Showing headlines posted by tuxchick

« Previous ( 1 ... 78 79 80 81 82 83 ... 84 ) Next »

Bots in the A/C, spyware in the 'fridge

  • SearchSecurity.com; By Bill Brenner (Posted by tuxchick on Oct 31, 2005 4:59 PM EDT)
  • Story Type: News Story
Over time, the computers inside air conditioners, refrigerators, televisions and automobiles will increasingly connect to cyberspace. This phenomenon also will open them up to the same attacks now threatening PCs, servers and databases.

Are we as an industry prepared for such an assault? No. But Trend Micro executives last week said in time, we will be better equipped to take on such attacks.

[Ed.- interesting article, but they really miss the point- who's the bigger threat, evil crackers, or corporate spyware with secret backdoors, surveillance, and remote control?]

Don't mess with Meg

eBay chief executive Meg Whitman has been ranked the most powerful woman in business for the second straight year, according to a list published Monday by Fortune magazine.

[Ed.- there are a number of tech companies on the list, including Xerox and Lucent.]

Is It Time To Switch To p2p Email?

Base your email transport on something like gnutella, they say, and you'll diffuse message delivery across a sea of nodes. Blow up a node, and its peers will still see that the message reaches its target. The dream even made it onto Wired's 101 Ways To Save The Internet.

[Ed.- Be sure to take a look at the PDF linked at the end of the article, "Secure and Resilient Peer-to-Peer E-Mail: Design and Implementation," by Kangasharju, Ross, Turner]

Book Review: File System Forensic Analysis

  • Unix Review; By Kristy Westphal (Posted by tuxchick on Oct 31, 2005 7:21 AM EDT)
  • Story Type: Reviews
Before I even had this book in my hands, I was truly excited about it. I have used Autopsy and The Sleuth Kit for some time now in my forensic work, and I am a big fan. These free tools are straightforward and critical to any forensic investigation. Brian Carrier, the author of File System Forensic Analysis, also created these tools, so when I saw that he wrote an entire book on file systems, I was pumped! Who better than Carrier to detail a topic that has been sparsely documented?

Ellison, Old Friends in Software Showdown

  • Yahoo News; By Michael Liedtke (Posted by tuxchick on Oct 31, 2005 6:23 AM EDT)
  • Story Type: News Story
Oracle Corp. CEO Larry Ellison knows all about battles with old friends. After all, Oracle just pulled off high-profile takeovers of PeopleSoft Inc. and Siebel Systems Inc. - a pair of rival software makers run by former subordinates who turned against him. Now, Ellison is straddling another set of fractured friendships in a drama unfolding around Salesforce.com Inc. and NetSuite Inc.The pioneering upstarts - conceived by a younger generation of Ellison's corporate progeny - have been helping steer the business software industry in a new direction with applications that are accessed directly over the Internet.

Once considered a crazy idea, the concept of online, or "on-demand," software has turned into a hot market as thousands of companies decide they would rather lease applications monthly than pay an upfront licensing fee and then deal with the costs - and headaches - of installation, maintenance and the inevitable software upgrades.

Software Firewalls versus Wormhole Tunnels

  • Security Focus; By Bob Rudis and Phil Kostenbader (Posted by tuxchick on Oct 31, 2005 5:26 AM EDT)
  • Story Type: News Story, Security
In a VPN configuration, most personal firewalls are configured to drop their shields (because all traffic is heading to and from a trusted source), so the VPN client is, in fact, a liability because there is no need to use a libpcap outbound wormhole-tunnel communications channel. The firewall will happily ignore whatever packets a malicious program might need and they go unfiltered through the "secure" VPN connection... Creating and using a wormhole-tunnel communications channel is not limited to malicious use by malware, spyware, viruses or worms. The following scenario illustrates how one can legitimately (and more robustly) bypass the firewall without the use of libpcap.

[Ed.- and don't forget email, web browsers, and all the ways that SSH can sneak around firewall rules.]

Shareholders rebuke Sun

  • Yahoo News; By Therese Poletti (Posted by tuxchick on Oct 31, 2005 3:32 AM EDT)
  • Story Type: News Story
Shareholders attending Sun Microsystems' annual meeting Thursday chastised Chief Executive Scott McNealy for everything from the company's performance and low stock price to his stewardship...A second shareholder proposal, to tie stock options for senior executives more closely to the company's performance, was defeated. But it got a sizable 42.8 percent of the votes.

Modern Memory Management

  • OnLamp.com; By Howard Feldman (Posted by tuxchick on Oct 31, 2005 1:37 AM EDT)
  • Story Type: Tutorial
Despite this enormous increase in memory capacity, many of the problems that exist on today's machines are the same as those of their early predecessors--namely, running out of memory.

This article, the first in the series, discusses the Unix dynamic memory allocation system along with the concept of memory segmentation. It also reviews the utilities top and ulimit, giving special attention to their role in memory management. Memory management is an important concept to grasp regardless of which programming language you use. You must be most careful with C, where you control all memory allocation and freeing. Languages such as C++, Java, Perl, and PHP take care of a lot of the housekeeping automatically. Nevertheless, all of these languages and others can allocate memory dynamically, and thus the following discussion applies to them all

Tips and Toys for the Hardworking Admin

  • Enterprise Networking Planet; By Carla Schroder (Posted by tuxchick on Oct 30, 2005 10:46 PM EDT)
  • Story Type: Tutorial
Welcome to today's installment of More Tips and Tricks For Hardworking Admins, the finest and freshest collection of mini-howtos on the Web. Today we'll do dynamic blocking of SSH server attacks, run nested window managers, and take a peek at hacking the Linksys WRTG54.

[Ed.- The DenyHosts utility, for dynamic blocking of SSH or other port attacks, is quite ingenious and easy to use. Also, XNest is covered, for running multiple window managers simultaneously. Just try to do that with poor ole feeble MS Windows!]

Your Next WAP: Hold the Cheese?

  • Enterprise Networking Planet; By Paul Rubens (Posted by tuxchick on Oct 30, 2005 8:18 PM EDT)
  • Story Type: News Story
Q:What's the difference between an enterprise wireless access point from a big name vendor, and a SOHO grade one from the likes of Belkin, Buffalo or Netgear? A: About 500 bucks OK, say it's not a very funny joke. In fact it's not really a joke at all – more of an economic observation. But like most jokes, there is a point to it: When you go shopping for wireless access points, do you really need to spend five times as much on an enterprise product which does the same base function – providing wireless network access – as a SOHO one?

Special Report on All About eBay

  • Small Business Computing; By Small Business Computing staff (Posted by tuxchick on Oct 30, 2005 4:46 PM EDT)
  • Story Type: News Story, Tutorial
[Ed.- Here is a collection of good articles on building a business on Ebay, from starting out to building an attractive storefront, to auction-management tools, to protecting yourself from fraud. ]

Terror Pumpkins From Power Tools

  • Timocharis.com; By David North (Posted by tuxchick on Oct 30, 2005 3:49 PM EDT)
  • Story Type: Tutorial
The capital of high technology (San Jose) is the logical cauldron of Techno Pumpkin Making. This page is dedicated to furthering the art of Power Tool Pumpkins, by showing how I make mine.

[Ed.- This demonstrates that real hackers can hack anything! An interesting bit of trivia- this site is the #1 hit on Google for 'pumpkin trepanning'.]

If this is the end, PDAs are going out in style

PDAs started out as a nerd craze in the mid-1990s and then gained mainstream acceptance for their ability to hold thousands of addresses and appointments in a pocket-sized gadget. But they have been declining recently, with sales down 20 percent last year to 2.7 million units, according to NPD Group, a market-research company. In vogue now are smart phones that integrate PDA functions into a multimedia cellphone, including Palm's own Treo. Meanwhile, several companies that made PDAs, including Sony, have quit the business altogether.

[Ed.- I always felt the biggest bottleneck was data entry. Writing on those tiny little screens, or connecting to a keyboard just don't do the job.]

From Your Living Room to the World, via Podcast

  • New York Times; By Anne Eisenberg (Posted by tuxchick on Oct 30, 2005 12:40 PM EDT)
  • Story Type: News Story
From her home near Vancouver, British Columbia, she spoke about her devastating disease into a microphone, connected to her computer, and then posted her thoughts on the Internet. Since then, thousands of people have listened to that first podcast and many others she has made about her disease and related issues, and she now interviews others as part of her program...Entry into this form of broadcasting is open to anyone who owns a computer. The cost can be as little as $10 for a microphone...

[Ed.- The power of the press belongs to those who own one. The article doesn't mention Linux, but it does refer to Audacity, which runs on all major operating systems, and is hosted on Sourceforge. Remember http://bugmenot.com/ if it asks for a registration.]

'Spear Phishing' Pokes at Enterprise Users

  • Enterprise Networking Planet; By Michael Hall (Posted by tuxchick on Oct 30, 2005 11:20 AM EDT)
  • Story Type: News Story, Security
...spear phishing attacks tend to focus on a single user or department within an organization, addressed from someone within the company in a position of trust and requesting information such as login IDs and passwords....Typically, the company reports, such information is gathered through public databases, articles on corporate Web sites, so-called "social engineering" in the form of phone calls, and straightforward system cracking.

[Ed.- Criminy, are we going to have to do away with unverified senders entirely? What about snail mail and telephones? After all, anyone can send a letter or make a phone call- how do you know who they really are? Perhaps it's time to return to an agrarian society, living in villages, and knowing everyone personally.]

High-tech, low-fuel commuting

  • Seattle Times; By Paul Andrews (Posted by tuxchick on Oct 30, 2005 10:10 AM EDT)
  • Story Type: News Story
President Bush's call for Americans to reduce unnecessary driving because of hurricane-induced fuel shortages made me wonder how the whole concept of telecommuting is faring these days...Census data seem to suggest that people are telecommuting more, even though they're commuting as much as (or slightly more than) they ever did. This may be because mobile workers tend to continue working during evenings and weekends.

[Ed.- Does telecommuting replace trips to the office, or are people just working more hours at home in addition to office hours?]

Conserver: A Flexible, Mature Console Management System

  • SysAdminMag.com; By Bryan Stansell (Posted by tuxchick on Oct 30, 2005 5:42 AM EDT)
  • Story Type: Tutorial; Groups:
How would you like the flexibility to troubleshoot system problems from anywhere? How would you like the ability to have others watch what you are doing, and even help? And how would you like to have everything logged, so you can "go back in time" and review past events? These are just some of the things conserver can do for you.

[Ed.- Linux console servers, while not the most fun to use for everyday administration, can be real life-savers when everything else goes *poof*. Conserver is a free, sophisticated console server with a great feature set that takes you far beyond good ole Minicom and a null-modem cable.]

The click-wrap conundrum

  • Security Focus; By Mark Rasch (Posted by tuxchick on Oct 30, 2005 4:45 AM EDT)
  • Story Type: News Story
...Then there is a note in 8-point typeface that says, "by downloading this software [or using the website] you are agreeing to abide by these terms and conditions." Are you bound by this EULA? A recent lawsuit by the U.S. Federal Trade Commission against purveyors of spyware essentially argues that you may not be.

[Ed.- It is beyond logic that a unilateral contract can be binding, especially when there is no way to review it before purchase, or it is incomprehensible, but the courts have upheld EULAs- until now.]

So You Want to Write a Book?

  • O'Reilly Media, Inc.; By O'Reilly Media, Inc. (Posted by tuxchick on Oct 30, 2005 3:48 AM EDT)
  • Story Type: Tutorial
If you have ever thought, even half seriously, that you would like to write a practical book about computers or computer software, then you probably can. Moreover, given the proper editorial and publishing support, you can probably write a successful book. It's all a matter of doing the right things in the right order. And it helps a great deal if you have a publisher willing to do everything in its power to help you along.

[Ed.- I write books for O'Reilly, so naturally I think they are the bee's knees. However, much of the information in this article applies to all publishing, and most publishers post similar guides on their Websites. If you think you have a book or two in you, go for it- there is all kinds of information here that will help you.]

New Use for Old Hardware: A Network Copier

  • Linux Gazette- the REAL Linux Gazette; By Edgar Howell (Posted by tuxchick on Oct 30, 2005 2:50 AM EDT)
  • Story Type: Tutorial
Basically the plan is to configure Samba on a PC under GNU/Linux such that another PC with some flavor of Windows can access a share on it. Then, the software that came with the combo device can be used on the Windows machine to scan a document, and save it on a Samba share, in a directory on the Linux machine. And from there OpenOffice.org can access the result of scanning, and print it over the network to the network printer.

[Ed.- This is an ingenious hack that kept a partially-functioning combination fax/printer/scanner/copier in service, and is easily adaptable for other scenarios.]

« Previous ( 1 ... 78 79 80 81 82 83 ... 84 ) Next »