Great if you want to hear someone chew or breathe. Pic: The Lives of Others

Experimental malware has highlighted the possibility that hackers might be able to turn headphones into microphones in order to snoop on computer users.

Research by computer scientists at Ben-Gurion University, Israel, has revealed that both headphones and loudspeakers present a potential bugging risk. The boffins put together proof-of-concept malware, dubbed SPEAKE(a)R, in order to validate the risk.

"Malware can use a computer as an eavesdropping device, even when a microphone is not present, muted, taped or turned off," the researchers warn. In a paper, SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit (PDF), the researchers survey the scope of the risk and access potential countermeasures. Possible hardware-based defences include using only active one-way speakers or deploying either white noise emitters or an audio jammer.

Youtube Video

A speaker converts an electric signal into a sound wave. A microphone converts sound to an electrical signal. "The difference between these two pieces of equipment is that they have been optimised for the direction of conversion," according to Paul Farrington, manager of EMEA solution architects at application security firm Veracode. "However, there is little to prevent the conversion happening in the reverse direction."

This feature of consumer tech coupled with the possibility of hacking an audio port's role in the PC from output to input creates a bugging risk.

"The RealTek codec chip vulnerability is apparently allowing malware running on the device to take advantage of the physical properties of the connected equipment to use the ports to accept input when they should be restricted to output only," Farrington continued.

RealTek or operating system developers might be able to deliver a software patch to mitigate this chip vulnerability and help secure IO ports, according to Farrington. ®

Sponsored: The state of mobile security maturity


The Register - Security

Dyn Confirms DDoS Attack Affecting Twitter, Github, Many Others

October 21, 2016 , 10:01 am

IoT Botnets Are The New Normal of DDoS Attacks

October 5, 2016 , 8:51 am

Backdoor Found in Firmware of Some Android Devices

November 21, 2016 , 3:20 pm

Threatpost News Wrap, November 18, 2016

November 18, 2016 , 9:15 am

iPhone Call History Synced to iCloud Without User Consent, Knowledge

November 17, 2016 , 1:51 pm

Microsoft Patches Zero Day Disclosed by Google

November 8, 2016 , 2:57 pm

Microsoft Says Russian APT Group Behind Zero-Day Attacks

November 1, 2016 , 5:50 pm

Google to Make Certificate Transparency Mandatory By 2017

October 29, 2016 , 6:00 am

Microsoft Extends Malicious Macro Protection to Office 2013

October 27, 2016 , 4:27 pm

Dyn DDoS Work of Script Kiddies, Not Politically Motivated Hackers

October 25, 2016 , 3:00 pm

Mirai-Fueled IoT Botnet Behind DDoS Attacks on DNS Providers

October 22, 2016 , 6:00 am

FruityArmor APT Group Used Recently Patched Windows Zero Day

October 20, 2016 , 7:00 am

Experts ‘Outraged’ by Warrant Demanding Fingerprints to Unlock Smartphones

October 18, 2016 , 4:58 pm

Leftover Factory Debugger Doubles as Android Backdoor

October 14, 2016 , 9:00 am

Researchers Break MarsJoke Ransomware Encryption

October 3, 2016 , 5:00 am

OpenSSL Fixes Critical Bug Introduced by Latest Update

September 26, 2016 , 10:45 am

500 Million Yahoo Accounts Stolen By State-Sponsored Hackers

September 22, 2016 , 3:47 pm

Yahoo Reportedly to Confirm Breach of Hundreds of Millions of Credentials

September 22, 2016 , 12:31 pm

Experts Want Transparency From Government’s Vulnerabilities Equities Process

September 20, 2016 , 2:41 pm

Bruce Schneier on Probing Attacks Testing Core Internet Infrastructure

September 15, 2016 , 11:15 am

Generic OS X Malware Detection Method Explained

September 13, 2016 , 9:14 am

Patched Android Libutils Vulnerability Harkens Back to Stagefright

September 9, 2016 , 2:06 pm

Chrome to Label Some HTTP Sites ‘Not Secure’ in 2017

September 8, 2016 , 3:43 pm

Threatpost News Wrap, September 2, 2016

September 2, 2016 , 9:00 am

Insecure Redis Instances at Core of Attacks Against Linux Servers

September 1, 2016 , 1:08 pm

Dropbox Forces Password Reset for Older Users

August 29, 2016 , 9:58 am

Cisco Begins Patching Equation Group ASA Zero Day

August 24, 2016 , 5:53 pm

New Collision Attacks Against 3DES, Blowfish Allow for Cookie Decryption

August 24, 2016 , 8:00 am

Cisco Acknowledges ASA Zero Day Exposed by ShadowBrokers

August 17, 2016 , 4:06 pm

Pokémon GO Spam, Ransomware, On the Rise

August 17, 2016 , 12:58 pm

ProjectSauron APT On Par With Equation, Flame, Duqu

August 8, 2016 , 1:40 pm

Miller, Valasek Deliver Final Car Hacking Talk

August 4, 2016 , 3:26 pm

Researchers Go Inside a Business Email Compromise Scam

August 4, 2016 , 10:00 am

Export-Grade Crypto Patching Improves

August 3, 2016 , 10:00 am

Kaspersky Lab Launches Bug Bounty Program

August 2, 2016 , 9:00 am

Threatpost News Wrap, July 29, 2016

July 29, 2016 , 10:45 am

KeySniffer Vulnerability Opens Wireless Keyboards to Snooping

July 26, 2016 , 9:30 am

Upcoming Tor Design Battles Hidden Services Snooping

July 25, 2016 , 3:51 pm

EFF Files Lawsuit Challenging DMCA’s Restrictions on Security Researchers

July 21, 2016 , 1:18 pm

Oracle Patches Record 276 Vulnerabilities with July Critical Patch Update

July 20, 2016 , 9:21 am

Threatpost News Wrap, July 15, 2016

July 15, 2016 , 11:00 am

Academics Build Early-Warning Ransomware Detection System

July 14, 2016 , 1:05 pm

xDedic Hacked Server Market Resurfaces on Tor Domain

July 12, 2016 , 11:40 am

Conficker Used in New Wave of Hospital IoT Device Attacks

June 30, 2016 , 11:48 am

655,000 Healthcare Records Being Sold on Dark Web

June 28, 2016 , 10:00 am

Windows Zero Day Selling for $ 90,000

May 31, 2016 , 5:44 pm

Millions of Stolen MySpace, Tumblr Credentials Being Sold Online

May 31, 2016 , 1:37 pm

OTR Protocol Patched Against Remote Code Execution Flaw

March 10, 2016 , 10:23 am

Facebook Debuts Open Source Detection Tool for Windows

September 27, 2016 , 12:24 pm

Serious Dirty Cow Linux Vulnerability Under Attack

October 21, 2016 , 11:21 am

Popular Android App Leaks Microsoft Exchange User Credentials

October 14, 2016 , 8:00 am

Credentials Accessible in Siemens-Branded CCTV Cameras

November 21, 2016 , 12:10 pm

Cisco Warns of Critical Flaws in Nexus Switches

October 7, 2016 , 10:55 am

Free Tool Protects Mac Users from Webcam Surveillance

October 7, 2016 , 7:00 am


Threatpost | The first stop for security news

Checkpoint has found an image obfuscation trick it thinks may be behind a recent massive phishing campaign on Facebook that's distributing the dangerous Locky ransomware.

The security firm has not released technical details as the flaw it relies on still impacts Facebook and LinkedIn, among other unnamed web properties.

The flaw as described is, in this writer's opinion, ultimately of little risk to El Reg's tech savvy readers, but folks who can be conned into downloading and running unknown executables are at risk.

The attack is also significant in that it breaks Facebook's security controls.

In a proof-of-concept video by Checkpoint researchers Roman Ziakin and Dikla Barda, an attacker is shown exploiting the flaw by sending a .jpg image file through Facebook Messenger.

The victim must click the attachment, an act that generates a Windows save file prompt asking the victim for the save directory to which the now .hta file will be downloaded.

FB image preview

Images sent over Messenger appear as previews, not attachments.

They must then double-click the saved .hta file to unleash the Locky ransomware.

While the attack is not automated and, it does break Facebook's hypervigilant security model and is fairly regarded by Checkpoint as a Facebook "misconfiguration".

Facebook will undoubtedly fix the flaw; The Social Network™ already warns users who open a browser javascript console to protect against malicious code.

Checkpoint's chaps says the attack is useful because Facebook is a trusted asset.

“As more people spend time on social networking sites, hackers have turned their focus to find a way into these platforms,” Ziakin and Barda write.

“Cyber criminals understand these sites are usually white listed, and for this reason, they are continually searching for new techniques to use social media as hosts for their malicious activities."

Facebook's javascript console warning

Facebook's javascript console warning.

Those users who do open the hta file will unleash one of the worst ransomware variants in mass circulation, encrypting their local files in a way that leaves backup restoration or ransom payment as the only options available to them.

There is no decryption method for Locky, and most victims will find their backup files also deleted.

Locky is under active development. Its authors have recently switched to the .zzzzz encrypted file extension with a new downloader that has lower antivirus detection rates. ®

Youtube Video

Sponsored: Magic quadrant for enterprise mobility management suites


The Register - Security

Users can now check whether their network is exposed to Mirai, one of the most prolific botnets to have targeted Internet of Things (IoT) devices this year.

The botnet was initially detailed in early September, but it became more popular in early October, when its author released the source code online. The malware, designed to harness the power of insecure IoT devices to launch distributed denial of service (DDoS) attacks, had been previously used in massive incidents targeting Brian Krebs' blog and hosting provider OVH.

With the primary purpose of IoT botnets being DDoS attacks, it’s no wonder that Akamai said that Mirai wasn’t alone in the 665 gigabit per second (Gbps) attempt to take down Krebs. However, security researchers reported that Mirai was increasingly used in DDoS incidents following the source code leak.

One such Mirai attack targeted DNS provider Dyn and disrupted popular websites such as Twitter, Etsy, GitHub, Soundcloud, PagerDuty, Spotify, Shopify, Airbnb, Intercom and Heroku. With infected devices in 164 countries and the use of Internet protocols that aren’t usually associated with DDoS attacks, such as STOMP floods, Mirai continues to wreak havoc. 

Because Mirai’s success is fueled by the existence of IoT devices that aren’t properly secured, it could be easily countered by simply changing the default credentials on vulnerable devices and by closing the Telnet port the botnet uses for infection. That, however, is an operation that users and network admins need to perform, but they might not always be aware of such an issue impacting them.

To help users determine whether their network is exposed to Mirai or not, IoT Defense Inc., a startup company based in the Washington DC Metro area, launched a web scanner that does exactly that: it searches for opened TCP ports and informs users whether they are safe or not. 

The IoT Defense scanner was written using a combination of Python, Node JS and Jade frameworks and scans for nearly a dozen ports that botnets can exploit. Accessing and using the scanner is free and little instructions are needed, as it does all with a simple click of a button.

The tool was designed to scan for ports such as File Transfer Protocol (FTP), Secure Shell (SSH), Telnet (both 23 and the alternative 2323), HTTP, HTTPS, Microsoft-SQL-Server, EtherNet/IP, Telnet (alternative), Microsoft Remote Desktop Protocol (RDP), Web Proxy, and Apache Tomcat SSL (HTTPS).

While not all of these ports are targeted by Mirai, a couple are, with the 2323 Telnet port being specifically attacked. The IoT botnet scans the Internet for exposed IoT devices such as routers, IP cameras, and DVRs, and, when it finds vulnerable devices, it attempts to login to them using a list of default login credentials.

This, however, is a behavior employed by other botnets as well. What’s more, while disinfecting a device compromised by Mirai is very easy, because a simple reboot would suffice, keeping the malware away from that device is more complicated. Because of constant scans, vulnerable IoT products are re-infected within minutes.

Device vendors are those who need to take action, because users rarely do so T. Roy, CEO, IoT Defense, told SecurityWeek via email. They should add in-field auto-updates to their devices, should use per device unique passwords (something that router manufacturers have already started implementing), and should not open up unnecessary ports.

Because their incentives are not aligned with device vendors, it’s clear that users might not be the ones to fix this issue. Users might not care – provided that they are aware of an issue – that their routers, IP cameras, or DVRs are used to DDoS websites and DNS providers. As long as the bandwidth usage doesn’t affect them, they are not disadvantaged, and T. Roy believes that one solution would be for ISPs to impose bandwidth caps.

A set of rules to impose stricter security of IoT devices would also be of help, and steps in this direction are already being taken, with the Department of Homeland Security (DHS) publishing its Strategic Principles for Securing the Internet of Things. The document includes six non-binding principles designed to provide security across the design, manufacturing and deployment of connected devices.

IoT Defense’s CEO also notes that IoT vendors need to have a servicing model in place, to resolve vulnerabilities in their devices when they are discovered. Just as it happens with many other products, vendors would be given a window to resolve the found issues or face consequences. However, he isn’t very optimistic about vendors actually taking stance.

“As of today, IoT device manufacturers have very little to show for security which always gets trumped by new features and time or market concerns. It is wishful thinking to expect device vendors to step up their game and make security and privacy key differentiators for their products,” T. Roy said.

Last year, Gartner said that the number of connected devices will grow above the 20 billion mark by 2020. Now, Juniper Research estimates that there will be 38.5 billion connected IoT devices by that year, and that 70% of these units are expected to be non-consumer devices. Should the level of insecurity within these devices remain the same, the consequences will be dire for consumers, enterprises, and vendors alike.

The good news, however, is that even today enterprises block inbound open external access over protocols such as Telnet and SSH, meaning that IoT devices within corporate environments aren’t exposed. However, as Zscaler points out, these devices remain vulnerable nonetheless, and steps should be taken to defuse the situation, including automating the security and firmware updates and enforcing default password change at initial setup.

The issue at hand remains the existence of not only hundreds of thousands of IoT devices infected with Mirai, but also of hundreds of thousands more vulnerable to the botnet. More importantly, while the main purpose of IoT malware is the launch of DDoS attacks, cybercriminals have focused mainly on infecting complex devices, but could switch to simpler products such as smart toys, home appliances, wearables, and more, which would result in a flood of IoT malware all around us.

T. Roy agrees with that as well: “The day is not too far when Ransomware is going to straddle the boundary between the PC and the smart devices in the consumer's home. Unlike PC based ransomware where your pictures and videos are at stake, with everything being controlled by your smart devices your life and property are at stake.”

“Regulation will likely be the fix for IoT security,” F5 Networks evangelist David Holmes notes in a SecurityWeek column, citing Mikko Hypponen, Chief Risk Officer of F-Secure. However, he also explains that Internet security cannot be regulated like other manufacturing processes. Increasing awareness among users could also help resolve this issue, with the IoT Defense scanner being a small step in this direction.

view counter

Ionut Arghire is an international correspondent for SecurityWeek.

Previous Columns by Ionut Arghire:

Tags:


SecurityWeek RSS Feed

Dyn Confirms DDoS Attack Affecting Twitter, Github, Many Others

October 21, 2016 , 10:01 am

IoT Botnets Are The New Normal of DDoS Attacks

October 5, 2016 , 8:51 am

Backdoor Found in Firmware of Some Android Devices

November 21, 2016 , 3:20 pm

Threatpost News Wrap, November 18, 2016

November 18, 2016 , 9:15 am

iPhone Call History Synced to iCloud Without User Consent, Knowledge

November 17, 2016 , 1:51 pm

Microsoft Patches Zero Day Disclosed by Google

November 8, 2016 , 2:57 pm

Microsoft Says Russian APT Group Behind Zero-Day Attacks

November 1, 2016 , 5:50 pm

Google to Make Certificate Transparency Mandatory By 2017

October 29, 2016 , 6:00 am

Microsoft Extends Malicious Macro Protection to Office 2013

October 27, 2016 , 4:27 pm

Dyn DDoS Work of Script Kiddies, Not Politically Motivated Hackers

October 25, 2016 , 3:00 pm

Mirai-Fueled IoT Botnet Behind DDoS Attacks on DNS Providers

October 22, 2016 , 6:00 am

FruityArmor APT Group Used Recently Patched Windows Zero Day

October 20, 2016 , 7:00 am

Experts ‘Outraged’ by Warrant Demanding Fingerprints to Unlock Smartphones

October 18, 2016 , 4:58 pm

Leftover Factory Debugger Doubles as Android Backdoor

October 14, 2016 , 9:00 am

Researchers Break MarsJoke Ransomware Encryption

October 3, 2016 , 5:00 am

OpenSSL Fixes Critical Bug Introduced by Latest Update

September 26, 2016 , 10:45 am

500 Million Yahoo Accounts Stolen By State-Sponsored Hackers

September 22, 2016 , 3:47 pm

Yahoo Reportedly to Confirm Breach of Hundreds of Millions of Credentials

September 22, 2016 , 12:31 pm

Experts Want Transparency From Government’s Vulnerabilities Equities Process

September 20, 2016 , 2:41 pm

Bruce Schneier on Probing Attacks Testing Core Internet Infrastructure

September 15, 2016 , 11:15 am

Generic OS X Malware Detection Method Explained

September 13, 2016 , 9:14 am

Patched Android Libutils Vulnerability Harkens Back to Stagefright

September 9, 2016 , 2:06 pm

Chrome to Label Some HTTP Sites ‘Not Secure’ in 2017

September 8, 2016 , 3:43 pm

Threatpost News Wrap, September 2, 2016

September 2, 2016 , 9:00 am

Insecure Redis Instances at Core of Attacks Against Linux Servers

September 1, 2016 , 1:08 pm

Dropbox Forces Password Reset for Older Users

August 29, 2016 , 9:58 am

Cisco Begins Patching Equation Group ASA Zero Day

August 24, 2016 , 5:53 pm

New Collision Attacks Against 3DES, Blowfish Allow for Cookie Decryption

August 24, 2016 , 8:00 am

Cisco Acknowledges ASA Zero Day Exposed by ShadowBrokers

August 17, 2016 , 4:06 pm

Pokémon GO Spam, Ransomware, On the Rise

August 17, 2016 , 12:58 pm

ProjectSauron APT On Par With Equation, Flame, Duqu

August 8, 2016 , 1:40 pm

Miller, Valasek Deliver Final Car Hacking Talk

August 4, 2016 , 3:26 pm

Researchers Go Inside a Business Email Compromise Scam

August 4, 2016 , 10:00 am

Export-Grade Crypto Patching Improves

August 3, 2016 , 10:00 am

Kaspersky Lab Launches Bug Bounty Program

August 2, 2016 , 9:00 am

Threatpost News Wrap, July 29, 2016

July 29, 2016 , 10:45 am

KeySniffer Vulnerability Opens Wireless Keyboards to Snooping

July 26, 2016 , 9:30 am

Upcoming Tor Design Battles Hidden Services Snooping

July 25, 2016 , 3:51 pm

EFF Files Lawsuit Challenging DMCA’s Restrictions on Security Researchers

July 21, 2016 , 1:18 pm

Oracle Patches Record 276 Vulnerabilities with July Critical Patch Update

July 20, 2016 , 9:21 am

Threatpost News Wrap, July 15, 2016

July 15, 2016 , 11:00 am

Academics Build Early-Warning Ransomware Detection System

July 14, 2016 , 1:05 pm

xDedic Hacked Server Market Resurfaces on Tor Domain

July 12, 2016 , 11:40 am

Conficker Used in New Wave of Hospital IoT Device Attacks

June 30, 2016 , 11:48 am

655,000 Healthcare Records Being Sold on Dark Web

June 28, 2016 , 10:00 am

Windows Zero Day Selling for $ 90,000

May 31, 2016 , 5:44 pm

Millions of Stolen MySpace, Tumblr Credentials Being Sold Online

May 31, 2016 , 1:37 pm

OTR Protocol Patched Against Remote Code Execution Flaw

March 10, 2016 , 10:23 am

Credentials Accessible in Siemens-Branded CCTV Cameras

November 21, 2016 , 12:10 pm

Facebook Debuts Open Source Detection Tool for Windows

September 27, 2016 , 12:24 pm

Serious Dirty Cow Linux Vulnerability Under Attack

October 21, 2016 , 11:21 am

Popular Android App Leaks Microsoft Exchange User Credentials

October 14, 2016 , 8:00 am

Cisco Warns of Critical Flaws in Nexus Switches

October 7, 2016 , 10:55 am

Free Tool Protects Mac Users from Webcam Surveillance

October 7, 2016 , 7:00 am


Threatpost | The first stop for security news

Bugtraq ID: 58796 Class: Design Error CVE: CVE-2013-2566 Remote: Yes Local: No Published: Mar 12 2013 12:00AM Updated: Nov 24 2016 02:03PM Credit: Apurba Das, Subhamoy Maitra, Goutam Paul, Santanu Sarkar Vulnerable: Ubuntu Ubuntu Linux 13.10
Ubuntu Ubuntu Linux 13.04
Ubuntu Ubuntu Linux 12.10
Ubuntu Ubuntu Linux 12.04 LTS
Sun Glassfish Enterprise Server 3.1.1
Sun Glassfish Enterprise Server 3.0.1
Sun Glassfish Enterprise Server 2.1.1
Sun Glassfish Enterprise Server 2.1
Slackware Slackware Linux 14.1
Slackware Slackware Linux 14.0
Slackware Slackware Linux 13.37
Rsa RC4 0
Redhat JBoss Application Server 7.1.1
Redhat JBoss Application Server 6.1
Redhat JBoss Application Server 5.1
Redhat JBoss Application Server 5.0
Redhat JBoss Application Server 4.0.5
Redhat JBoss Application Server 4.0.4
Redhat JBoss Application Server 4.0.3
Redhat JBoss Application Server 3.2.2
Redhat JBoss Application Server 7.1.1.Final
Redhat JBoss Application Server 7.02
Redhat JBoss Application Server 7.0
Redhat JBoss Application Server 5.X
Redhat JBoss Application Server 5
Redhat JBoss Application Server 4.3
Redhat JBoss Application Server 4.2.3
Redhat JBoss Application Server 4.2
Oracle SPARC Enterprise M9000 XCP 1118
Oracle SPARC Enterprise M9000 XCP 1117
Oracle SPARC Enterprise M8000 XCP 1118
Oracle SPARC Enterprise M8000 XCP 1117
Oracle SPARC Enterprise M5000 XCP 1118
Oracle SPARC Enterprise M5000 XCP 1117
Oracle SPARC Enterprise M4000 XCP 1118
Oracle SPARC Enterprise M4000 XCP 1117
Oracle SPARC Enterprise M3000 XCP 1118
Oracle SPARC Enterprise M3000 XCP 1117
Oracle GlassFish 3.0.1
Oracle Fujitsu M10-4S Server XCP 2271
Oracle Fujitsu M10-4S Server XCP 2230
Oracle Fujitsu M10-4 Server XCP 2271
Oracle Fujitsu M10-4 Server XCP 2230
Oracle Fujitsu M10-1 Server XCP 2271
Oracle Fujitsu M10-1 Server XCP 2230
Oracle Enterprise Session Border Controller Ecz7.3m2p2
Opera Software Opera Web Browser 8.51
Opera Software Opera Web Browser 8.50
Opera Software Opera Web Browser 8.0.2
Opera Software Opera Web Browser 8.0 2
Opera Software Opera Web Browser 8.0 1
Opera Software Opera Web Browser 8.0
Opera Software Opera Web Browser 7.54
Opera Software Opera Web Browser 7.53
Opera Software Opera Web Browser 7.52
Opera Software Opera Web Browser 7.51
Opera Software Opera Web Browser 7.50
Opera Software Opera Web Browser 7.23
Opera Software Opera Web Browser 7.22
Opera Software Opera Web Browser 7.21
Opera Software Opera Web Browser 7.20 Beta 1 build 2981
Opera Software Opera Web Browser 7.20
Opera Software Opera Web Browser 7.11 j
Opera Software Opera Web Browser 7.11 b
Opera Software Opera Web Browser 7.11
Opera Software Opera Web Browser 7.10
Opera Software Opera Web Browser 7.0 win32 Beta 2
Opera Software Opera Web Browser 7.0 win32 Beta 1
Opera Software Opera Web Browser 7.0 win32
Opera Software Opera Web Browser 7.0 3win32
Opera Software Opera Web Browser 7.0 2win32
Opera Software Opera Web Browser 7.0 1win32
Opera Software Opera Web Browser 6.10 linux
Opera Software Opera Web Browser 6.0.5 win32
Opera Software Opera Web Browser 6.0.4 win32
Opera Software Opera Web Browser 6.0.3 win32
Opera Software Opera Web Browser 6.0.3 linux
Opera Software Opera Web Browser 6.0.2 win32
Opera Software Opera Web Browser 6.0.2 linux
Opera Software Opera Web Browser 6.0.1 win32
Opera Software Opera Web Browser 6.0.1 linux
Opera Software Opera Web Browser 6.0.1
Opera Software Opera Web Browser 6.0 win32
Opera Software Opera Web Browser 6.0 6
Opera Software Opera Web Browser 6.0 .6win32
Opera Software Opera Web Browser 6.0
Opera Software Opera Web Browser 5.12 win32
Opera Software Opera Web Browser 5.12
Opera Software Opera Web Browser 5.1 1 win32
Opera Software Opera Web Browser 5.1 0 win32
Opera Software Opera Web Browser 5.0 Linux
Opera Software Opera Web Browser 5.0 2 win32
Opera Software Opera Web Browser 5.0 Mac
Opera Software Opera Web Browser 9.64
Opera Software Opera Web Browser 9.63
Opera Software Opera Web Browser 9.62
Opera Software Opera Web Browser 9.61
Opera Software Opera Web Browser 9.60 beta 1
Opera Software Opera Web Browser 9.60
Opera Software Opera Web Browser 9.52
Opera Software Opera Web Browser 9.51
Opera Software Opera Web Browser 9.50 beta
Opera Software Opera Web Browser 9.5
Opera Software Opera Web Browser 9.27
Opera Software Opera Web Browser 9.26
Opera Software Opera Web Browser 9.25
Opera Software Opera Web Browser 9.24
Opera Software Opera Web Browser 9.23
Opera Software Opera Web Browser 9.22
Opera Software Opera Web Browser 9.21
Opera Software Opera Web Browser 9.20 beta 1
Opera Software Opera Web Browser 9.20
Opera Software Opera Web Browser 9.10
Opera Software Opera Web Browser 9.02
Opera Software Opera Web Browser 9.01
Opera Software Opera Web Browser 9
Opera Software Opera Web Browser 8.54
Opera Software Opera Web Browser 8.53
Opera Software Opera Web Browser 8.52
Opera Software Opera Web Browser 12.13
Opera Software Opera Web Browser 12.12
Opera Software Opera Web Browser 12.11
Opera Software Opera Web Browser 12.10
Opera Software Opera Web Browser 12.02
Opera Software Opera Web Browser 12.01
Opera Software Opera Web Browser 12.01
Opera Software Opera Web Browser 12.00
Opera Software Opera Web Browser 12
Opera Software Opera Web Browser 11.67
Opera Software Opera Web Browser 11.66
Opera Software Opera Web Browser 11.65
Opera Software Opera Web Browser 11.64
Opera Software Opera Web Browser 11.62
Opera Software Opera Web Browser 11.61
Opera Software Opera Web Browser 11.60
Opera Software Opera Web Browser 11.52
Opera Software Opera Web Browser 11.52
Opera Software Opera Web Browser 11.51
Opera Software Opera Web Browser 11.51
Opera Software Opera Web Browser 11.50
Opera Software Opera Web Browser 11.11
Opera Software Opera Web Browser 11.10
Opera Software Opera Web Browser 11.01
Opera Software Opera Web Browser 11.00
Opera Software Opera Web Browser 10.63
Opera Software Opera Web Browser 10.62
Opera Software Opera Web Browser 10.61
Opera Software Opera Web Browser 10.60
Opera Software Opera Web Browser 10.60
Opera Software Opera Web Browser 10.54
Opera Software Opera Web Browser 10.54
Opera Software Opera Web Browser 10.53
Opera Software Opera Web Browser 10.52
Opera Software Opera Web Browser 10.51
Opera Software Opera Web Browser 10.50
Opera Software Opera Web Browser 10.10
Opera Software Opera Web Browser 10.1
Opera Software Opera Web Browser 10.01
Opera Software Opera Web Browser 10.00
Opera Software Opera Web Browser 10
Mozilla SeaMonkey 2.16.1
Mozilla SeaMonkey 2.13.2
Mozilla SeaMonkey 2.22
Mozilla SeaMonkey 2.21
Mozilla SeaMonkey 2.20
Mozilla SeaMonkey 2.17
Mozilla SeaMonkey 2.16
Mozilla SeaMonkey 2.15
Mozilla SeaMonkey 2.14
Mozilla SeaMonkey 2.13.1
Mozilla SeaMonkey 2.13
Mozilla SeaMonkey 2.12
Mozilla SeaMonkey 2.11
Mozilla SeaMonkey 2.11
Mozilla SeaMonkey 2.10
Mozilla Firefox ESR 17.0.10
Mozilla Firefox ESR 17.0.9
Mozilla Firefox ESR 17.0.7
Mozilla Firefox ESR 17.0.6
Mozilla Firefox ESR 17.0.4
Mozilla Firefox ESR 17.0.3
Mozilla Firefox ESR 17.0.2
Mozilla Firefox ESR 17.0.1
Mozilla Firefox ESR 24.1
Mozilla Firefox ESR 17.0.8
Mozilla Firefox 19.0.2
Mozilla Firefox 16.0.2
Mozilla Firefox 16.0.1
Mozilla Firefox 15.0.1
Mozilla Firefox 25.0
Mozilla Firefox 24.0
Mozilla Firefox 23.0
Mozilla Firefox 22.0
Mozilla Firefox 21.0
Mozilla Firefox 20.0.1
Mozilla Firefox 20.0
Mozilla Firefox 19.0
Mozilla Firefox 18.0
Mozilla Firefox 17.0.1
Mozilla Firefox 17.0
Mozilla Firefox 16
Mozilla Firefox 15
Mozilla Firefox 14.01
Mozilla Firefox 14.0
Mozilla Firefox 14
Mozilla Firefox 13.0
Mozilla Firefox 12.0
Mozilla Firefox 11.0
Mozilla Firefox 10.0.2
Mozilla Firefox 10.0.1
Mozilla Firefox 10.0
Mozilla Firefox 10
Moonchild Productions Pale Moon 24.1.1
Moonchild Productions Pale Moon 24.1
Moonchild Productions Pale Moon 20.0.1
Moonchild Productions Pale Moon 24.0
Moonchild Productions Pale Moon 20.3
Moonchild Productions Pale Moon 20.2
Moonchild Productions Pale Moon 20.1
Microsoft Internet Explorer 7.0.5730 .11
Microsoft Internet Explorer 5.0.1 SP4
Microsoft Internet Explorer 5.0.1 SP3
Microsoft Internet Explorer 5.0.1 SP2
Microsoft Internet Explorer 5.0.1 SP1
Microsoft Internet Explorer 5.0.1 for Windows NT 4.0
Microsoft Internet Explorer 5.0.1 for Windows 98
Microsoft Internet Explorer 5.0.1 for Windows 95
Microsoft Internet Explorer 5.0.1 for Windows 2000
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 4.0.1 SP2
Microsoft Internet Explorer 4.0.1 for Windows NT 4.0
Microsoft Internet Explorer 4.0.1 for Windows 98
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 3.0.2 for Windows NT 4.0
Microsoft Internet Explorer 3.0.2 for Windows 95
Microsoft Internet Explorer 3.0.1 for Windows NT 4.0
Microsoft Internet Explorer 3.0.1 for Windows 95
Microsoft Internet Explorer 9
Microsoft Internet Explorer 8.0.7600.16385
Microsoft Internet Explorer 8 RC1
Microsoft Internet Explorer 8 beta 2
Microsoft Internet Explorer 8 Beta 1
Microsoft Internet Explorer 8
Microsoft Internet Explorer 7.0 beta3
Microsoft Internet Explorer 7.0 beta2
Microsoft Internet Explorer 7.0 beta1
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 6.0 SP3
Microsoft Internet Explorer 6.0 SP2
Microsoft Internet Explorer 6.0 SP1
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.5 SP2
Microsoft Internet Explorer 5.5 SP1
Microsoft Internet Explorer 5.5 preview
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.0 for Windows NT 4
Microsoft Internet Explorer 5.0 for Windows 98
Microsoft Internet Explorer 5.0 for Windows 95
Microsoft Internet Explorer 5.0 for Windows 2000
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 4.1 for Windows NT 4
Microsoft Internet Explorer 4.1 for Windows 98
Microsoft Internet Explorer 4.1 for Windows 95
Microsoft Internet Explorer 4.0 for Windows NT 4
Microsoft Internet Explorer 4.0 for Windows NT 3
Microsoft Internet Explorer 4.0 for Windows 98
Microsoft Internet Explorer 4.0 for Windows 95
Microsoft Internet Explorer 4.0 for Windows 3.1
Microsoft Internet Explorer 4.0 for WfW
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 3.2 for Windows NT 4
Microsoft Internet Explorer 3.2 for Windows NT 3
Microsoft Internet Explorer 3.2 for Windows 95
Microsoft Internet Explorer 3.2 for Windows 3.1
Microsoft Internet Explorer 3.2 for WfW
Microsoft Internet Explorer 3.0 for Windows NT 4
Microsoft Internet Explorer 3.0 for Windows NT 3
Microsoft Internet Explorer 3.0 for Windows 95
Microsoft Internet Explorer 3.0 for Windows 3.1
Microsoft Internet Explorer 3.0 for WfW
Microsoft Internet Explorer 10 For Windows 8
Microsoft Internet Explorer 10
Mandriva Business Server 1 X86 64
Mandriva Business Server 1
MandrakeSoft Enterprise Server 5 x86_64
MandrakeSoft Enterprise Server 5
IBM Websphere Application Server 8.0 2
IBM Websphere Application Server 7.0 3
IBM Websphere Application Server 7.0 29
IBM Websphere Application Server 7.0 21
IBM Websphere Application Server 7.0 .9
IBM Websphere Application Server 7.0 .8
IBM Websphere Application Server 7.0 .2
IBM Websphere Application Server 7.0 .13
IBM Websphere Application Server 7.0 .12
IBM Websphere Application Server 7.0 .11
IBM Websphere Application Server 6.1.2
IBM Websphere Application Server 6.1 41
IBM Websphere Application Server 6.1 .9
IBM Websphere Application Server 6.1 .8
IBM Websphere Application Server 6.1 .7
IBM Websphere Application Server 6.1 .6
IBM Websphere Application Server 6.1 .5
IBM Websphere Application Server 6.1 .4
IBM Websphere Application Server 6.1 .33
IBM Websphere Application Server 6.1 .32
IBM Websphere Application Server 6.1 .3
IBM Websphere Application Server 6.1 .25
IBM Websphere Application Server 6.1 .23
IBM Websphere Application Server 6.1 .22
IBM Websphere Application Server 6.1 .21
IBM Websphere Application Server 6.1 .20
IBM Websphere Application Server 6.1 .2
IBM Websphere Application Server 6.1 .19
IBM Websphere Application Server 6.1 .18
IBM Websphere Application Server 6.1 .17
IBM Websphere Application Server 6.1 .15
IBM Websphere Application Server 6.1 .14
IBM Websphere Application Server 6.1 .13
IBM Websphere Application Server 6.1 .12
IBM Websphere Application Server 6.1 .11
IBM Websphere Application Server 6.1 .10
IBM Websphere Application Server 6.1 .1
IBM Websphere Application Server 6.1
IBM Websphere Application Server 6.0.2 .9
IBM Websphere Application Server 6.0.2 .7
IBM Websphere Application Server 6.0.2 .5
IBM Websphere Application Server 6.0.2 .39
IBM Websphere Application Server 6.0.2 .35
IBM Websphere Application Server 6.0.2 .33
IBM Websphere Application Server 6.0.2 .31
IBM Websphere Application Server 6.0.2 .3
IBM Websphere Application Server 6.0.2 .29
IBM Websphere Application Server 6.0.2 .27
IBM Websphere Application Server 6.0.2 .25
IBM Websphere Application Server 6.0.2 .24
IBM Websphere Application Server 6.0.2 .23
IBM Websphere Application Server 6.0.2 .22
IBM Websphere Application Server 6.0.2 .21
IBM Websphere Application Server 6.0.2 .17
IBM Websphere Application Server 6.0.2 .15
IBM Websphere Application Server 6.0.2 .13
IBM Websphere Application Server 6.0.2 .11
IBM Websphere Application Server 6.0.2 .1
IBM Websphere Application Server 6.0.2
IBM Websphere Application Server 6.0.1
IBM Websphere Application Server 6.0 .7
IBM Websphere Application Server 6.0
IBM Websphere Application Server 5.1.1 .9
IBM Websphere Application Server 5.1.1 .8
IBM Websphere Application Server 5.1.1 .7
IBM Websphere Application Server 5.1.1 .6
IBM Websphere Application Server 5.1.1 .5
IBM Websphere Application Server 5.1.1 .4
IBM Websphere Application Server 5.1.1 .3
IBM Websphere Application Server 5.1.1 .2
IBM Websphere Application Server 5.1.1 .19
IBM Websphere Application Server 5.1.1 .18
IBM Websphere Application Server 5.1.1 .17
IBM Websphere Application Server 5.1.1 .16
IBM Websphere Application Server 5.1.1 .15
IBM Websphere Application Server 5.1.1 .14
IBM Websphere Application Server 5.1.1 .13
IBM Websphere Application Server 5.1.1 .12
IBM Websphere Application Server 5.1.1 .11
IBM Websphere Application Server 5.1.1 .10
IBM Websphere Application Server 5.1.1 .1
IBM Websphere Application Server 5.1.1
IBM Websphere Application Server 5.1 .0.5
IBM Websphere Application Server 5.1 .0.4
IBM Websphere Application Server 5.1 .0.3
IBM Websphere Application Server 5.1 .0.2
IBM Websphere Application Server 5.1
IBM Websphere Application Server 5.0.2 .9
IBM Websphere Application Server 5.0.2 .8
IBM Websphere Application Server 5.0.2 .7
IBM Websphere Application Server 5.0.2 .6
IBM Websphere Application Server 5.0.2 .5
IBM Websphere Application Server 5.0.2 .4
IBM Websphere Application Server 5.0.2 .3
IBM Websphere Application Server 5.0.2 .2
IBM Websphere Application Server 5.0.2 .16
IBM Websphere Application Server 5.0.2 .15
IBM Websphere Application Server 5.0.2 .14
IBM Websphere Application Server 5.0.2 .13
IBM Websphere Application Server 5.0.2 .12
IBM Websphere Application Server 5.0.2 .11
IBM Websphere Application Server 5.0.2 .10
IBM Websphere Application Server 5.0.2 .1
IBM Websphere Application Server 5.0.2
IBM Websphere Application Server 5.0.1
IBM Websphere Application Server 5.0
IBM Websphere Application Server 4.0.4
IBM Websphere Application Server 4.0.3
IBM Websphere Application Server 3.5.7
IBM Websphere Application Server 3.5.3
IBM Websphere Application Server 3.5.2
IBM Websphere Application Server 3.5.1
IBM Websphere Application Server 3.5
IBM Websphere Application Server 3.0.2 .1
IBM Websphere Application Server 3.0.2
IBM Websphere Application Server 3.0 .2.4
IBM Websphere Application Server 3.0 .2.3
IBM Websphere Application Server 3.0 .2.2
IBM Websphere Application Server 3.0
- IBM AIX 4.3
- Linux kernel 2.3 .x
- Microsoft Windows NT 4.0
- Novell Netware 5.0
- Sun Solaris 8_sparc
IBM Websphere Application Server 2.0
IBM Websphere Application Server 8.5.0.2
IBM Websphere Application Server 8.5.0.1
IBM Websphere Application Server 8.5.0.0
IBM Websphere Application Server 8.5
IBM Websphere Application Server 8.0.0.6
IBM Websphere Application Server 8.0.0.5
IBM Websphere Application Server 8.0.0.4
IBM Websphere Application Server 8.0.0.3
IBM Websphere Application Server 8.0.0.1
IBM Websphere Application Server 8.0.0.0
IBM Websphere Application Server 8.0
IBM Websphere Application Server 7.0.0.7
IBM Websphere Application Server 7.0.0.6
IBM Websphere Application Server 7.0.0.5
IBM Websphere Application Server 7.0.0.4
IBM Websphere Application Server 7.0.0.27
IBM Websphere Application Server 7.0.0.25
IBM Websphere Application Server 7.0.0.23
IBM Websphere Application Server 7.0.0.19
IBM Websphere Application Server 7.0.0.17
IBM Websphere Application Server 7.0.0.15
IBM Websphere Application Server 7.0.0.14
IBM Websphere Application Server 7.0.0.13
IBM Websphere Application Server 7.0.0.1
IBM Websphere Application Server 7.0.0.0
IBM Websphere Application Server 7.0
IBM Websphere Application Server 7
IBM Websphere Application Server 6.2
IBM Websphere Application Server 6.1.1.0
IBM Websphere Application Server 6.1.0.47
IBM Websphere Application Server 6.1.0.45
IBM Websphere Application Server 6.1.0.43
IBM Websphere Application Server 6.1.0.39
IBM Websphere Application Server 6.1.0.37
IBM Websphere Application Server 6.1.0.35
IBM Websphere Application Server 6.1.0.34
IBM Websphere Application Server 6.1.0.33
IBM Websphere Application Server 6.1.0.31
IBM Websphere Application Server 6.1.0.29
IBM Websphere Application Server 6.1.0.27
IBM Websphere Application Server 6.1
IBM Websphere Application Server 6.0.2.43
IBM Websphere Application Server 6.0.2.41
IBM Websphere Application Server 6.0.2.19
IBM Websphere Application Server 6.0.2 Fix Pack 17
IBM Websphere Application Server 1.0
IBM Security SiteProtector System 3.1.1
IBM Security SiteProtector System 3.1
IBM Security SiteProtector System 3.0
IBM ABYP-4TS-P-M 0
IBM ABYP-4TS-P 0
IBM ABYP-4TL-P-M 0
IBM ABYP-4TL-P 0
IBM ABYP-4T-0S-0L-P-M 0
IBM ABYP-4T-0S-0L-P 0
IBM ABYP-2T-2S-0L-P-M 0
IBM ABYP-2T-2S-0L-P 0
IBM ABYP-2T-1S-1L-P-M 0
IBM ABYP-2T-1S-1L-P 0
IBM ABYP-2T-0S-2L-P-M 0
IBM ABYP-2T-0S-2L-P 0
IBM ABYP-10G-4SR-1-P-M 0
IBM ABYP-10G-4SR-1-P 0
IBM ABYP-10G-4LR-1-P-M 0
IBM ABYP-10G-4LR-1-P 0
IBM ABYP-10G-2SR-2LR-1-P-M 0
IBM ABYP-10G-2SR-2LR-1-P 0
IBM ABYP-0T-4S-0L-P-M 0
IBM ABYP-0T-4S-0L-P 0
IBM ABYP-0T-2S-2L-P-M 0
IBM ABYP-0T-2S-2L-P 0
IBM ABYP-0T-0S-4L-P-M 0
IBM ABYP-0T-0S-4L-P 0
HP VSR (Comware 7) 0
HP U200S and CS (Comware 5) 0
HP U200A and M (Comware 5) 0
HP SMB1920 (Comware 5) R1106
HP SMB1910 (Comware 5) R1108
HP SMB 1620 (Comware 5) R1105
HP SecBlade FW (Comware 5) 0
HP MSR4000 (Comware 7) 0
HP MSR3000 (Comware 7) 0
HP MSR2000 (Comware 7) 0
HP MSR20-1X (Comware 5) 0
HP MSR20 (Comware 5) 0
HP MSR1000 (Comware 7) 0
HP MSR1000 (Comware 5) 0
HP MSR 9XX (Comware 5) 0
HP MSR 93X (Comware 5) 0
HP MSR 50-G2 (Comware 5) 0
HP MSR 30-1X (Comware 5) 0
HP MSR 30-16 (Comware 5) 0
HP MSR 30 (Comware 5) 0
HP Moonshot 0
HP JG768AAE HP PCM+ to IMC Std Upg w/ 200-node E-LTU 0
HP JG767AAE HP IMC SmCnct WSM Vrtl Applnc SW E-LTU 0
HP JG766AAE HP IMC SmCnct Vrtl Applnc SW E-LTU 0
HP JG748AAE HP IMC Ent SW Plat w/ 50 Nodes E-LTU 0
HP JG747AAE HP IMC Std SW Plat w/ 50 Nodes E-LTU 0
HP JG660AAE HP IMC Smart Connect w/WLM VAE E-LTU 0
HP JG590AAE HP IMC Bsc WLAN Mgr SW Pltfm 50 AP E-LTU 0
HP JG550AAE HP PMM to IMC Bsc WLM Upgr w/150AP E-LTU 0
HP JG549AAE HP PCM+ to IMC Std Upgr w/200-node E-LTU 0
HP JG548AAE HP PCM+ to IMC Bsc Upgr w/50-node E-LTU 0
HP JG546AAE HP IMC Basic SW Platform w/50-node E-LTU 0
HP JF378AAE HP IMC Ent S/W Pltfrm w/200-node E-LTU 0
HP JF378A HP IMC Ent S/W Platform w/200-node Lic 0
HP JF377AAE HP IMC Std S/W Pltfrm w/100-node E-LTU 0
HP JF377A HP IMC Std S/W Platform w/100-node Lic 0
HP JF289AAE HP Enterprise Management System to Intelligent Manageme 0
HP JF288AAE HP Network Director to Intelligent Management Center 0
HP JD816A HP A-IMC Standard Edition Software DVD Media 0
HP JD815A HP IMC Std Platform w/100-node License 0
HP JD814A HP A-IMC Enterprise Edition Software DVD Media 0
HP JD808A HP IMC Ent Platform w/100-node License 0
HP JD126A HP IMC Ent S/W Platform w/100-node 0
HP JD125A HP IMC Std S/W Platform w/100-node 0
HP HSR6800 (Comware 7) 0
HP HSR6800 (Comware 5) 0
HP HSR6602 (Comware 5) 0
HP HP870 (Comware 5) 0
HP HP850 (Comware 5) 0
HP HP830 (Comware 5) 0
HP F5000-C/S (Comware 5) 0
HP F1000-E (Comware 5) 0
HP F1000-A-EI (Comware 5) 0
HP Business Service Automation Essentials Core 9.2
HP Business Service Automation Essentials Core 9.1
HP 9500E (Comware 5) 0
HP 7900 (Comware 7) R2122
HP 7500 (Comware 7) 0
HP 7500 (Comware 5) 0
HP 6600 RSE RU (Comware 5 Low Encryption SW) R3303P18
HP 6127XLG 0
HP 6125XLG 0
HP 5950 (Comware 7) 0
HP 5940 (Comware 7) 0
HP 5930 (Comware 7) 0
HP 5920 (Comware 7) 0
HP 5900 (Comware 7) 0
HP 5830 (Comware 5) 0
HP 5800 (Comware 5) 0
HP 5500SI (Comware 5) 0
HP 5500 HI (Comware 5) 0
HP 5500 EI (Comware 5) 0
HP 5130 (Comware 7) R3108P03
HP 5120 SI (Comware 5) 0
HP 5120 EI (Comware 5) 0
HP 4800G (Comware 5) 0
HP 4500G (Comware 5) 0
HP 4210G (Comware 5) 0
HP 12500 (Comware 7) 0
HP 12500 (Comware 5) 0
HP 10500 (Comware 7) 0
HP 10500 (Comware 5) 0
Hitachi Web Server - Security Enhancement 0
Hitachi Web Server 04-10-02 (Windows)
Hitachi Web Server 04-10-02 (Linux)
Hitachi Web Server 04-10-01 Linux (IPF)
Hitachi Web Server 04-10-01 (AIX)
Hitachi Web Server 04-10(Windows)
Hitachi Web Server 04-10 (Linux)
Hitachi Web Server 04-00.(Windows)
Hitachi Web Server 04-00-04 (Windows)
Hitachi Web Server 04-00-03.(Solaris)
Hitachi Web Server 04-00-03 (Linux)
Hitachi Web Server 04-00-02 (AIX)
Hitachi Web Server 04-00-01 (* 2).(Sola
Hitachi Web Server 04-00 Linux
Hitachi Web Server 04-00 (HP-UX (IPF))
Hitachi Web Server 04-00 (AIX)
Hitachi Web Server 03-10-04 (Linux)
Hitachi Web Server 03-10-03 (Windows)
Hitachi Web Server 03-10-02 (Linux(IPF)
Hitachi Web Server 03-10-01 (Windows)
Hitachi Web Server 03-10-01 (Linux)
Hitachi Web Server 03-10-01 (AIX)
Hitachi Web Server 03-10 (Windows)
Hitachi Web Server 03-10 (Solaris)
Hitachi Web Server 03-10 (Linux)
Hitachi Web Server 03-10 (Linux IPF)
Hitachi Web Server 03-10 (AIX)
Hitachi Web Server 03-00-2 (Windows)
Hitachi Web Server 03-00-05 (Windows)
Hitachi Web Server 03-00-05 (HP-UX)
Hitachi Web Server 03-00-05 (AIX)
Hitachi Web Server 03-00-04 (Windows)
Hitachi Web Server 03-00-03 (Windows)
Hitachi Web Server 03-00-02 (Windows)
Hitachi Web Server 03-00-02 (Linux)
Hitachi Web Server 03-00-02 (Linux IPF)
Hitachi Web Server 03-00-02 (AIX)
Hitachi Web Server 03-00-01(*2) (Linux)
Hitachi Web Server 03-00-01 (Windows)
Hitachi Web Server 03-00-01 (Solaris)
Hitachi Web Server 03-00-01 (Linux)
Hitachi Web Server 03-00-01 (Linux IPF)
Hitachi Web Server 03-00-01 (HP-UX)
Hitachi Web Server 03-00-01 (HP-UX IPF)
Hitachi Web Server 03-00-01 (HP-UX 11.0
Hitachi Web Server 03-00-01 (AIX)
Hitachi Web Server 03-00 (Windows)
Hitachi Web Server 03-00 (Solaris)
Hitachi Web Server 03-00 (Linux)
Hitachi Web Server 03-00 (Linux IPF)
Hitachi Web Server 03-00 (HP-UX)
Hitachi Web Server 03-00 (HP-UX IPF)
Hitachi Web Server 03-00 (HP-UX 11.0)
Hitachi Web Server 03-00 (AIX)
Hitachi Web Server 02-06-/F (Linux)
Hitachi Web Server 02-06-/B (Linux)
Hitachi Web Server 02-06-/A (Linux)
Hitachi Web Server 02-04/-E (AIX)
Hitachi Web Server 02-04-/F (Windows)
Hitachi Web Server 02-04-/F (Windows)
Hitachi Web Server 02-04-/F (Solaris)
Hitachi Web Server 02-04-/F (HP-UX)
Hitachi Web Server 02-04-/F (HP-UX IPF)
Hitachi Web Server 02-04-/F (AIX)
Hitachi Web Server 02-04-/E (Windows)
Hitachi Web Server 02-04-/E (HP-UX(IPF)
Hitachi Web Server 02-04-/E (HP-UX IPF)
Hitachi Web Server 02-04-/E (AIX)
Hitachi Web Server 02-04-/D (Windows)
Hitachi Web Server 02-04-/D (Linux(IPF)
Hitachi Web Server 02-04-/C (Solaris)
Hitachi Web Server 02-04-/C (Linux IPF)
Hitachi Web Server 02-04-/C (HP-UX)
Hitachi Web Server 02-04-/C (HP-UX IPF)
Hitachi Web Server 02-04-/C (AIX)
Hitachi Web Server 02-04-/B (Solaris)
Hitachi Web Server 02-04-/B (Linux(IPF)
Hitachi Web Server 02-04-/B (HP-UX)
Hitachi Web Server 02-04-/B (HP-UX IPF)
Hitachi Web Server 02-04-/B (HP-UX 11.0
Hitachi Web Server 02-04-/B (AIX)
Hitachi Web Server 02-04-/A(*2)(Windows
Hitachi Web Server 02-04-/A (Windows IP
Hitachi Web Server 02-03 (Windows IPF)
Hitachi Web Server 02-02 (Linux)
Hitachi Web Server 02-02 (Linux IPF)
Hitachi Web Server 02-02 (HP-UX(IPF))
Hitachi Web Server 02-02 (HP-UX IPF)
Hitachi Web Server 02-00/A(1*) (Linux)
Hitachi Web Server 02-00-/A (Linux)
Hitachi Web Server 02-00(*2) (Linux AP8
Hitachi Web Server 02-00 (Windows)
Hitachi Web Server 02-00 (Turbolinux)
Hitachi Web Server 02-00 (Solaris)
Hitachi Web Server 02-00 (Linux)
Hitachi Web Server 02-00 (Linux AP8000)
Hitachi Web Server 02-00 (HP-UX)
Hitachi Web Server 02-00 (HP-UX 11.0)
Hitachi Web Server 02-00 (AIX)
Hitachi Web Server 01-02-/E(*1) (AIX)
Hitachi Web Server 01-02-/E (AIX)
Hitachi Web Server 01-02-/D(1*) (Solari
Hitachi Web Server 01-02-/D(*1)(HP-UX 1
Hitachi Web Server 01-02-/D(*1) (HP-UX
Hitachi Web Server 01-02-/D (Solaris)
Hitachi Web Server 01-02-/D (HP-UX)
Hitachi Web Server 01-02 (AIX)
Hitachi Web Server 01-01-/D(1*) (Linux)
Hitachi Web Server 01-01-/D (Linux)
Hitachi Web Server 01-01(*2) (Linux for
Hitachi Web Server 01-01 (Turbolinux)
Hitachi Web Server 01-01 (Linux)
Hitachi Web Server 01-01 (Linux MP)
Hitachi Web Server 01-01 (AIX)
Hitachi Web Server 01-00 (Solaris)
Hitachi Web Server 01-00 (HP-UX)
Hitachi Web Server 01-00 (HP-UX 11.0)
Hitachi Web Server 01-00 (HP-UX 10.20)
Hitachi Web Server 0
Hitachi uCosminexus Service Platform(64) 09-60 (Linux)
Hitachi uCosminexus Service Platform(64) 09-50-02 (Linux)
Hitachi uCosminexus Service Platform(64) 09-50-01 (Windows(x6
Hitachi uCosminexus Service Platform(64) 09-50 HP-UX(IPF)
Hitachi uCosminexus Service Platform(64) 09-50 (Windows(x86))
Hitachi uCosminexus Service Platform(64) 09-50 (Windows(x64))
Hitachi uCosminexus Service Platform(64) 09-50 (Linux)
Hitachi uCosminexus Service Platform(64) 09-50 (AIX)
Hitachi uCosminexus Service Platform(64) 09-00-03 (Windows(x8
Hitachi uCosminexus Service Platform(64) 09-00-03 (Linux)
Hitachi uCosminexus Service Platform(64) 09-00-02 HP-UX(IPF)
Hitachi uCosminexus Service Platform(64) 09-00-02 (Windows(x6
Hitachi uCosminexus Service Platform(64) 09-00-02 (AIX)
Hitachi uCosminexus Service Platform(64) 09-00 HP-UX(IPF)
Hitachi uCosminexus Service Platform(64) 09-00 (Windows(x86))
Hitachi uCosminexus Service Platform(64) 09-00 (Windows(x64))
Hitachi uCosminexus Service Platform(64) 09-00 (Linux)
Hitachi uCosminexus Service Platform(64) 09-00 (AIX)
Hitachi uCosminexus Service Platform 09-60 (Linux)
Hitachi uCosminexus Service Platform 09-50-02 (Linux)
Hitachi uCosminexus Service Platform 09-50-01 (Windows(x6
Hitachi uCosminexus Service Platform 09-50 HP-UX(IPF)
Hitachi uCosminexus Service Platform 09-50 (Windows)
Hitachi uCosminexus Service Platform 09-50 (Windows(x86))
Hitachi uCosminexus Service Platform 09-50 (Windows(x64))
Hitachi uCosminexus Service Platform 09-50 (Linux)
Hitachi uCosminexus Service Platform 09-50 (HP-UX(IPF))
Hitachi uCosminexus Service Platform 09-50 (AIX)
Hitachi uCosminexus Service Platform 09-00-03 (Windows(x8
Hitachi uCosminexus Service Platform 09-00-03 (Linux)
Hitachi uCosminexus Service Platform 09-00-02 HP-UX(IPF)
Hitachi uCosminexus Service Platform 09-00-02 (Windows(x6
Hitachi uCosminexus Service Platform 09-00-02 (AIX)
Hitachi uCosminexus Service Platform 09-00 Windows (x64)
Hitachi uCosminexus Service Platform 09-00 Linux (x64)
Hitachi uCosminexus Service Platform 09-00 HP-UX(IPF)
Hitachi uCosminexus Service Platform 09-00 HP-UX (IPF)
Hitachi uCosminexus Service Platform 09-00 AIX (64)
Hitachi uCosminexus Service Platform 09-00 (Windows)
Hitachi uCosminexus Service Platform 09-00 (Windows(x86))
Hitachi uCosminexus Service Platform 09-00 (Windows(x64))
Hitachi uCosminexus Service Platform 09-00 (Linux)
Hitachi uCosminexus Service Platform 09-00 (HP-UX(IPF))
Hitachi uCosminexus Service Platform 09-00 (AIX)
Hitachi uCosminexus Service Platform 0
Hitachi uCosminexus Service Architect 09-60 (Linux)
Hitachi uCosminexus Service Architect 09-50-02 (Linux)
Hitachi uCosminexus Service Architect 09-50-01 (Windows(x6
Hitachi uCosminexus Service Architect 09-50 HP-UX(IPF)
Hitachi uCosminexus Service Architect 09-50 (Windows)
Hitachi uCosminexus Service Architect 09-50 (Windows(x86))
Hitachi uCosminexus Service Architect 09-50 (Windows(x64))
Hitachi uCosminexus Service Architect 09-50 (Linux)
Hitachi uCosminexus Service Architect 09-50 (HP-UX(IPF))
Hitachi uCosminexus Service Architect 09-50 (AIX)
Hitachi uCosminexus Service Architect 09-00-03 (Windows(x8
Hitachi uCosminexus Service Architect 09-00-03 (Linux)
Hitachi uCosminexus Service Architect 09-00-02 HP-UX(IPF)
Hitachi uCosminexus Service Architect 09-00-02 (Windows(x6
Hitachi uCosminexus Service Architect 09-00-02 (AIX)
Hitachi uCosminexus Service Architect 09-00 HP-UX(IPF)
Hitachi uCosminexus Service Architect 09-00 (Windows(x86))
Hitachi uCosminexus Service Architect 09-00 (Windows(x64))
Hitachi uCosminexus Service Architect 09-00 (Linux)
Hitachi uCosminexus Service Architect 09-00 (HP-UX(IPF))
Hitachi uCosminexus Service Architect 09-00 (AIX)
Hitachi uCosminexus Service Architect 09-00
Hitachi uCosminexus Service Architect 0
Hitachi uCosminexus Primary Server Base(64) 09-60 (Linux)
Hitachi uCosminexus Primary Server Base(64) 09-50-02 (Linux)
Hitachi uCosminexus Primary Server Base(64) 09-50-01 (Windows(x6
Hitachi uCosminexus Primary Server Base(64) 09-50 HP-UX(IPF)
Hitachi uCosminexus Primary Server Base(64) 09-50 (Windows(x86))
Hitachi uCosminexus Primary Server Base(64) 09-50 (Windows(x64))
Hitachi uCosminexus Primary Server Base(64) 09-50 (Linux)
Hitachi uCosminexus Primary Server Base(64) 09-50 (AIX)
Hitachi uCosminexus Primary Server Base(64) 09-00-03 (Windows(x8
Hitachi uCosminexus Primary Server Base(64) 09-00-03 (Linux)
Hitachi uCosminexus Primary Server Base(64) 09-00-02 HP-UX(IPF)
Hitachi uCosminexus Primary Server Base(64) 09-00-02 (Windows(x6
Hitachi uCosminexus Primary Server Base(64) 09-00-02 (AIX)
Hitachi uCosminexus Primary Server Base(64) 09-00 HP-UX(IPF)
Hitachi uCosminexus Primary Server Base(64) 09-00 (Windows(x86))
Hitachi uCosminexus Primary Server Base(64) 09-00 (Windows(x64))
Hitachi uCosminexus Primary Server Base(64) 09-00 (Linux)
Hitachi uCosminexus Primary Server Base(64) 09-00 (AIX)
Hitachi uCosminexus Primary Server Base 09-50-02 (Linux)
Hitachi uCosminexus Primary Server Base 09-50-01 (Windows(x6
Hitachi uCosminexus Primary Server Base 09-50 HP-UX(IPF)
Hitachi uCosminexus Primary Server Base 09-50 (Windows)
Hitachi uCosminexus Primary Server Base 09-50 (Windows(x86))
Hitachi uCosminexus Primary Server Base 09-50 (Windows(x64))
Hitachi uCosminexus Primary Server Base 09-50 (Linux)
Hitachi uCosminexus Primary Server Base 09-50 (HP-UX(IPF))
Hitachi uCosminexus Primary Server Base 09-50 (AIX)
Hitachi uCosminexus Primary Server Base 09-00-03 (Windows(x8
Hitachi uCosminexus Primary Server Base 09-00-03 (Linux)
Hitachi uCosminexus Primary Server Base 09-00-02 HP-UX(IPF)
Hitachi uCosminexus Primary Server Base 09-00-02 (Windows(x6
Hitachi uCosminexus Primary Server Base 09-00-02 (AIX)
Hitachi uCosminexus Primary Server Base 09-00 HP-UX(IPF)
Hitachi uCosminexus Primary Server Base 09-00 (Windows)
Hitachi uCosminexus Primary Server Base 09-00 (Windows(x86))
Hitachi uCosminexus Primary Server Base 09-00 (Windows(x64))
Hitachi uCosminexus Primary Server Base 09-00 (Linux)
Hitachi uCosminexus Primary Server Base 09-00 (HP-UX(IPF))
Hitachi uCosminexus Primary Server Base 09-00 (AIX)
Hitachi uCosminexus Primary Server Base 0
Hitachi uCosminexus Operator for Service Platform 09-50 (Windows)
Hitachi uCosminexus Operator for Service Platform 09-50 (Windows(x64))
Hitachi uCosminexus Operator for Service Platform 09-50 (Linux)
Hitachi uCosminexus Operator for Service Platform 09-50 (HP-UX(IPF))
Hitachi uCosminexus Operator for Service Platform 09-50 (AIX)
Hitachi uCosminexus Operator for Service Platform 09-00 (Windows)
Hitachi uCosminexus Operator for Service Platform 09-00 (Windows(x64))
Hitachi uCosminexus Operator for Service Platform 09-00 (Linux)
Hitachi uCosminexus Operator for Service Platform 09-00 (HP-UX(IPF))
Hitachi uCosminexus Operator for Service Platform 09-00 (AIX)
Hitachi uCosminexus Developer Standard 6.7
Hitachi uCosminexus Developer Standard 0
Hitachi uCosminexus Developer Professional for Plug-in 0
Hitachi uCosminexus Developer Professional 6.7
Hitachi uCosminexus Developer Professional 0
Hitachi uCosminexus Developer Light 6.7
Hitachi uCosminexus Developer 01 0
Hitachi uCosminexus Developer 09-60 (Linux)
Hitachi uCosminexus Developer 09-50-02 (Linux)
Hitachi uCosminexus Developer 09-50-01 (Windows(x6
Hitachi uCosminexus Developer 09-50 HP-UX(IPF)
Hitachi uCosminexus Developer 09-50 (Windows)
Hitachi uCosminexus Developer 09-50 (Windows(x86))
Hitachi uCosminexus Developer 09-50 (Windows(x64))
Hitachi uCosminexus Developer 09-50 (Linux)
Hitachi uCosminexus Developer 09-50 (HP-UX(IPF))
Hitachi uCosminexus Developer 09-50 (AIX)
Hitachi uCosminexus Developer 09-00-03 (Windows(x8
Hitachi uCosminexus Developer 09-00-03 (Linux)
Hitachi uCosminexus Developer 09-00-02 HP-UX(IPF)
Hitachi uCosminexus Developer 09-00-02 (Windows(x6
Hitachi uCosminexus Developer 09-00-02 (AIX)
Hitachi uCosminexus Developer 09-00 HP-UX(IPF)
Hitachi uCosminexus Developer 09-00 (Windows(x86))
Hitachi uCosminexus Developer 09-00 (Windows(x64))
Hitachi uCosminexus Developer 09-00 (Linux)
Hitachi uCosminexus Developer 09-00 (AIX)
Hitachi uCosminexus Developer 09-00
Hitachi uCosminexus Developer 0
Hitachi uCosminexus Client 09-50 (Windows)
Hitachi uCosminexus Client 09-50 (Windows(x64))
Hitachi uCosminexus Client 09-50 (Linux)
Hitachi uCosminexus Client 09-50 (HP-UX(IPF))
Hitachi uCosminexus Client 09-50 (AIX)
Hitachi uCosminexus Client 09-00 (Windows)
Hitachi uCosminexus Client 09-00 (Windows(x64))
Hitachi uCosminexus Client 09-00 (Linux)
Hitachi uCosminexus Client 09-00 (HP-UX(IPF))
Hitachi uCosminexus Client 09-00 (AIX)
Hitachi uCosminexus Client 09-00
Hitachi uCosminexus Client 0
Hitachi uCosminexus Application Server-r 09-60 (Linux)
Hitachi uCosminexus Application Server-r 09-50-02 (Linux)
Hitachi uCosminexus Application Server-r 09-50-01 (Windows(x6
Hitachi uCosminexus Application Server-r 09-50 HP-UX(IPF)
Hitachi uCosminexus Application Server-r 09-50 (Windows)
Hitachi uCosminexus Application Server-r 09-50 (Windows(x86))
Hitachi uCosminexus Application Server-r 09-50 (Windows(x64))
Hitachi uCosminexus Application Server-r 09-50 (Linux)
Hitachi uCosminexus Application Server-r 09-50 (HP-UX(IPF))
Hitachi uCosminexus Application Server-r 09-50 (AIX)
Hitachi uCosminexus Application Server-r 09-00-03 (Windows(x8
Hitachi uCosminexus Application Server-r 09-00-03 (Linux)
Hitachi uCosminexus Application Server-r 09-00-02 HP-UX(IPF)
Hitachi uCosminexus Application Server-r 09-00-02 (Windows(x6
Hitachi uCosminexus Application Server-r 09-00-02 (AIX)
Hitachi uCosminexus Application Server-r 09-00 HP-UX(IPF)
Hitachi uCosminexus Application Server-r 09-00 (Windows)
Hitachi uCosminexus Application Server-r 09-00 (Windows(x86))
Hitachi uCosminexus Application Server-r 09-00 (Windows(x64))
Hitachi uCosminexus Application Server-r 09-00 (Linux)
Hitachi uCosminexus Application Server-r 09-00 (HP-UX(IPF))
Hitachi uCosminexus Application Server-r 09-00 (AIX)
Hitachi uCosminexus Application Server-r 0
Hitachi uCosminexus Application Server(64) 09-60 (Linux)
Hitachi uCosminexus Application Server(64) 09-50-02 (Linux)
Hitachi uCosminexus Application Server(64) 09-50-01 (Windows(x6
Hitachi uCosminexus Application Server(64) 09-50 HP-UX(IPF)
Hitachi uCosminexus Application Server(64) 09-50 (Windows(x86))
Hitachi uCosminexus Application Server(64) 09-50 (Windows(x64))
Hitachi uCosminexus Application Server(64) 09-50 (Linux)
Hitachi uCosminexus Application Server(64) 09-50 (AIX)
Hitachi uCosminexus Application Server(64) 09-00-03 (Windows(x8
Hitachi uCosminexus Application Server(64) 09-00-03 (Linux)
Hitachi uCosminexus Application Server(64) 09-00-02 HP-UX(IPF)
Hitachi uCosminexus Application Server(64) 09-00-02 (Windows(x6
Hitachi uCosminexus Application Server(64) 09-00-02 (AIX)
Hitachi uCosminexus Application Server(64) 09-00 HP-UX(IPF)
Hitachi uCosminexus Application Server(64) 09-00 (Windows(x86))
Hitachi uCosminexus Application Server(64) 09-00 (Windows(x64))
Hitachi uCosminexus Application Server(64) 09-00 (Linux)
Hitachi uCosminexus Application Server(64) 09-00 (AIX)
Hitachi uCosminexus Application Server Standard-R 0
Hitachi uCosminexus Application Server Standard 6.7
Hitachi uCosminexus Application Server Standard 0
Hitachi uCosminexus Application Server Smart Edition 0
Hitachi uCosminexus Application Server Express 09-70 (AIX)
Hitachi uCosminexus Application Server Enterprise 6.7
Hitachi uCosminexus Application Server Enterprise 09-80 (Windows(x64))
Hitachi uCosminexus Application Server 09-60 (Linux)
Hitachi uCosminexus Application Server 09-50-02 (Linux)
Hitachi uCosminexus Application Server 09-50-01 (Windows(x6
Hitachi uCosminexus Application Server 09-50 HP-UX(IPF)
Hitachi uCosminexus Application Server 09-50 (Windows(x86))
Hitachi uCosminexus Application Server 09-50 (Windows(x64))
Hitachi uCosminexus Application Server 09-50 (Linux)
Hitachi uCosminexus Application Server 09-50 (HP-UX(IPF))
Hitachi uCosminexus Application Server 09-50 (AIX)
Hitachi uCosminexus Application Server 09-00-03 (Windows(x8
Hitachi uCosminexus Application Server 09-00-03 (Linux)
Hitachi uCosminexus Application Server 09-00-02 HP-UX(IPF)
Hitachi uCosminexus Application Server 09-00-02 (Windows(x6
Hitachi uCosminexus Application Server 09-00-02 (AIX)
Hitachi uCosminexus Application Server 09-00 HP-UX(IPF)
Hitachi uCosminexus Application Server 09-00 (Windows(x86))
Hitachi uCosminexus Application Server 0
Hitachi uCosminexus Application Server 09-00
Hitachi Hitachi Web Server 04-10-03 Windows (x64)
Hitachi Hitachi Web Server 04-10-01 Windows (x64)
Hitachi Hitachi Web Server 03-00-06 Windows 0
Hitachi Hitachi Web Server - Security Enhancement 02-04-/B (Hitachi)
Hitachi Hitachi Web Server 04-10-03 Windows
Hitachi Hitachi Web Server 04-10-02 HP-UX (IPF)
Hitachi Hitachi Web Server 04-10-01 HP-UX (IPF)
Hitachi Hitachi Web Server 04-10 Windows
Hitachi Hitachi Web Server 04-00-05 Windows
Hitachi Hitachi Web Server 04-00-04 HP-UX (IPF)
Hitachi Hitachi Web Server 04-00-01 Solaris
Hitachi Hitachi Web Server 04-00 Windows
Hitachi Hitachi Web Server 04-00 Linux (IPF)
Hitachi Hitachi Web Server 04-00 Linux
Hitachi Hitachi Web Server 04-00 HP-UX (IPF)
Hitachi Hitachi Web Server 04-00 AIX
Hitachi Hitachi Web Server 03-10-10 Windows
Hitachi Hitachi Web Server 03-10-09 HP-UX (IPF)
Hitachi Hitachi Web Server 03-10 Windows
Hitachi Hitachi Web Server 03-10 HP-UX (IPF)
Hitachi Hitachi Web Server 03-00-05 HP-UX (IPF)
Hitachi Hitachi Web Server 03-00-02 (Windows)
Hitachi Hitachi Web Server 03-00-01 HP-UX
Hitachi Hitachi Web Server 03-00-01 (HP-UX(IPF)
Hitachi Hitachi Web Server 03-00 Windows
Hitachi Hitachi Web Server 03-00 Solaris
Hitachi Hitachi Web Server 03-00 Linux (IPF)
Hitachi Hitachi Web Server 03-00 Linux
Hitachi Hitachi Web Server 03-00 HP-UX (IPF)
Hitachi Hitachi Web Server 03-00 HP-UX
Hitachi Hitachi Web Server 03-00 AIX
Hitachi Hitachi Web Server 02-05 (Linux)
Hitachi Hitachi Web Server 02-04-/C (Windows)
Hitachi Hitachi Web Server 02-04-/B (Windows)
Hitachi Hitachi Web Server 02-04-/B (Linux(IPF)
Hitachi Hitachi Web Server 02-04-/A (Windows)
Hitachi Hitachi Web Server 02-04-/A (Windows(IP
Hitachi Hitachi Web Server 02-04-/A (Solaris)
Hitachi Hitachi Web Server 02-04-/A (Linux IPF)
Hitachi Hitachi Web Server 02-04-/A (HP-UX)
Hitachi Hitachi Web Server 02-04-/A (AIX)
Hitachi Hitachi Web Server 02-04 (Windows)
Hitachi Hitachi Web Server 02-04 (Linux)
Hitachi Hitachi Web Server 02-04 (HP-UX(IPF))
Hitachi Hitachi Web Server 02-03 (Windows)
Hitachi Hitachi Web Server 02-03 (Solaris)
Hitachi Hitachi Web Server 02-03 (Linux)
Hitachi Hitachi Web Server 02-03 (Linux IPF)
Hitachi Hitachi Web Server 02-03 (HP-UX)
Hitachi Hitachi Web Server 02-03 (HP-UX(IPF))
Hitachi Hitachi Web Server 02-03 (AIX)
Hitachi Hitachi Web Server 02-02 (Windows)
Hitachi Hitachi Web Server 02-02 (Solaris)
Hitachi Hitachi Web Server 02-02 (HP-UX)
Hitachi Hitachi Web Server 02-02 (AIX)
Hitachi Hitachi Web Server 02-01 (Windows)
Hitachi Hitachi Web Server 02-01 (Solaris)
Hitachi Hitachi Web Server 02-01 (HP-UX)
Hitachi Hitachi Web Server 02-01 (AIX)
Hitachi Hitachi Web Server 01-02-/D (AIX)
Hitachi Hitachi Web Server 01-02-/C (Solaris)
Hitachi Hitachi Web Server 01-02-/C (HP-UX)
Hitachi Hitachi Web Server 01-02-/C (AIX)
Hitachi Hitachi Web Server 01-02-/B (Solaris)
Hitachi Hitachi Web Server 01-02-/B (HP-UX)
Hitachi Hitachi Web Server 01-02-/B (AIX)
Hitachi Hitachi Web Server 01-02-/A (Solaris)
Hitachi Hitachi Web Server 01-02-/A (HP-UX)
Hitachi Hitachi Web Server 01-02-/A (AIX)
Hitachi Hitachi Web Server 01-02 (Solaris)
Hitachi Hitachi Web Server 01-02 (HP-UX)
Hitachi Cosminexus Primary Server Base 6.0
Hitachi Cosminexus Primary Server Base 0
Hitachi Cosminexus Primary Server 6.0
Hitachi Cosminexus HTTP Server 09-00-10 Windows
Hitachi Cosminexus HTTP Server 09-00-10 Linux(x64)
Hitachi Cosminexus HTTP Server 09-00-10 HP-UX(IPF)
Hitachi Cosminexus HTTP Server 09-00-10 (AIX)
Hitachi Cosminexus HTTP Server 09-00 Windows(x64)
Hitachi Cosminexus HTTP Server 09-00 Windows
Hitachi Cosminexus HTTP Server 09-00 Linux(x64)
Hitachi Cosminexus HTTP Server 09-00 HP-UX(IPF)
Hitachi Cosminexus HTTP Server 09-00 (AIX)
Hitachi Cosminexus Developer Standard 6.0
Hitachi Cosminexus Developer Professional 6.0
Hitachi Cosminexus Developer 5.0
Hitachi Cosminexus Developer 6.0
Hitachi Cosminexus Application Server Standard 6.0
Hitachi Cosminexus Application Server no version 0
Hitachi Cosminexus Application Server Enterprise 6.0
Hitachi Cosminexus Application Server 6.0
Hitachi Cosminexus Application Server 5.0
Hitachi Cosminexus 9.0
Hitachi Cosminexus 8.0
Hitachi Cosminexus 7.0
Hitachi Cosminexus 6.0
Hitachi Cosminexus 5.0
Google Chrome 27.0.1444 3
Google Chrome 25.0.1364 160
Google Chrome 17.0.963 79
Google Chrome 17.0.963 65
Google Chrome 16.0.912 75
Google Chrome 15.0.874 102
Google Chrome 6.0.472 55
Google Chrome 5.0.375 99
Google Chrome 5.0.375 86
Google Chrome 5.0.375 127
Google Chrome 5.0.375 125
Google Chrome 5.0.375 .70
Google Chrome 5.0.375 .55
Google Chrome 4.1.249 1064
Google Chrome 4.1.249 1059
Google Chrome 4.1.249 1036
Google Chrome 4.1.249 .1045
Google Chrome 4.1.249 .1042
Google Chrome 4.0.249 .89
Google Chrome 4.0.249 .78
Google Chrome 3.0.195 .38
Google Chrome 3.0.195 .33
Google Chrome 3.0.195 .32
Google Chrome 3.0.195 .24
Google Chrome 3.0.195 .21
Google Chrome 2.0.172 .43
Google Chrome 2.0.172 .37
Google Chrome 2.0.172 .33
Google Chrome 2.0.172 .31
Google Chrome 2.0.172 .30
Google Chrome 1.0.154 .61
Google Chrome 9.0.597.94
Google Chrome 9.0.597.84
Google Chrome 9.0.597.107
Google Chrome 9
Google Chrome 8.0.552.344
Google Chrome 8.0.552.310
Google Chrome 8.0.552.309
Google Chrome 8.0.552.308
Google Chrome 8.0.552.307
Google Chrome 8.0.552.306
Google Chrome 8.0.552.305
Google Chrome 8.0.552.304
Google Chrome 8.0.552.303
Google Chrome 8.0.552.302
Google Chrome 8.0.552.301
Google Chrome 8.0.552.300
Google Chrome 8.0.552.237
Google Chrome 8.0.552.226
Google Chrome 8.0.552.225
Google Chrome 8.0.552.224
Google Chrome 8.0.552.223
Google Chrome 8.0.552.222
Google Chrome 8.0.552.221
Google Chrome 8.0.552.220
Google Chrome 8.0.552.219
Google Chrome 8.0.552.218
Google Chrome 8.0.552.217
Google Chrome 8.0.552.216
Google Chrome 8.0.552.215
Google Chrome 8.0.552.214
Google Chrome 8.0.552.213
Google Chrome 8.0.552.212
Google Chrome 8.0.552.211
Google Chrome 8.0.552.210
Google Chrome 8.0.552.21
Google Chrome 8.0.552.209
Google Chrome 8.0.552.208
Google Chrome 8.0.552.207
Google Chrome 8.0.552.206
Google Chrome 8.0.552.205
Google Chrome 8.0.552.204
Google Chrome 8.0.552.203
Google Chrome 8.0.552.202
Google Chrome 8.0.552.201
Google Chrome 8.0.552.200
Google Chrome 8.0.552.20
Google Chrome 8.0.552.2
Google Chrome 8.0.552.19
Google Chrome 8.0.552.18
Google Chrome 8.0.552.17
Google Chrome 8.0.552.16
Google Chrome 8.0.552.15
Google Chrome 8.0.552.14
Google Chrome 8.0.552.13
Google Chrome 8.0.552.12
Google Chrome 8.0.552.11
Google Chrome 8.0.552.105
Google Chrome 8.0.552.104
Google Chrome 8.0.552.103
Google Chrome 8.0.552.102
Google Chrome 8.0.552.101
Google Chrome 8.0.552.100
Google Chrome 8.0.552.10
Google Chrome 8.0.552.1
Google Chrome 8.0.552.0
Google Chrome 8.0.551.1
Google Chrome 8.0.551.0
Google Chrome 8.0.550.0
Google Chrome 8.0.549.0
Google Chrome 7.0.548.0
Google Chrome 7.0.517.44
Google Chrome 7.0.517.43
Google Chrome 7.0.517.41
Google Chrome 65
Google Chrome 64
Google Chrome 6.0.472.62
Google Chrome 6.0.472.59
Google Chrome 6.0.472.53
Google Chrome 4.0.211.0
Google Chrome 4
Google Chrome 3.0 Beta
Google Chrome 3
Google Chrome 26.0.1410.43
Google Chrome 26.0.1410.28
Google Chrome 25.0.1364.99
Google Chrome 25.0.1364.97
Google Chrome 25.0.1364.172
Google Chrome 25.0.1364.152
Google Chrome 25
Google Chrome 24.0.1312.70
Google Chrome 24.0.1312.57
Google Chrome 24.0.1312.56
Google Chrome 24.0.1312.52
Google Chrome 23.0.1271.97
Google Chrome 23.0.1271.95
Google Chrome 23.0.1271.91
Google Chrome 23.0.1271.64
Google Chrome 22.0.1229.94
Google Chrome 22.0.1229.92
Google Chrome 22.0.1229.79
Google Chrome 22
Google Chrome 21.0.1180.89
Google Chrome 21.0.1180.83
Google Chrome 21.0.1180.82
Google Chrome 21.0.1180.81
Google Chrome 21.0.1180.79
Google Chrome 21.0.1180.75
Google Chrome 21.0.1180.60
Google Chrome 21.0.1180.57
Google Chrome 21.0.1180.50
Google Chrome 21.0.1180.49
Google Chrome 21
Google Chrome 20.0.1132.57
Google Chrome 20.0.1132.43
Google Chrome 20.0.1132.23
Google Chrome 20
Google Chrome 19.0.1084.52
Google Chrome 19.0.1084.21
Google Chrome 19
Google Chrome 18.0.1025.168
Google Chrome 18.0.1025.162
Google Chrome 18.0.1025.151
Google Chrome 18.0.1025.142
Google Chrome 18
Google Chrome 17.0.963.83
Google Chrome 17.0.963.78
Google Chrome 17.0.963.60
Google Chrome 17.0.963.56
Google Chrome 17.0.963.46
Google Chrome 17
Google Chrome 16.0.912.77
Google Chrome 16.0.912.75
Google Chrome 16.0.912.63
Google Chrome 16
Google Chrome 15.0.874.121
Google Chrome 15.0.874.120
Google Chrome 15
Google Chrome 14.0.835.202
Google Chrome 14.0.835.186
Google Chrome 14.0.835.163
Google Chrome 14
Google Chrome 13.0.782.215
Google Chrome 13.0.782.112
Google Chrome 13.0.782.107
Google Chrome 13
Google Chrome 12.0.742.91
Google Chrome 12.0.742.112
Google Chrome 12.0.742.100
Google Chrome 12
Google Chrome 11.0.696.77
Google Chrome 11.0.696.71
Google Chrome 11.0.696.68
Google Chrome 11.0.696.65
Google Chrome 11.0.696.57
Google Chrome 11.0.696.43
Google Chrome 11.0.672.2
Google Chrome 11
Google Chrome 10.0.648.205
Google Chrome 10.0.648.205
Google Chrome 10.0.648.204
Google Chrome 10.0.648.133
Google Chrome 10.0.648.128
Google Chrome 10.0.648.127
Google Chrome 10.0.648.127
Google Chrome 10
Google Chrome 1.0.154.65
Google Chrome 1.0.154.64
Google Chrome 1.0.154.59
Google Chrome 1.0.154.55
Google Chrome 1.0.154.53
Google Chrome 1.0.154.48
Google Chrome 1.0.154.46
Google Chrome 1.0.154.36
Gentoo Linux
F5 FirePass 7.0
F5 FirePass 6.1
F5 FirePass 6.0
F5 Enterprise Manager 3.1.1
F5 Enterprise Manager 3.1
F5 Enterprise Manager 3.0
F5 Enterprise Manager 2.3
F5 Enterprise Manager 2.1
F5 Enterprise Manager 2.0
F5 Enterprise Manager 1.8
F5 Enterprise Manager 1.6
F5 BIG-IQ Security 4.3
F5 BIG-IQ Security 4.2
F5 BIG-IQ Security 4.1
F5 BIG-IQ Security 4.0
F5 BIG-IQ Cloud 4.3
F5 BIG-IQ Cloud 4.2
F5 BIG-IQ Cloud 4.1
F5 BIG-IQ Cloud 4.0
F5 BIG-IP WOM 11.2
F5 BIG-IP WOM 11.0
F5 BIG-IP WOM 10.2.4
F5 BIG-IP WOM 10.2.2
F5 BIG-IP WOM 10.2.1
F5 BIG-IP WOM 10.0
F5 BIG-IP WOM 11.3.0
F5 BIG-IP WOM 11.2.1 HF5
F5 BIG-IP WOM 11.2.1 HF3
F5 BIG-IP WOM 11.2.1
F5 BIG-IP WOM 11.2.0 HF5
F5 BIG-IP WOM 11.2.0 HF3
F5 BIG-IP WOM 11.1.0 HF7
F5 BIG-IP WOM 11.1.0
F5 BIG-IP WOM 10.2.1 HF1
F5 BIG-IP WebAccelerator 9.4.8 0
F5 BIG-IP WebAccelerator 11.2.0 0
F5 BIG-IP WebAccelerator 11.3
F5 BIG-IP WebAccelerator 11.2.1 HF3
F5 BIG-IP WebAccelerator 11.2.1
F5 BIG-IP WebAccelerator 11.2 HF3
F5 BIG-IP WebAccelerator 11.1
F5 BIG-IP WebAccelerator 11.0
F5 BIG-IP WebAccelerator 10.2.4
F5 BIG-IP WebAccelerator 10.2.1
F5 BIG-IP WebAccelerator 10.0
F5 BIG-IP WebAccelerator 9.4
F5 BIG-IP WebAccelerator 11.2.1 HF5
F5 BIG-IP WebAccelerator 11.2.0 HF5
F5 BIG-IP WebAccelerator 11.1.0 HF7
F5 BIG-IP WebAccelerator 10.2.1 HF1
F5 BIG-IP PSM 11.5.1
F5 BIG-IP PSM 11.5
F5 BIG-IP PSM 11.4.1
F5 BIG-IP PSM 11.3
F5 BIG-IP PSM 11.2
F5 BIG-IP PSM 11.1
F5 BIG-IP PSM 11.0
F5 BIG-IP PSM 10.2.4
F5 BIG-IP PSM 10.2.1
F5 BIG-IP PSM 10.0
F5 BIG-IP PSM 9.4.8
F5 BIG-IP PSM 9.4.5
F5 BIG-IP PSM 11.3.0 HF4
F5 BIG-IP PSM 11.2.1 HF5
F5 BIG-IP PSM 11.2.1 HF3
F5 BIG-IP PSM 11.2.1 HF2
F5 BIG-IP PSM 11.2.1 HF1
F5 BIG-IP PSM 11.2.1
F5 BIG-IP PSM 11.2.0 HF5
F5 BIG-IP PSM 11.2.0 HF3
F5 BIG-IP PSM 11.2.0 HF2
F5 BIG-IP PSM 11.1.0 HF7
F5 BIG-IP PSM 10.2.1 HF1
F5 BIG-IP PEM 11.5.1
F5 BIG-IP PEM 11.5
F5 BIG-IP PEM 11.3
F5 BIG-IP PEM 11.4.1
F5 BIG-IP PEM 11.3.0 HF4
F5 BIG-IP LTM 11.5.1
F5 BIG-IP LTM 11.5
F5 BIG-IP LTM 11.2.1 HF3
F5 BIG-IP LTM 11.2 HF3
F5 BIG-IP LTM 11.2
F5 BIG-IP LTM 11.0
F5 BIG-IP LTM 10.2.4
F5 BIG-IP LTM 10.2.2
F5 BIG-IP LTM 10.0
F5 BIG-IP LTM 9.6.1
F5 BIG-IP LTM 9.4.8
F5 BIG-IP LTM 9.0
F5 BIG-IP LTM 11.5
F5 BIG-IP LTM 11.4.1
F5 BIG-IP LTM 11.3.0 HF4
F5 BIG-IP LTM 11.3.0
F5 BIG-IP LTM 11.2.1 HF5
F5 BIG-IP LTM 11.2.1 HF2
F5 BIG-IP LTM 11.2.1 HF1
F5 BIG-IP LTM 11.2.1
F5 BIG-IP LTM 11.2.0 HF5
F5 BIG-IP LTM 11.2.0 HF2
F5 BIG-IP LTM 11.1.0 HF7
F5 BIG-IP LTM 11.1.0
F5 BIG-IP LTM 10.2.1 HF1
F5 BIG-IP LTM 10.2.1
F5 BIG-IP Link Controller 9.4.8 0
F5 BIG-IP Link Controller 11.2.0 0
F5 BIG-IP Link Controller 11.5.1
F5 BIG-IP Link Controller 11.5
F5 BIG-IP Link Controller 11.3
F5 BIG-IP Link Controller 11.2.1 HF3
F5 BIG-IP Link Controller 11.2.1
F5 BIG-IP Link Controller 11.2 HF3
F5 BIG-IP Link Controller 11.1
F5 BIG-IP Link Controller 11.0
F5 BIG-IP Link Controller 10.2.4
F5 BIG-IP Link Controller 10.2.2
F5 BIG-IP Link Controller 10.2.1
F5 BIG-IP Link Controller 10.0
F5 BIG-IP Link Controller 9.2.2
F5 BIG-IP Link Controller 11.4.1
F5 BIG-IP Link Controller 11.3.0 HF4
F5 BIG-IP Link Controller 11.2.1 HF5
F5 BIG-IP Link Controller 11.2.1 HF2
F5 BIG-IP Link Controller 11.2.1 HF1
F5 BIG-IP Link Controller 11.2.0 HF5
F5 BIG-IP Link Controller 11.2.0 HF2
F5 BIG-IP Link Controller 11.1.0 HF7
F5 BIG-IP Link Controller 10.2.1 HF1
F5 BIG-IP GTM 11.5.1
F5 BIG-IP GTM 11.5
F5 BIG-IP GTM 11.3
F5 BIG-IP GTM 11.2.1 HF3
F5 BIG-IP GTM 11.2
F5 BIG-IP GTM 11.0
F5 BIG-IP GTM 10.2.4
F5 BIG-IP GTM 10.2.2
F5 BIG-IP GTM 10.2.1
F5 BIG-IP GTM 10.0
F5 BIG-IP GTM 9.4.8
F5 BIG-IP GTM 9.2.2
F5 BIG-IP GTM 11.4.1
F5 BIG-IP GTM 11.3.0 HF4
F5 BIG-IP GTM 11.2.1 HF5
F5 BIG-IP GTM 11.2.1 HF2
F5 BIG-IP GTM 11.2.1 HF1
F5 BIG-IP GTM 11.2.1
F5 BIG-IP GTM 11.2.0 HF5
F5 BIG-IP GTM 11.2.0 HF3
F5 BIG-IP GTM 11.2.0 HF2
F5 BIG-IP GTM 11.1.0 HF7
F5 BIG-IP GTM 11.1.0
F5 BIG-IP GTM 10.2.1 HF1
F5 BIG-IP Edge Gateway 11.3
F5 BIG-IP Edge Gateway 11.2.1 HF3
F5 BIG-IP Edge Gateway 11.2.1
F5 BIG-IP Edge Gateway 11.2 HF3
F5 BIG-IP Edge Gateway 11.2
F5 BIG-IP Edge Gateway 11.1
F5 BIG-IP Edge Gateway 11.0
F5 BIG-IP Edge Gateway 10.2.4
F5 BIG-IP Edge Gateway 10.2.2
F5 BIG-IP Edge Gateway 10.2.1
F5 BIG-IP Edge Gateway 10.1
F5 BIG-IP Edge Gateway 11.2.1 HF5
F5 BIG-IP Edge Gateway 11.2.1 HF2
F5 BIG-IP Edge Gateway 11.2.0 HF5
F5 BIG-IP Edge Gateway 11.1.0 HF7
F5 BIG-IP Edge Gateway 10.2.1 HF1
F5 BIG-IP Edge Gateway 10.1
F5 BIG-IP ASM 9.4.8 0
F5 BIG-IP ASM 11.2.0 HF2 0
F5 BIG-IP ASM 11.2.0 0
F5 BIG-IP ASM 11.0.0 0
F5 BIG-IP ASM 10.2.4 0
F5 BIG-IP ASM 10.0.0 0
F5 BIG-IP ASM 11.5.1
F5 BIG-IP ASM 11.5
F5 BIG-IP ASM 10.2.2
F5 BIG-IP ASM 10.2.1
F5 BIG-IP ASM 9.2
F5 BIG-IP ASM 11.4.1
F5 BIG-IP ASM 11.3.0 HF4
F5 BIG-IP ASM 11.3.0
F5 BIG-IP ASM 11.2.1 HF5
F5 BIG-IP ASM 11.2.1 HF3
F5 BIG-IP ASM 11.2.1 HF2
F5 BIG-IP ASM 11.2.1 HF1
F5 BIG-IP ASM 11.2.1
F5 BIG-IP ASM 11.2.0 HF5
F5 BIG-IP ASM 11.2.0 HF3
F5 BIG-IP ASM 11.1.0 HF7
F5 BIG-IP ASM 11.1.0
F5 BIG-IP ASM 10.2.1 HF1
F5 BIG-IP APM 11.5.1
F5 BIG-IP APM 11.2
F5 BIG-IP APM 11.0
F5 BIG-IP APM 10.2.4
F5 BIG-IP APM 10.2.2
F5 BIG-IP APM 11.5.0
F5 BIG-IP APM 11.4.1
F5 BIG-IP APM 11.4.0
F5 BIG-IP APM 11.3.0 HF4
F5 BIG-IP APM 11.3.0
F5 BIG-IP APM 11.2.1 HF5
F5 BIG-IP APM 11.2.1 HF3
F5 BIG-IP APM 11.2.1 HF2
F5 BIG-IP APM 11.2.1 HF1
F5 BIG-IP APM 11.2.1
F5 BIG-IP APM 11.2.0 HF5
F5 BIG-IP APM 11.2.0 HF3
F5 BIG-IP APM 11.2.0 HF2
F5 BIG-IP APM 11.1.0 HF7
F5 BIG-IP APM 11.1.0
F5 BIG-IP APM 10.2.1 HF1
F5 BIG-IP APM 10.2.1
F5 BIG-IP APM 10.1
F5 BIG-IP Analytics 11.5.1
F5 BIG-IP Analytics 11.5
F5 BIG-IP Analytics 11.3
F5 BIG-IP Analytics 11.2.1 HF3
F5 BIG-IP Analytics 11.2.1
F5 BIG-IP Analytics 11.2 HF3
F5 BIG-IP Analytics 11.2
F5 BIG-IP Analytics 11.4.1
F5 BIG-IP Analytics 11.3.0 HF4
F5 BIG-IP Analytics 11.2.1 HF5
F5 BIG-IP Analytics 11.2.1 HF2
F5 BIG-IP Analytics 11.2.1 HF1
F5 BIG-IP Analytics 11.2.0 HF5
F5 BIG-IP Analytics 11.2.0 HF2
F5 BIG-IP Analytics 11.1.0 HF7
F5 BIG-IP Analytics 11.1.0
F5 BIG-IP Analytics 11.0.0-HF2
F5 BIG-IP Analytics 11.0.0
F5 BIG-IP AFM 11.5.1
F5 BIG-IP AFM 11.5
F5 BIG-IP AFM 11.3
F5 BIG-IP AFM 11.4.1
F5 BIG-IP AFM 11.3.0 HF4
F5 BIG-IP AAM 11.5.1
F5 BIG-IP AAM 11.5
F5 BIG-IP AAM 11.4.1
F5 BIG-IP AAM 11.4.0
F5 ARX 6.4
F5 ARX 6.3
F5 ARX 6.2
F5 ARX 6.1.1
F5 ARX 6.1
F5 ARX 6.0
EMC RSA Validation Manager 3.2
Apple Safari 6.0.3
Apple Safari 6.0.2
Apple Safari 6.0.1
Apple Safari 5.0.6
Apple Safari 4.1.2 for Windows
Apple Safari 4.0.5 for Windows
Apple Safari 4.0.5
Apple Safari 4.0.4 for Windows
Apple Safari 4.0.4
Apple Safari 4.0.3 for Windows
Apple Safari 4.0.3
Apple Safari 4.0.2 for Windows
Apple Safari 4.0.2
Apple Safari 4.0.1
Apple Safari 3.2.3 for Windows
Apple Safari 3.2.3
Apple Safari 3.2.2 for Windows
Apple Safari 3.1.2 for Windows
Apple Safari 3.1.2
Apple Safari 3.1.1 for Windows
Apple Safari 3.1.1
Apple Safari 3.0.4 Beta for Windows
Apple Safari 3.0.3 Beta for Windows
Apple Safari 3.0.3 Beta
Apple Safari 3.0.2 Beta for Windows
Apple Safari 3.0.2 Beta
Apple Safari 3.0.1 Beta for Windows
Apple Safari 3.0.1 Beta
Apple Safari 2.0.4
Apple Safari 2.0.3
Apple Safari 2.0.2
Apple Safari 2.0.1
Apple Safari 1.3.2
Apple Safari 1.3.1
Apple Safari 1.3
Apple Safari 1.2.3
Apple Safari 1.2.2
Apple Safari 1.2.1
Apple Safari 1.2
Apple Safari 1.1
Apple Safari 1.0
Apple Safari 6.0.1 for Windows
Apple Safari 6.0 for Windows
Apple Safari 6.0
Apple Safari 6 for OSX Lion
Apple Safari 5.34
Apple Safari 5.33
Apple Safari 5.31
Apple Safari 5.1.7 for Windows
Apple Safari 5.1.7
Apple Safari 5.1.6 for OSX Lion
Apple Safari 5.1.5 for Windows
Apple Safari 5.1.4 for Windows
Apple Safari 5.1.4
Apple Safari 5.1.1 for Windows
Apple Safari 5.1.1
Apple Safari 5.1 for Windows
Apple Safari 5.1
Apple Safari 5.0.6 for windows
Apple Safari 5.0.5 for Windows
Apple Safari 5.0.5
Apple Safari 5.0.4 for Windows
Apple Safari 5.0.4
Apple Safari 5.0.3 for Windows
Apple Safari 5.0.3
Apple Safari 5.0.2 for Windows
Apple Safari 5.0.2
Apple Safari 5.0.1 for Windows
Apple Safari 5.0.1
Apple Safari 5.0 for Windows
Apple Safari 5.0
Apple Safari 4.31
Apple Safari 4.30
Apple Safari 4.28
Apple Safari 4.1.3 for Windows
Apple Safari 4.1.3
Apple Safari 4.1.2
Apple Safari 4.1.1
Apple Safari 4.1
Apple Safari 4.0
Apple Safari 4 for Windows
Apple Safari 4 Beta
Apple Safari 4
Apple Safari 3.52
Apple Safari 3.2
Apple Safari 3.1 for Windows
Apple Safari 3.1
Apple Safari 3 Beta for Windows
Apple Safari 3 Beta
Apple Safari 3
8pecxstudios Cyberfox 25.0
8pecxstudios Cyberfox 24.0
8pecxstudios Cyberfox 23.0
8pecxstudios Cyberfox 22.0 Not Vulnerable: Oracle SPARC Enterprise M9000 XCP 1121
Oracle SPARC Enterprise M8000 XCP 1121
Oracle SPARC Enterprise M5000 XCP 1121
Oracle SPARC Enterprise M4000 XCP 1121
Oracle SPARC Enterprise M3000 XCP 1121
Oracle Fujitsu M10-4S Server XCP 2280
Oracle Fujitsu M10-4 Server XCP 2280
Oracle Fujitsu M10-1 Server XCP 2280
Mozilla SeaMonkey 2.22.1
Mozilla Firefox ESR 24.1.1
Mozilla Firefox ESR 17.0.11
Mozilla Firefox 25.0.1
Moonchild Productions Pale Moon 24.1.2
EMC RSA Validation Manager 3.2 Build 201
8pecxstudios Cyberfox 25.0.1


SecurityFocus Vulnerabilities

FS-ISAC Announces New Initiative to Strengthen the Financial Services Critical Infrastructure

The Financial Services Information Sharing and Analysis Center (FS-ISAC) has launched what it calls the Financial Systemic Analysis & Resilience Center (FSARC). While FS-ISAC is primarily about sharing threat intelligence between banks and other financial institutions, FSARC will provide a more strategic analysis and identification of emerging threats to help mitigate systemic cyber threats. Those results will be shared through the existing FS-ISAC structure.

FSARC is the brainchild of CEOs from eight leading banks who came together to discuss ways to improve the resilience of the financial services infrastructure. The banks concerned are Bank of America, BNY Mellon, Citigroup, Goldman Sachs, JPMorgan Chase, Morgan Stanley, State Street and Wells Fargo.

Information about how FSARC will operate is limited and provides only a high level overview. "The challenges associated with cyber-attacks and the financial fraud stemming from such incidents are bigger than any one institution, and this is something the financial sector must face together. We are stronger and more resilient when we work collectively to understand the evolving tactics of cyber adversaries and to deepen the layers of defense against such attacks,” said Bill Nelson, President and CEO, FS-ISAC in a recent statement. 

FS-ISAC shares threat intelligence with its members, and does so anonymously if required by the members concerned. It receives intelligence from US government agencies such as the Department of Treasury, the Department of Homeland Security and the Federal Bureau of Investigation; but will only share with them if approved by the member. FSARC is likely to increase this relationship with government agencies (the US Secret Service tweeted its congratulations on the launch); but it says it will maintain the existing structure and methods for disseminating information. 

"FSARC is a long-term strategic initiative that performs deep analyses of systemic cyber risk across financial products and practices. Findings and adaptable mitigation strategies will be shared across the financial sector through FS-ISAC and its membership," explains FS-ISAC in a statement.

So far we seem to know only who and where; but not how. FSARC is looking to establish its own physical location, understood to be in Arlington. It is also believed that for the time being at least it will use FS-ISAC's existing web structure. Bank of America's Siobhan MacDermott and JPMorgan's Greg Rattray will serve as interim Co-Presidents until the center reaches full operational capability. 

How FSARC will achieve a proactive analysis of emerging threats is not yet known, but it seems almost certain that it will leverage the expanding and improving technology of analytics based on machine learning. Machine learning analytics works best when there is a large pool of data from which to learn. The current FS-ISAC database has thousands of threats, vulnerabilities, and events dating back to its formation in 1999. What isn't known is whether FSARC will develop its own analytics, or will call on the security industry.

One firm already involved in machine learning threat detection for financial services is Corvil. "This newly established center enables banks to gain an upper hand in their ongoing asymmetric battle against cyber crime, through both collaboration and a preventative, longer term perspective," Corvil's Graham Ahearne told SecurityWeek.

"At the heart of what FS-ISAC provides is a platform that enables collaboration. This new resilience center takes all that works well from FS-ISAC and combines it with longer range perspective and planning, paving the way for more proactive and preventative measures."

Since prevention is always better than cure, the output from FSARC will provide a more holistic, broader view of both challenges and options for associated solutions.

"Financial services fuel the engine of our economy," he said, "and bold steps need to be taken in order to assure this engine is protected and resilient. This new initiative takes a promising step in that direction."

view counter

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Previous Columns by Kevin Townsend:

Tags:


SecurityWeek RSS Feed

Vulnerable: Ubuntu Ubuntu Linux 16.10
Ubuntu Ubuntu Linux 16.04 LTS
Ubuntu Ubuntu Linux 14.04 LTS
Ubuntu Ubuntu Linux 12.04 LTS i386
Ubuntu Ubuntu Linux 12.04 LTS amd64
MoinMoin MoinMoin 1.9.6
MoinMoin MoinMoin 1.9.5
MoinMoin MoinMoin 1.9.4
MoinMoin MoinMoin 1.9.3
MoinMoin MoinMoin 1.9.2
MoinMoin MoinMoin 1.9.1
MoinMoin MoinMoin 1.9
MoinMoin MoinMoin 1.9.8
Debian Linux 6.0 sparc
Debian Linux 6.0 s/390
Debian Linux 6.0 powerpc
Debian Linux 6.0 mips
Debian Linux 6.0 ia-64
Debian Linux 6.0 ia-32
Debian Linux 6.0 arm
Debian Linux 6.0 amd64


SecurityFocus Vulnerabilities

Dyn Confirms DDoS Attack Affecting Twitter, Github, Many Others

October 21, 2016 , 10:01 am

IoT Botnets Are The New Normal of DDoS Attacks

October 5, 2016 , 8:51 am

Leftover Factory Debugger Doubles as Android Backdoor

October 14, 2016 , 9:00 am

Backdoor Found in Firmware of Some Android Devices

November 21, 2016 , 3:20 pm

Threatpost News Wrap, November 18, 2016

November 18, 2016 , 9:15 am

iPhone Call History Synced to iCloud Without User Consent, Knowledge

November 17, 2016 , 1:51 pm

Microsoft Patches Zero Day Disclosed by Google

November 8, 2016 , 2:57 pm

Microsoft Says Russian APT Group Behind Zero-Day Attacks

November 1, 2016 , 5:50 pm

Google to Make Certificate Transparency Mandatory By 2017

October 29, 2016 , 6:00 am

Microsoft Extends Malicious Macro Protection to Office 2013

October 27, 2016 , 4:27 pm

Dyn DDoS Work of Script Kiddies, Not Politically Motivated Hackers

October 25, 2016 , 3:00 pm

Mirai-Fueled IoT Botnet Behind DDoS Attacks on DNS Providers

October 22, 2016 , 6:00 am

FruityArmor APT Group Used Recently Patched Windows Zero Day

October 20, 2016 , 7:00 am

Experts ‘Outraged’ by Warrant Demanding Fingerprints to Unlock Smartphones

October 18, 2016 , 4:58 pm

Researchers Break MarsJoke Ransomware Encryption

October 3, 2016 , 5:00 am

OpenSSL Fixes Critical Bug Introduced by Latest Update

September 26, 2016 , 10:45 am

500 Million Yahoo Accounts Stolen By State-Sponsored Hackers

September 22, 2016 , 3:47 pm

Yahoo Reportedly to Confirm Breach of Hundreds of Millions of Credentials

September 22, 2016 , 12:31 pm

Experts Want Transparency From Government’s Vulnerabilities Equities Process

September 20, 2016 , 2:41 pm

Bruce Schneier on Probing Attacks Testing Core Internet Infrastructure

September 15, 2016 , 11:15 am

Generic OS X Malware Detection Method Explained

September 13, 2016 , 9:14 am

Patched Android Libutils Vulnerability Harkens Back to Stagefright

September 9, 2016 , 2:06 pm

Chrome to Label Some HTTP Sites ‘Not Secure’ in 2017

September 8, 2016 , 3:43 pm

Threatpost News Wrap, September 2, 2016

September 2, 2016 , 9:00 am

Insecure Redis Instances at Core of Attacks Against Linux Servers

September 1, 2016 , 1:08 pm

Dropbox Forces Password Reset for Older Users

August 29, 2016 , 9:58 am

Cisco Begins Patching Equation Group ASA Zero Day

August 24, 2016 , 5:53 pm

New Collision Attacks Against 3DES, Blowfish Allow for Cookie Decryption

August 24, 2016 , 8:00 am

Cisco Acknowledges ASA Zero Day Exposed by ShadowBrokers

August 17, 2016 , 4:06 pm

Pokémon GO Spam, Ransomware, On the Rise

August 17, 2016 , 12:58 pm

ProjectSauron APT On Par With Equation, Flame, Duqu

August 8, 2016 , 1:40 pm

Miller, Valasek Deliver Final Car Hacking Talk

August 4, 2016 , 3:26 pm

Researchers Go Inside a Business Email Compromise Scam

August 4, 2016 , 10:00 am

Export-Grade Crypto Patching Improves

August 3, 2016 , 10:00 am

Kaspersky Lab Launches Bug Bounty Program

August 2, 2016 , 9:00 am

Threatpost News Wrap, July 29, 2016

July 29, 2016 , 10:45 am

KeySniffer Vulnerability Opens Wireless Keyboards to Snooping

July 26, 2016 , 9:30 am

Upcoming Tor Design Battles Hidden Services Snooping

July 25, 2016 , 3:51 pm

EFF Files Lawsuit Challenging DMCA’s Restrictions on Security Researchers

July 21, 2016 , 1:18 pm

Oracle Patches Record 276 Vulnerabilities with July Critical Patch Update

July 20, 2016 , 9:21 am

Threatpost News Wrap, July 15, 2016

July 15, 2016 , 11:00 am

Academics Build Early-Warning Ransomware Detection System

July 14, 2016 , 1:05 pm

xDedic Hacked Server Market Resurfaces on Tor Domain

July 12, 2016 , 11:40 am

Conficker Used in New Wave of Hospital IoT Device Attacks

June 30, 2016 , 11:48 am

655,000 Healthcare Records Being Sold on Dark Web

June 28, 2016 , 10:00 am

Windows Zero Day Selling for $ 90,000

May 31, 2016 , 5:44 pm

Millions of Stolen MySpace, Tumblr Credentials Being Sold Online

May 31, 2016 , 1:37 pm

OTR Protocol Patched Against Remote Code Execution Flaw

March 10, 2016 , 10:23 am

Serious Dirty Cow Linux Vulnerability Under Attack

October 21, 2016 , 11:21 am

Facebook Debuts Open Source Detection Tool for Windows

September 27, 2016 , 12:24 pm

Popular Android App Leaks Microsoft Exchange User Credentials

October 14, 2016 , 8:00 am

Cisco Warns of Critical Flaws in Nexus Switches

October 7, 2016 , 10:55 am

Free Tool Protects Mac Users from Webcam Surveillance

October 7, 2016 , 7:00 am


Threatpost | The first stop for security news

The cybersecurity skills shortage has been discussed in many different ways over the recent years, but a successful hiring event held by the Department of Homeland Security has some wondering if that event was a sign of optimism or an outlier.

The Department of Homeland Security (DHS) held a two-day hiring event "aimed at filling mission-critical positions to protect our Nation's cyberspace" in July. According to a new blog post, that event garnered "over 14,000 applicants and over 2,000 walk-ins" and culminated with more than 800 candidate interviews and "close to 150 tentative job offers."

Angela Bailey, chief human capital officer for the DHS, said in a blog post that the DHS "set out to dispel certain myths regarding cybersecurity hiring," including the ideas that there is a cybersecurity skills shortage and that organizations cannot hire people "on the spot."

"While not all of them were qualified, we continue to this day to hire from the wealth of talent made available as a result of our hiring event," Bailey wrote. "We demonstrated that by having our hiring managers, HR specialists, and personnel security specialists together, we were able to make about 150 job offers within two days. Close to 430 job offers have been made in total, with an original goal of filling around 350 positions."

Gunter Ollmann, CSO for Vectra Networks, said although the event "was pitched under the banner of cybersecurity it is not clear what types of jobs were actually being filled," and some positions sounded more "like IT roles with an impact on cybersecurity, rather than cybersecurity specific or even experienced infosec roles."

"Everyone with a newly minted computer science degree is being encouraged to get in to cybersecurity, as the lack of candidates is driving up salaries," Ollmann told SearchSecurity. "Government jobs have always been popular with recent graduates that managed to scrape through their education, but would unlikely appear on the radar as interns for larger commercial organizations or research-led businesses."

Chris Sullivan, CISO and CTO for Core Security, agreed that the DHS event may not be indicative of the state of the cybersecurity skills shortage.

"It looks like DHS executed well and had a successful event but we shouldn't interpret that as a sign that cyber-defender resource problems are over. In fact, every CISO that I speak to has not seen any easing in the availability or cost of experienced resources," Sullivan said. "In addition, the medium to long term solution requires both formal and on the job training -- college curriculum is coming but much of it remains immature. We need resources to train the trainers."

Derek Manky, global security strategist at Fortinet, warned about putting too much into just a few hundred positions compared to the potentially hundreds of thousands of cybersecurity jobs left unfilled.

"The DHS numbers are relatively small compared with the overall number of unfilled positions," Manky said. "Part of the solution is to build better technology that requires less human capital to be effective and can evolve to meet shifts in the threat landscape. Additionally, the market needs to better define what skills a cybersecurity professional should hold and use these definitions to focus on efforts that can engage and develop a new generation of cybersecurity talent."

Rob Sadowski, director of marketing at RSA, the Security Division of EMC, said this event might be cause for optimism regarding the cybersecurity skills shortage.

"The experience that DHS shared is encouraging because it shows a groundswell of interest in cybersecurity careers. This interest and enthusiasm needs to continue across the public and private sector if we are to address the still significant gap in cybersecurity talent that is required in today's advanced threat world," Sadowski told SearchSecurity before hedging his bet. "The talent pool in an area such as DC, where many individuals have strong backgrounds in defense or intelligence, security clearances, and public sector agency experience contributes significantly towards building a pool of qualified cybersecurity candidates that may not be present in other parts of the country or the world."

Bailey attributed some of the success of the DHS event to proper planning and preparation.

"Before the event, we carefully evaluated the security clearance requirements for the open positions. We identified many positions that could be performed fully with a 'Secret' rather than a 'Top Secret' clearance to broaden our potential applicant pool," Bailey wrote. "We knew that all too often the security process is where we've lost excellent candidates. By beginning the paperwork at the hiring event, we eliminated one of the more daunting steps and helped the candidates become more invested in the process."

Bailey noted the most important advice in hiring was to not let bureaucracy get in the way.

"The most important lesson learned from our experience is the value of acting collaboratively, quickly, and decisively. My best advice is to just do it," Bailey wrote. "Don't spend your precious time deliberating over potential barriers or complications; stop asking Congress for yet another hiring authority or new personnel system, instead capitalize on the existing rules, regulations and hiring authorities available today."

Sadowski said rapid action is a cornerstone of an effective security program, but noted not all organizations may have that option.

"It's great that DHS has the luxury to act decisively in hiring, especially from what they saw as a large, qualified pool," Sadowski said. "However, many private sector organizations may not have this freedom, where qualified potential hires may require significant commitment, investment, and training so that they understand how security impacts that particular business, and how to best leverage the technology that is in place."

Next Steps

Learn more about how the cybersecurity skills shortage be fixed.

Find out how to live with the cybersecurity skills shortages.

Get info on why there is a delay in adopting new tech because of the skills shortage.


SearchSecurity: Security Wire Daily News