Scanners
Scanners | News, how-tos, features, reviews, and videos
Inexpensive scanners can 'fingerprint' paper, researchers say
Think two blank sheets of paper are the same? Look closer.
Xerox makes Uganda comeback with SCI partnership
Bytes Document Solutions, the sole authorized distributor of Xerox products in 24 African countries, has partnered with Service & Computer Industries (SCI) to bring Xerox back to the Ugandan market.
Researchers tout new-fangled network worm weapon
Can Internet worms be thwarted within minutes of their infection? Researchers at Ohio State University say they can and they have the method to prove it. The key, researchers found, is for software to monitor the number of scans that...
WORLDBEAT - Sci-fi on an e-reader? I'll read it ... tomorrow
Dematerialization: The word has always had connotations of science fiction for me.
Bar codes keep surgical leftovers outside body
Scary though of the day: Surgeons leave something – mostly sponges -- inside 1,500 patients each year. That’s why at least one hospital said this week it would start using surgical sponges with bar codes so the items can be scanned...
The wireless carnival comes to town
Today the sprawling California State Fair opens in Sacramento and Bil Lowry will be watching a key part of it – the carnival midway operation -- through a set of computer screens monitoring a Wi-Fi mesh network.
Digitizing American history
The Library of Congress has been awarded a $2 million grant to digitize thousands of works in the public domain, in a project focusing on at-risk “brittle books” and U.S. history volumes, the library announced Wednesday.
What you need to know about VPN scanners
Software that supports the scanning of computers trying to join VPNs has become a standard part of VPN vendors' offerings.
Managing security weaknesses no easy task
Vulnerability management starts with tools that assess security in network gear and applications, but it's a road that forks, one way leading to host- or agent-based scanners and the other to network-based or agentless scanners.
Beyond the basics of policy-based end point security
Every product we tested offered features that went beyond our baseline tests, and many of these features are worthy of consideration.
Getting a printer for the holidays
HP has two new printer families worth checking out. And since the two I'm testing - the HP LaserJet 3380 and the 9130 - are combo printer/scanner copiers, you can use the color scanners to move some of your paper files onto your hard...
Which comes first, anti-spam or anti-virus?
We used an anti-virus scanner to pre-scan messages for viruses and delete them before passing the message onto the anti-spam scanners we were testing. It raised the question - what is a best practice in the enterprise messaging space?...
Getting a second scanning opinion
If you are in the market for a less expensive secondary scanner, you might want to take a look at SunBelt Network Security Inspector.
Network vulnerability assessment management
Eight network scanning tools offer beefed-up management and remediation.
Finding holes with Nessus
We've heard about a Linux tool for scanning Windows systems for vulnerabilities called Nessus. Is this another scanner like Nmap that just produces text output about open ports, or does it provide more help?
Finding holes with Nessus
We've heard about a Linux tool for scanning Windows systems for vulnerabilities called Nessus. Is this another scanner like Nmap that just produces text output about open ports, or does it provide more help?
PoliVec Suite
Establishing and maintaining security policies across an enterprise network is a necessary hassle. The good news is that PoliVec's suite of security tools - Builder, Scanner, and Enforcer - smoothes out the process.
-
Video/Webcast
Sponsored -
eBook
Sponsored -
White Paper
-
White Paper
-
eBook
Sponsored