Contribute  :  Calendar  :  Advanced Search  :  Site Statistics  :  Directory  :  About  :  Cartoons  :  Web Resources  :  Polls  
    geekinfo.net ...for all that other stuff    
 Welcome to geekinfo.net
 Monday, February 26 2018 @ 02:16 CET

Anti-Spammers Threaten: You Think MAPS Is Bad?

  View Printable Version 
E-mail marketers may soon yearn for the days when Mail Abuse Prevention System LLC was their biggest pain in the neck, according to sources from the anti-spam camp.

In the wake of the recent settlement between Experian eMarketing and MAPS, some Internet service providers have begun subscribing to other so-called block lists, or lists of suspected spammers that ISPs use to filter unwanted e-mail. And these other lists' maintainers are not nearly as friendly as the folks at MAPS, sources say.

Read the full story over at DMNews.
 
Post a comment
Comments (0)

Red Hat Linux 7.2 available

  View Printable Version 
GNU/LinuxRed Hat 7.2 uses the 2.4.7 kernel, so the stability freaks out there should be catered for. There is a press release about this release at Red Hat's site.

To download, check out Red Hat's mirror sites. The whole thing takes about 900Mb.
ZDnet called 7.2 "pain-free Linux" in their review.
 
Post a comment
Comments (0)

geekinfo.net to bolster site security

  View Printable Version 
NewsThe world is on the verge of both war and Windows XP. This is our plan.
 
read more (249 words) Post a comment
Comments (1)

Psionic Portsentry 1.1, the defender of the ports

  View Printable Version 
SecurityLinuxFocus presents the story about PortSentry:
"Psionic portsentry is part of the Abacus Project suite of tools (beside portsentry, the suite offers logcheck and hostsentry). It's an IDS (Intrusion Detection System) dedicated to portscan detection and active defense. It works on many Unix flavors including Mac OS X. The main feature of an IDS is to inform the sysadmin about intrusion attempts. Portsentry goes further since it can react on an attack. The latest version (1.1) of this great tool is available from http://www.psionic.com, and by the way, version 1.0 is now part of some main Linux distributions (Debian, RedHat...)."
Read the full story.
 
Post a comment
Comments (0)

Will Tinky Winky use XP?

  View Printable Version 
WindowsYou might have seen it already, but don't you think the standard backdrop in Windows XP look just a tiny weeny little bit like the place the Teletubbies live in? Kelly McNeill at osopinion.com investigates further :-)
 
Post a comment
Comments (0)

A Sysadmin's Security Basics

  View Printable Version 
SecurityFrom Linux Devcenter over at O'Reilly Network comes this article:
System administrators are no longer alone in their concern for security. The increase in high-profile virus attacks, and a general sense of heightened security, means that executives are likely to have security on their mind. It may be easier than ever to enlist their support for securing our networks and systems, and they may be more likely to put up with some inconvenience for users if it means tighter security.

This article gives an overview of the basics necessary to secure your network, including:
  • Passwords
  • Email attachments and client settings
  • Firewalls and demilitarized zones
  • Securing insecure protocols
  • Wireless
  • Staying informed
Consider this a checklist to reenergize your efforts or to get you started.

(Although it's on a Linux site, the article isn't platform or OS specific, so it makes for good reading for all walks of geek. -twa)
 
Post a comment
Comments (0)

Harvesting passwords from DSL routers

  View Printable Version 
SecurityThe Register:
Hackers have developed a trick for pilfering DSL account names and passwords right from subscriber's routers, a technique that provides hackers with untraceable Internet access, and potentially exposes subscriber email to interception.
 
read more (61 words) Post a comment
Comments (0)

MS digital rights management scheme cracked

  View Printable Version 
NewsAn anonymous coder named 'Beale Screamer' claims to have broken the Version-2 Microsoft digital rights management (DRM) scheme, and has produced the source code and a DOS utility to un-protect .WMA audio files.

The author's zipped file contains a well-written and lengthy description of the MS DRM weaknesses, a philosophical tract explaining why he thinks it necessary to crack, the source code, and the command-line utility.

The Register has the full story.
 
read more (9 words) Post a comment
Comments (0)

DoD Releases Updated Global Positioning System Standard

  View Printable Version 
From the DefenseLINK web site:
"DoD, as operator of the GPS, now provides civil users a horizontal positioning accuracy of 36 meters, compared to 100-meter accuracy in the previous edition of the standard, which was published in 1995. DoD also promises to notify the civil user community whenever serious or unforeseen problems could affect the new performance level. "
 
Post a comment
Comments (0)

SecurityFocus: An Overview of LIDS

  View Printable Version 
GNU/LinuxWhat is LIDS?

In traditional Unix models, the root user is all-powerful. Root is exempt from the rules and regulations of the filesystem, and has abilities that other users do not: putting interfaces into promiscuous mode, for example.
 
read more (180 words) Post a comment
Comments (0)
 Copyright © 2018 geekinfo.net
 All trademarks and copyrights on this page are owned by their respective owners.
Powered By Geeklog 
Created this page in 0.06 seconds