware extensions Execute Disable Bit...
    178 KB (13,535 words) - 15:00, 27 September 2024
  • Thumbnail for MIPS Technologies
    Imagination Technologies". Imagination Technologies. Retrieved June 22, 2016. "I-Class I6400 Multiprocessor Core - Imagination Technologies". Imagination...
    46 KB (3,840 words) - 05:36, 14 August 2024
  • Thumbnail for Computer security
    Computer security (also cybersecurity, digital security, or information technology (IT) security) is the protection of computer software, systems and...
    219 KB (22,241 words) - 14:23, 3 October 2024
  • US$4 billion stock for stock in 2004. NetScreen Technologies developed ASIC-based Internet security systems and appliances that delivered high performance...
    7 KB (576 words) - 21:11, 21 July 2024