Ruhr-Universität Bochum, Fakultät für Informatik "News", 2023 - “5-jähriges Jubiläum der RuhrSec: Die Non-Profit Konferenz für IT-Sicherheit feiert Meilenstein. Vom 11. bis zum 12. Mai bot die RuhrSec wieder hochkarätige Vorträge zu aktuellsten Themen der IT-Sicherheit und feierte so mit etwa 150 Gästen im Veranstaltungszentrum der Ruhr-Universität Bochum ihr fünfjähriges Bestehen ... Die Teilnahme ist kostenlos. Für einen Snack ist gesorgt ...”.
For websites/apps - Privacy and Cookie Policy Generator.
For websites/apps - Cookie Solution. Manage consent preferences for the ePrivacy, GDPR, and CCPA. Integrated with the IAB TCF and US Privacy Framework.
For websites/apps - Terms and Conditions Generator. Create your terms and conditions in minutes.
IBM Security "IBM X-Force" - “Forschung in der IT-Sicherheit, Erfassung globaler aktueller Bedrohungsdaten und Erstellung von Bedrohungsanalysen für intelligente Sicherheitslösungen”.
“An open-source software and data exchange layer that provides a secure, standardized, and unified way for organizations (public and private) to exchange data over the internet, ensuring confidentiality, integrity, and interoperability using features like encryption, digital signatures, and access controls”.
The software was mentioned on the event “IT-Sicherheitstag NRW 2025” in Dortmund, Germany.
On Win7, “Avira AntiVir” asks to deinstall “Microsoft Security Essentials” .
“Avira Free 14.07.306” of 2014-10-14 was still installable and runnable on Windows7 computers PIII CPUs.
“Avira Free 15.10.434” of 2015-05–26 just work on Windows computers with PentiumIV CPU. It crashes on my Windows7 computer with Athlon2400 CPU ( PentiumIII alike ) .
avast! free - free antivirus software for Windows. The free edition does not work with Windows server editions like W2k-Server.
AVG Anti-Virus Free Edition - free antivirus software for Windows. The free edition does not work with Windows server editions like W2k-Server.
BitDefender Free Edition - free antivirus software for Windows. No resident monitoring sentinel. The free edition does not work with Windows 7 (?) and Windows server editions like W2k-Server.
ClamAV / Immunet.
The free ClamAV for Linux and ClamAV/SOSDG for Windows. It does not provide a real-time guard .
EN.Wikipedia "Transport Layer Security", DE.Wikipedia "Transport Layer Security" ( TLS ) - “Seit Version 3.0 wird das SSL-Protokoll unter dem neuen Namen TLS weiterentwickelt und standardisiert, wobei Version 1.0 von TLS der Version 3.1 von SSL entspricht. Bekannte Implementierungen des Protokolls sind OpenSSL und GnuTLS”.
“An Architecture for Matching CSAF Documents on Industrial Asset Inventories. Daniel Rittershofer (Fraunhofer IOSB): We present BSI’s project 625 on CSAF matching in industrial environments. The aim of the project is to match an industrial asset inventory with a CSAF document database so that operators can efficiently identify relevant security advisories for the assets contained in their plants. We present our system architecture and implementation as well as our approach to matching CSAF documents to device and software asset information. The open-source asset inventory NetBox serves as our asset inventory. We integrate the interaction with the CSAF matching system as well as the processing and tracking of the processing status of matches into NetBox as a plugin”.
NetBox Labs - “The world’s platform for network and infrastructure management”.
GitHub "oasis-tcs / csaf" - “OASIS CSAF TC: Supporting version control for Work Product artifacts developed by members of TC, including prose specifications and secondary artifacts like meeting minutes and productivity code”.
EN.Wikipedia "OASIS (organization)" - “CSAF — Common Security Advisory Framework, is the definitive reference for the language which supports creation, update, and interoperable exchange of security advisories as structured information on products, vulnerabilities and the status of impact and remediation among interested parties”.
The software was mentioned on the event “IT-Sicherheitstag NRW 2025” in Dortmund, Germany.
GUAC "Trustify" - “The Trustify project is a collection of software components that enables you to store and retrieve Software Bill of Materials (SBOMs), and advisory documents”.
Economy of mechanism: Keep the design as simple and small as possible.
Fail-safe defaults: Base access decisions on permission rather than exclusion.
Complete mediation: Every access to every object must be checked for authority.
Open design: The design should not be secret.
Separation of privilege: Where feasible, a protection mechanism that requires two keys to unlock it is more robust and flexible than one that allows access to the presenter of only a single key.
Least privilege: Every program and every user of the system should operate using the least set of privileges necessary to complete the job.
Least common mechanism: Minimize the amount of mechanism common to more than one user and depended on by all users.
Psychological acceptability: It is essential that the human interface be designed for ease of use, so that users routinely and automatically apply the protection mechanisms correctly-
Work factor: Compare the cost of circumventing the mechanism with the resources of a potential attacker. The cost of circumventing, commonly known as the “work factor,” in some cases can be easily calculated.
Compromise recording: It is sometimes suggested that mechanisms that reliably record that a compromise of information has occurred can be used in place of more elaborate mechanisms that completely prevent loss.
I was told in 2023-11 by experts: There will be “soon” ( i.e. in 2024 ) a free web-based software service for registered companies and registered consultants, which interactively asks the questions of the norm.