AOH :: HP Unsorted O :: VA3109.HTM

OpenVAS now beyond 10000 Network Vulnerability Tests



OpenVAS now beyond 10000 Network Vulnerability Tests
OpenVAS now beyond 10000 Network Vulnerability Tests




--u5E4XgoOPWr4PD9E
Content-Type: text/plain; charset=iso-8859-15
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Hello,

Passing the 10000th Network Vulnerability Test (NVT) is a perfect
occasion to report about the progress of the OpenVAS project[1].

In October 2008 the systematic development of new NVTs started with a
base of around 5800 Tests. With the release of OpenVAS 2.0 in December
2008, the development was boosted and has now reached an average of 10
code updates per day.  The public OpenVAS NVT Feed Service delivers 3-10
new vulnerability tests every day.

The significantly grown and globally distributed developer team will
gather at the second OpenVAS developers conference[2] July 9-12 2009 in
Germany. During the conference features and a roadmap for OpenVAS 3.0
will be scheduled.

The OpenVAS project is backed by a number of companies, which also
supplement the project with professional services[3]. These companies
include Greenbone Networks, SecPod, Intevation and SecuritySpace.
"Reaching the professional enterprise market is a good indicator that
OpenVAS gained maturity very fast" says Tim Brown, founder of the
OpenVAS project.

While OpenVAS 3.0 will likely appear in 2009, users of OpenVAS 1.0
should prepare to migrate as support for 1.0 will end during 2009.

Regards,

Michael Wiegand

[1] http://www.openvas.org 
[2] http://www.openvas.org/openvas-devcon2.html 
[3] http://www.openvas.org/professional-services.html 
-- 
Michael Wiegand | OpenPGP: D7D049EC | Intevation GmbH - www.intevation.de 
Neuer Graben 17, 49074 Osnabr=FCck, Germany   |    AG Osnabr=FCck, HR B 18998
Gesch=E4ftsf=FChrer: Frank Koormann,  Bernhard Reiter,  Dr. Jan-Oliver Wagner

--u5E4XgoOPWr4PD9E
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.11 (GNU/Linux)

iEYEABECAAYFAkneBMgACgkQ1/9gGdfQSewvogCgsNTqpG2afbLgTbRJgD7bqxQ5
gy8AnjWTFVnQGGhFhXAH4eV7YSrIIP16
=Nfz2
-----END PGP SIGNATURE-----

--u5E4XgoOPWr4PD9E--

The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an artofhacking.com email address, please forward it with full headers to abuse@artofhacking.com.