Contribute  :  Calendar  :  Advanced Search  :  Site Statistics  :  Directory  :  About  :  Cartoons  :  Web Resources  :  Polls  
    geekinfo.net ...for all that other stuff    
 Welcome to geekinfo.net
 Wednesday, October 18 2017 @ 11:35 CEST

geekinfo.net to bolster site security

  View Printable Version 
NewsThe world is on the verge of both war and Windows XP. This is our plan.
 
read more (249 words) Post a comment
Comments (1)

Psionic Portsentry 1.1, the defender of the ports

  View Printable Version 
SecurityLinuxFocus presents the story about PortSentry:
"Psionic portsentry is part of the Abacus Project suite of tools (beside portsentry, the suite offers logcheck and hostsentry). It's an IDS (Intrusion Detection System) dedicated to portscan detection and active defense. It works on many Unix flavors including Mac OS X. The main feature of an IDS is to inform the sysadmin about intrusion attempts. Portsentry goes further since it can react on an attack. The latest version (1.1) of this great tool is available from http://www.psionic.com, and by the way, version 1.0 is now part of some main Linux distributions (Debian, RedHat...)."
Read the full story.
 
Post a comment
Comments (0)

Will Tinky Winky use XP?

  View Printable Version 
WindowsYou might have seen it already, but don't you think the standard backdrop in Windows XP look just a tiny weeny little bit like the place the Teletubbies live in? Kelly McNeill at osopinion.com investigates further :-)
 
Post a comment
Comments (0)

A Sysadmin's Security Basics

  View Printable Version 
SecurityFrom Linux Devcenter over at O'Reilly Network comes this article:
System administrators are no longer alone in their concern for security. The increase in high-profile virus attacks, and a general sense of heightened security, means that executives are likely to have security on their mind. It may be easier than ever to enlist their support for securing our networks and systems, and they may be more likely to put up with some inconvenience for users if it means tighter security.

This article gives an overview of the basics necessary to secure your network, including:
  • Passwords
  • Email attachments and client settings
  • Firewalls and demilitarized zones
  • Securing insecure protocols
  • Wireless
  • Staying informed
Consider this a checklist to reenergize your efforts or to get you started.

(Although it's on a Linux site, the article isn't platform or OS specific, so it makes for good reading for all walks of geek. -twa)
 
Post a comment
Comments (0)

Harvesting passwords from DSL routers

  View Printable Version 
SecurityThe Register:
Hackers have developed a trick for pilfering DSL account names and passwords right from subscriber's routers, a technique that provides hackers with untraceable Internet access, and potentially exposes subscriber email to interception.
 
read more (61 words) Post a comment
Comments (0)

MS digital rights management scheme cracked

  View Printable Version 
NewsAn anonymous coder named 'Beale Screamer' claims to have broken the Version-2 Microsoft digital rights management (DRM) scheme, and has produced the source code and a DOS utility to un-protect .WMA audio files.

The author's zipped file contains a well-written and lengthy description of the MS DRM weaknesses, a philosophical tract explaining why he thinks it necessary to crack, the source code, and the command-line utility.

The Register has the full story.
 
read more (9 words) Post a comment
Comments (0)

DoD Releases Updated Global Positioning System Standard

  View Printable Version 
From the DefenseLINK web site:
"DoD, as operator of the GPS, now provides civil users a horizontal positioning accuracy of 36 meters, compared to 100-meter accuracy in the previous edition of the standard, which was published in 1995. DoD also promises to notify the civil user community whenever serious or unforeseen problems could affect the new performance level. "
 
Post a comment
Comments (0)

SecurityFocus: An Overview of LIDS

  View Printable Version 
GNU/LinuxWhat is LIDS?

In traditional Unix models, the root user is all-powerful. Root is exempt from the rules and regulations of the filesystem, and has abilities that other users do not: putting interfaces into promiscuous mode, for example.
 
read more (180 words) Post a comment
Comments (0)

'Redesi' worm reformats hard drives

  View Printable Version 
SecurityZDNet News has this story:
A worm disguising itself as a security patch for Microsoft products will in fact reformat the victim's C: drive. The Redesi worm spreads by e-mail under a number of guises, and is set to trigger on November 11, 2001. But not all PCs are vulnerable to the worst of its effects, and there is an easy way to stop the damage.

(Also check out Symantec's (technical) write-up. -twa)
 
Post a comment
Comments (0)

iPAQ H3800 - the photos

  View Printable Version 
Compaq's new iPAQ - the H3800 gets its 15 minutes at www.pocketpcpassion.com. A bunch of nice photos to show how it looks compared to other Pocket PC's. Hint: they all look nearly the same. I wonder if you can actually use it for anything?

Doh! What the hell. I'm starting to want one.
 
Post a comment
Comments (2)
 Copyright © 2017 geekinfo.net
 All trademarks and copyrights on this page are owned by their respective owners.
Powered By Geeklog 
Created this page in 0.06 seconds