Contribute  :  Calendar  :  Advanced Search  :  Site Statistics  :  Directory  :  About  :  Cartoons  :  Web Resources  :  Polls  
    geekinfo.net ...for all that other stuff    
 Welcome to geekinfo.net
 Wednesday, October 18 2017 @ 11:35 CEST

The world's most stupid security measure?

  View Printable Version 
SecurityHuman rights watchdog Privacy International has launched a quest to find the World's Most Stupid Security Measure.

The global competition will identify what the group describes as the most "pointless, intrusive, annoying and self-serving" security measures.

 
read more (46 words) Post a comment
Comments (0)

The SQLSlammer worm hits the net

  View Printable Version 
SecurityThis weekend, the internet infrastructure in some parts of the world received a beating from a worm called SQLSlammer (also known as Sapphire or SQLExp.Worm). The worm attempts to use a known buffer overrun flaw in MS SQL Server 2000 by connecting to port 1434/UDP. The SQL Server security hole was published in MS Security Bulletin MS02-039 in July 2002.

According to several news sources, routers and servers bowed to the pressure of the Code-Red like flooding of the lines, taking down large chunks of ISP infrastructure in a.o. South-Korea.

 
read more (53 words) Post a comment
Comments (1)

Mitnick is back online...

  View Printable Version 
Security

For nearly a decade now, the infamous hacker Kevin Mitnick has been off the net, 5 years behind bars and a further 3.5 years with limited access to computers and the Internet.

Now he's back, and tells News.com that he plans on replacing his laptops with Apple's latest flagship, the 17" PowerBook.

There will be no more hacking though, at least thats the plan. "I learned my lesson," Mitnick said to News.com. "I have a lot of plans, and hacking isn't part of them."

 
Post a comment
Comments (0)

How secure is SSH?

  View Printable Version 
SecurityDespite its recently uncovered vulnerabilities, Secure Shell is far better than telnet and the UNIX 'r' commands and FTP which transfers usernames, passwords and everything else in clear text.

But how secure is Ssecure Shell (SSH) ? NewsFactor Network have dug into the problem in an article. Go check it out.

 
Post a comment
Comments (0)

MySQL - multiple vulnerabilities & a fix

  View Printable Version 
SecurityThe company e-matters recently reported about multiple vulnerabilities and security problems in MySQL. You need to upgrade to version 3.23.54. If you are using FreeBSD, the ports for mysql are updated. Check out FreshPorts.
 
Post a comment
Comments (1)

How to secure Microsoft Outlook (and why)

  View Printable Version 
SecurityThe seven different versions of Microsoft Outlook might not be the most secure or well thought out e-mail client around, but it's out there in the millions and many of them are making life miserable for the rest of us.

Securing it is no small task, but easy once you know how (and why). There is an article at Securityfocus.com explaining how to set security zones, attachment security, scripting controls, ActiveX and a few things more.

The article is the first of a two-part article.

 
Post a comment
Comments (0)

An introduction to DDoS attacks

  View Printable Version 
SecuritySecurityfocus.com has an interesting article on DDoS attacks. It basically explains what it is, how it differs from DoS, how you can prepare for it and how you can survive one.

It also explains what you can do (even if you're not a high-profile juicy target) to prevent it from happening in the first place.

Interesting read.

 
Post a comment
Comments (0)

tcpdump/libpcap trojans reported by CERT

  View Printable Version 
SecurityAt least one major site, the Univeristy of Oslo, have been compromized as a result of a trojan in the popular tcpdump tool for *nix...
 
read more (72 words) Post a comment
Comments (0)

Apache flaws actively exploited

  View Printable Version 
SecuritySeen on NewsForge.com:
The Apache Project has warned that several security holes in the Apache source are being actively exploited on the Internet, urging IT managers to urgently upgrade to version 1.3.27 or 2.0.43 or higher. Read all about it at internetnews.com.
 
Post a comment
Comments (0)

Kerberos 4 and 5 buffer owerflow

  View Printable Version 
SecurityThe Kerberos authentication protocol has a potential stack overflow scenario enabling intruders to gain root privileges on vulnerable machines. The hole is found in kadmind4 in all releases of MIT Kerberos 5 and all Kerberos 4 releases based on MIT Kerberos 4.

An exploit is already in circulation.

MIT has details on the flaw as well as patches available here.

 
Post a comment
Comments (0)
 Copyright © 2017 geekinfo.net
 All trademarks and copyrights on this page are owned by their respective owners.
Powered By Geeklog 
Created this page in 0.04 seconds