Scanners

Scanners | News, how-tos, features, reviews, and videos

Inexpensive scanners can 'fingerprint' paper, researchers say

Think two blank sheets of paper are the same? Look closer.

Xerox makes Uganda comeback with SCI partnership

Bytes Document Solutions, the sole authorized distributor of Xerox products in 24 African countries, has partnered with Service & Computer Industries (SCI) to bring Xerox back to the Ugandan market.

Researchers tout new-fangled network worm weapon

Can Internet worms be thwarted within minutes of their infection? Researchers at Ohio State University say they can and they have the method to prove it. The key, researchers found, is for software to monitor the number of scans that...

WORLDBEAT - Sci-fi on an e-reader? I'll read it ... tomorrow

Dematerialization: The word has always had connotations of science fiction for me.

Bar codes keep surgical leftovers outside body

Scary though of the day: Surgeons leave something – mostly sponges -- inside 1,500 patients each year.  That’s why at least one hospital said this week it would start using surgical sponges with bar codes so the items can be scanned...

The wireless carnival comes to town

Today the sprawling California State Fair opens in Sacramento and Bil Lowry will be watching a key part of it – the carnival midway operation -- through a set of computer screens monitoring a Wi-Fi mesh network.

Digitizing American history

The Library of Congress has been awarded a $2 million grant to digitize thousands of works in the public domain, in a project focusing on at-risk “brittle books” and U.S. history volumes, the library announced Wednesday.

What you need to know about VPN scanners

Software that supports the scanning of computers trying to join VPNs has become a standard part of VPN vendors' offerings.

Managing security weaknesses no easy task

Vulnerability management starts with tools that assess security in network gear and applications, but it's a road that forks, one way leading to host- or agent-based scanners and the other to network-based or agentless scanners.

Beyond the basics of policy-based end point security

Every product we tested offered features that went beyond our baseline tests, and many of these features are worthy of consideration.

Getting a printer for the holidays

HP has two new printer families worth checking out. And since the two I'm testing - the HP LaserJet 3380 and the 9130 - are combo printer/scanner copiers, you can use the color scanners to move some of your paper files onto your hard...

Which comes first, anti-spam or anti-virus?

We used an anti-virus scanner to pre-scan messages for viruses and delete them before passing the message onto the anti-spam scanners we were testing. It raised the question - what is a best practice in the enterprise messaging space?...

Getting a second scanning opinion

If you are in the market for a less expensive secondary scanner, you might want to take a look at SunBelt Network Security Inspector.

Network vulnerability assessment management

Eight network scanning tools offer beefed-up management and remediation.

Finding holes with Nessus

We've heard about a Linux tool for scanning Windows systems for vulnerabilities called Nessus. Is this another scanner like Nmap that just produces text output about open ports, or does it provide more help?

Finding holes with Nessus

We've heard about a Linux tool for scanning Windows systems for vulnerabilities called Nessus. Is this another scanner like Nmap that just produces text output about open ports, or does it provide more help?

PoliVec Suite

Establishing and maintaining security policies across an enterprise network is a necessary hassle. The good news is that PoliVec's suite of security tools - Builder, Scanner, and Enforcer - smoothes out the process.

Load More