Contribute  :  Calendar  :  Advanced Search  :  Site Statistics  :  Directory  :  About  :  Cartoons  :  Web Resources  :  Polls  
    geekinfo.net ...for all that other stuff    
 Welcome to geekinfo.net
 Wednesday, December 13 2017 @ 02:20 CET

A Sysadmin's Security Basics

  View Printable Version 
SecurityFrom Linux Devcenter over at O'Reilly Network comes this article:
System administrators are no longer alone in their concern for security. The increase in high-profile virus attacks, and a general sense of heightened security, means that executives are likely to have security on their mind. It may be easier than ever to enlist their support for securing our networks and systems, and they may be more likely to put up with some inconvenience for users if it means tighter security.

This article gives an overview of the basics necessary to secure your network, including:
  • Passwords
  • Email attachments and client settings
  • Firewalls and demilitarized zones
  • Securing insecure protocols
  • Wireless
  • Staying informed
Consider this a checklist to reenergize your efforts or to get you started.

(Although it's on a Linux site, the article isn't platform or OS specific, so it makes for good reading for all walks of geek. -twa)
 
Post a comment
Comments (0)

Harvesting passwords from DSL routers

  View Printable Version 
SecurityThe Register:
Hackers have developed a trick for pilfering DSL account names and passwords right from subscriber's routers, a technique that provides hackers with untraceable Internet access, and potentially exposes subscriber email to interception.
 
read more (61 words) Post a comment
Comments (0)

MS digital rights management scheme cracked

  View Printable Version 
NewsAn anonymous coder named 'Beale Screamer' claims to have broken the Version-2 Microsoft digital rights management (DRM) scheme, and has produced the source code and a DOS utility to un-protect .WMA audio files.

The author's zipped file contains a well-written and lengthy description of the MS DRM weaknesses, a philosophical tract explaining why he thinks it necessary to crack, the source code, and the command-line utility.

The Register has the full story.
 
read more (9 words) Post a comment
Comments (0)

DoD Releases Updated Global Positioning System Standard

  View Printable Version 
From the DefenseLINK web site:
"DoD, as operator of the GPS, now provides civil users a horizontal positioning accuracy of 36 meters, compared to 100-meter accuracy in the previous edition of the standard, which was published in 1995. DoD also promises to notify the civil user community whenever serious or unforeseen problems could affect the new performance level. "
 
Post a comment
Comments (0)

SecurityFocus: An Overview of LIDS

  View Printable Version 
GNU/LinuxWhat is LIDS?

In traditional Unix models, the root user is all-powerful. Root is exempt from the rules and regulations of the filesystem, and has abilities that other users do not: putting interfaces into promiscuous mode, for example.
 
read more (180 words) Post a comment
Comments (0)

'Redesi' worm reformats hard drives

  View Printable Version 
SecurityZDNet News has this story:
A worm disguising itself as a security patch for Microsoft products will in fact reformat the victim's C: drive. The Redesi worm spreads by e-mail under a number of guises, and is set to trigger on November 11, 2001. But not all PCs are vulnerable to the worst of its effects, and there is an easy way to stop the damage.

(Also check out Symantec's (technical) write-up. -twa)
 
Post a comment
Comments (0)

iPAQ H3800 - the photos

  View Printable Version 
Compaq's new iPAQ - the H3800 gets its 15 minutes at www.pocketpcpassion.com. A bunch of nice photos to show how it looks compared to other Pocket PC's. Hint: they all look nearly the same. I wonder if you can actually use it for anything?

Doh! What the hell. I'm starting to want one.
 
Post a comment
Comments (2)

A glance at pervasive multithreading

  View Printable Version 
OSNews is hosting a discussion (well, an article about BeOS pervasive multithreading, but with a very interesting discussion) about the result of having a pervasive multithreading OS model. Check out the discussion here.
 
Post a comment
Comments (0)

OpenBSD: Replacing WEP With IPsec

  View Printable Version 
OpenBSD/NetBSDJoshua Stein has written an article about using IPSec instead of WEP on wireless networks, under OpenBSD. From the article:
"WEP has been proven insecure and is thus inadequate for protecting a wireless network from eavesdropping or abuse. I have implemented IPsec with manual keying between a router and a client as a replacement."

Read the full article.
 
Post a comment
Comments (0)

.biz domains must wait two more weeks

  View Printable Version 
NewsNeuLevel, the company in charge of registering .biz top level domains, apparently have fouled up the process to such an extent that they have been ordered to get their act together by a U.S. judge.

Originally planned to start real-time registrations of .biz domains 23rd this month, the startup has been pushed to november 7. As with most other stuff happening in LaaLaa-land, NeuLevel have been sued for its handling of .biz-registrations. This comes in addition to the sorry handling of .info domains by Afilias.

More on these matters on cnet.com.
 
Post a comment
Comments (0)
 Copyright © 2017 geekinfo.net
 All trademarks and copyrights on this page are owned by their respective owners.
Powered By Geeklog 
Created this page in 0.06 seconds