Computer Security

Computer Security in the United States

Computer Software Security Resources

See Also

Computer Hardware Security

Computer Virus

Cyber Security

Computer hackers; Computer hardware security; Computer forensics; Computer security and computer crime investigation; Computer virus; Document destruction.

Further Reading (Articles)

Computer Software Security, The Gale Encyclopedia of Science; January 1, 2008

Stanford Business School Study Finds Strategies for Getting Users to Adopt Computer Software Security Patches., AScribe Business & Economics News Service; December 13, 2005

USPTO Issues Trademark AUTHENTINET to First Ondemand for Computer Software, Security Services, US Fed News Service, Including US State News; January 9, 2010

COMPUTER SOFTWARE SECURITY FLAWS COULD AFFECT MILLIONS, The Columbian (Vancouver, WA); August 1, 1999; TIM KLASS, Associated Press

Early Computer/Software-Based Security.(Feature), Security Dealer & Integrator; June 1, 2008

California Inventor Develops Computer Software Application Security System, US Fed News Service, Including US State News; September 7, 2007

USPTO Issues Trademark COLLABORATION FRAMEWORK to PlaSec for Computer Software, Hardware for Security Information Management, Instructional Manuals, US Fed News Service, Including US State News; August 18, 2009

Battening the patches; Shavlik Technologies of Roseville has built a niche as one of the nation’s leading testers and managers of computer security software for corporate clients.(BUSINESS INSIDER), Star Tribune (Minneapolis, MN); February 16, 2009; Alexander, Steve

Microsoft Releases Free Computer Security Software, Manila Bulletin; September 30, 2009

A Columbo for Your Computer; Security Software Uses Internet, E-Mail to Track Down a Vanished Laptop, The Washington Post; June 5, 2002

USPTO Issues Trademark STOPSIGN to eAcceleration for Computer Security Software & Computer Services, US Fed News Service, Including US State News; October 6, 2009

Computer security software. (Marketplace)., Security Management; February 1, 2002

Computer security: software patches more vulnerable to hackers.(businessBRIEFS), Financial Executive; March 1, 2005; Marshall, Jeffrey Heffes, Ellen M.

US Patent Issued to Trend Micro on June 24 for “Methods and System for Determining Licensing/billing Fees for Computer Security Software” (Canadian Inventor), US Fed News Service, Including US State News; June 24, 2014

Contract Notice: Air Force Materiel Command Seeks Computer Security Software (California), US Fed News Service, Including US State News; August 4, 2010

Contract Notice: Virginia Local Government and Public Bodies Issues Request for Proposals for Computer Security Software Upgrade, US Fed News Service, Including US State News; October 8, 2011

US Patent Issued to First Trust Portfolios on Jan. 1 for “Methods and Computer Software Applications for Selecting Securities for an Investment Portfolio” (Illinois Inventors), US Fed News Service, Including US State News; January 7, 2013

US Patent Issued to First Trust Portfolios on July 26 for “Methods and Computer Software Applications for Selecting Securities for an Investment Portfolio” (Illinois Inventors), US Fed News Service, Including US State News; July 27, 2011

United Kingdom Intellectual Property Office Publishes Application for Series of Two Trademark AssetMonitorAIS, AssetMonitorAIS to Infoterra for Computer Software, Technological Services, Security Services, US Fed News Service, Including US State News; January 23, 2010

California Computer Security Software Maker Symantec Reports Soaring Profit., Knight Ridder/Tribune Business News; April 29, 2004

Computer Hardware Security Resources

See Also

Computer Keystroke Recorder

Cyber Security

Computer hackers; Computer keystroke recorder; Computer software security.

Further Reading (Articles)

Computer Hardware Security, The Gale Encyclopedia of Science; January 1, 2008

Patent Issued for Laptop Computer with Hardware Security Protection, Computer Weekly News; August 30, 2012

USPTO Issues Trademark COLLABORATION FRAMEWORK to PlaSec for Computer Software, Hardware for Security Information Management, Instructional Manuals, US Fed News Service, Including US State News; August 18, 2009

US Patent Issued to Microsoft on Sept. 27 for “Systems and Methods for Updating a Secure Boot Process on a Computer with a Hardware Security Module” (Washington Inventors), US Fed News Service, Including US State News; October 3, 2011

CSIS Calls For End Of Outdated Export Controls For Computer Hardware.(Center for Security and International Studies)(Brief Article), Defense Daily; June 12, 2001

CSIS Calls For End Of Outdated Export Controls For Computer Hardware.(Center for Security and International Studies (CSIS)(Brief Article), Defense Daily International; June 15, 2001

Computer security hardware. (Marketplace).(SpearHead Security Technologies)(Brief Article)(Product Announcement), Security Management; November 1, 2001

Hardware-based computer security techniques to defeat hackers; from biometrics to quantum cryptography.(Brief article)(Book review), SciTech Book News; March 1, 2009

Integrity of hardware-based computer security is challenged; Withdrawn Black Hat paper hints at flaws in TPM security architecture.(Black Hat USA 2007, trusted platform module), Network World; June 27, 2007; Greene, Tim

Enova unveils new hardware-based computer storage security solutions., Worldwide Computer Products News; April 23, 2009

USPTO Issues Trademark SATEON to Newmark Security for Computer Hardware, Software for Use in Recording, Managing Employee Time, Attendance Data, US Fed News Service, Including US State News; October 28, 2009

Washington University in St. Louis Science and Technology Tips: Dinosaurs, Credit Card Security, Computer Hardware, Vitamin-Packed Plants., Ascribe Higher Education News Service; October 3, 2002

Security First.(military computer hardware and software management), NextGov.com; June 8, 2009; Paller, Alan

Olympic Games security provided by sophisticated computer hardware, software., Software Industry Report; February 21, 1994

United Kingdom Intellectual Property Office Publishes Application for Series of Two Trademarks “SSG Sunwin Services Group, SSG Sunwin Services Group” to Co-operative Group for Computer Hardware Installation, Maintenance, Repair, Transport, Security Services, US Fed News Service, Including US State News; April 20, 2010

USPTO Issues Trademark CE RISK, SAFETY & SECURITY to Cleanevent Technology for Computer Hardware, Security Services, US Fed News Service, Including US State News; December 11, 2009

USPTO Issues Trademark GATEMASTER to U.S. Security Associates Holdings for Computer Hardware, Software, US Fed News Service, Including US State News; December 14, 2009

Security Vulnerability Analysis.(Computer Hardware & Software)(SVA-Pro software)(Brief Article), Plastics Engineering; February 1, 2004; Molinaro, Hope

Contract Notice: Department of Homeland Security (District Of Columbia) Issues Solicitation for Computer Hardware, US Fed News Service, Including US State News; September 27, 2011

Patent Issued for Method, Hardware Product, and Computer Program Product for Optimizing Security in the Context of Credential Transformation Services, Journal of Engineering; October 31, 2012

Computer Keystroke Recorder Resources

See Also

Computer hackers; Computer hardware security; Computer software security.

Classified Information

Computer Hardware Security

Further Reading (Articles)

Computer Keystroke Recorder, The Gale Encyclopedia of Science; January 1, 2008

Locate lost text with Last Resort. (Working Software Inc.’s keystroke recorder utility program) (S
oftware Review) (Reviews: PC) (Evaluation), Computer Shopper; August 1, 1992; Cohen, Andrew

Dad deciphers son’s secret with keystroke recording, Deseret News (Salt Lake City); July 23, 2009; Jeanne Phillips

Let Keyboard Express drive your keystroke shortcuts. (Insight Software Solutions) (Software Review)(Brief Article)(Evaluation), Computer Shopper; December 1, 1996; Scott, Jeffrey

Spies in your computer, International Herald Tribune; February 19, 2004

Computer Software Security, The Gale Encyclopedia of Science; January 1, 2008

Try before you buy; great software on the honor system. (evaluation of eight shareware programs)(Computer Shopper Buying Guide) (Software Review)(Evaluation), Computer Shopper; November 1, 1995; Gralla, Preston

ASK THE COMPUTER GUY, The Washington Post; September 22, 2002

Dear Abby: ; Dad learns distressing news by spying on son’s computer, Charleston Daily Mail; July 23, 2009; Jeanne Phillips

Robo-recorder?(tips about computer automation)(Brief Article), Computer Shopper; September 1, 2005; Poor, Alfred

Computer Column., Knight Ridder/Tribune Business News; May 7, 2003

Recorder’s office limits public access to online data., The Blade (Toledo, OH); April 14, 2006

Worker or shirker?, The Record (Bergen County, NJ); August 31, 2006; MARTHA McKAY, STAFF WRITER

The Sun, Port Charlotte, Fla., Robert Bowden Column., Knight Ridder/Tribune Business News; July 23, 2003

The big question.(Verve), The Star (South Africa); May 9, 2007

Who watches you at work?(CAREER), New Zealand Herald (Auckland, New Zealand); February 28, 2007

IS IT HEALTHY TO BE STEALTHY? USING SOFTWARE TO SPY, The Boston Globe (Boston, MA); April 9, 2001; Joyce Crane, Globe Correspondent

Swiss Cast Votes Online in Referendum, AP Online; September 28, 2004; JONATHAN FOWLER, Associated Press Writer

In more perilous online world, simple passwords no longer suffice, AP Worldstream; June 1, 2004; ANICK JESDANUN, AP Internet Writer

P^ssw0rds+: Perilous online world requires new breed of user identification, The Columbian (Vancouver, WA); June 7, 2004; ANICK JESDANUN, Associated Press writer


Posted

in

, ,

by

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *