Feeds

New Web site security scanner will read your HDD

Relax, it's for your own good....

  • alert
  • submit to reddit

Remote control for virtualized desktops

Internet Security Systems (ISS), is offering an on-line scanner for Web sites which surveys users’ hard drives to detect any potentially dangerous programs, such as Trojans and viruses, that may have been placed on the machine without their knowledge. The ISS Online Scanner will automatically test individual computers, identify security weaknesses, and provide users with easy-to- follow instructions for fixing security problems. It looks at the overall configuration of a computer and recommends changes that can help prevent unwanted intruders from reading or changing sensitive personal files or from enabling an attacker to use the computer as a 'zombie' machine to launch more broad-based Internet attacks. "The importance of offering scalable security management solutions to companies that want best-of-breed technology is critical to the success of protecting the Internet economy," ISS Vice President of Enterprise Software Keith Cooley said. "It is imperative that organizations can easily implement the processes and technologies needed to automatically monitor and respond to security risks. As the industry’s leading trusted security provider, ISS is strengthening our unique security software platform to ensure safe and uninterrupted e-business for our customers worldwide," he crooned. The ISS application will use Active-X technology to scan a visitor's machine and wipe out any undesirable code. The company acknowledges that use of scanning applications by Web sites could be controversial. But we don't see much of a problem with it. Sites that offer it as a free, voluntary service will do themselves and their customers a favour. Sites foolish enough to require it as a condition of visiting or doing business will find themselves paying a heavy price in gross revenues, as the vast majority of Web surfers are sure to be repelled by it. 'Market forces' should be adequate to keep this a relatively harmless little gimmick. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Lawyers mobilise angry mob against Apple over alleged 2011 Macbook Pro crapness
We suffered 'random bouts of graphical distortion' - fanbois
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Verizon bankrolls tech news site, bans tech's biggest stories
No agenda here. Just don't ever mention Net neutrality or spying, ok?
Inside the EYE of the TORnado: From Navy spooks to Silk Road
It's hard enough to peel the onion, are you hard enough to eat the core?
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.