Friday, December 31, 2004
Communications Programming
Thursday, December 30, 2004
Chaining Policies
is a site discussing basic web proxy theory. An interesting part near
the end discusses "chaining" of proxies so that each department in an
organization can maintain its own usage policy while the organization
can impose its own set of rules. This effectively "chains" or
aggregates usage policies.
Wednesday, December 29, 2004
Tuesday, December 28, 2004
Analyzing Worms Via Compression
compression.
Monday, December 27, 2004
Frequency Chart
bit basic. However, the information is valuable enough. The numbers
across the top is frequency in MHz.
Sunday, December 26, 2004
Saturday, December 25, 2004
Friday, December 24, 2004
Swiss Army disk
following week. Today is an exception, for obvious reasons. I have
gifts to wrap, dishes to wash, animals to feed. Somehow I have to
figure out how to sneak my son's and his girlfriend's presents into the
house (past them). HBO is running Carnivale again this coming week so I
have to find time to set up the record schedule. You get the idea.
In any case, blogging
this week may be a little erratic. Here's today's...
IBM has an
article about <a href="http://www-106.ibm.com/developerworks/linux/library/l-
clustknop.html?ca=dgr-lnxw06ClusterKnop">building clusters with custom
Knoppix CD's. Knoppix seems to be one of those tools that finds its
way into everything. Since our appliances will soon have their own IPv6
addresses, what's next? Washing Machine Knoppix? Fish Tank Knoppix?
Lawn Mower Knoppix?
Don't laugh! Mix in a little wireless or
broadband-over-power-line and it's not that much of a stretch.
Thursday, December 23, 2004
Session Riding
Dec/0427.html">paper which discusses "session riding", which appears
to amount to hijacking a user's access or data via methods such as
sending crafted instructions via html e-mail (when the user's e-mail
client loads the html, the exploit is executed).
Wednesday, December 22, 2004
More WEP problems
toys.com/">WiFi Toys has an article on <a href="http://www.wifi-
toys.com/wi-fi.php?a=articles&id=53">breaking WEP really fast.
Tuesday, December 21, 2004
Why?
op=modload&name=News&file=article&sid=4989">stated that they've
switched virus scanners to "provide a safer online experience for
consumers". Considering that it's probably more of a financial
issue or a programming difficulty (e.g., can't interface the scanner
with the webmail), it's a bad choice of words for the supposed cause.
We may see a lawsuit because a corporation has taken a public
position on the quality of a competitors product (remember Microsoft purchased two
companies last year for this purpose). It's one thing to say your
own product is better than everyone elses. It's another to say (or
directly imply) that a competitor's product is crap. Without proof,
that is.
HSC
verion of its Honeynet Security Console (for Win2K/XP). Screenshots are
here.
Monday, December 20, 2004
Bandwidth shaping
network, it might be worthwhile to learn about <a href="http://www.linuxexposed.com/internal.php?
op=modload&name=News&file=article&sid=563">traffic shaping and bandwidth
management.
Sunday, December 19, 2004
WEP Problems
of a two part series on the current problems with WiFi encryption. The
focus in on WEP but it does touch on other topics.
One thing to keep
in mind: if WEP is the best you have, it's better than nothing and
overall WEP security can be improved via basic practices such as
periodically changing keys.
Saturday, December 18, 2004
Effective Practices and Solutions
Friday, December 17, 2004
Thursday, December 16, 2004
tasklist.org
In the process, I usually hit Google also. In trying to figure out "You_are_dismissed.com" (it's Bagle.Ap) I found tasklist.org. It appears to be a really good source for identifying unknown (unauthorized) processes.
Wednesday, December 15, 2004
Deb Radcliff
Tuesday, December 14, 2004
Free classes
More blogs
Monday, December 13, 2004
Dave Dittrich
Detecting Complex Viruses
Sunday, December 12, 2004
Firewalls book
Network Attacks
Saturday, December 11, 2004
Free training
Each assessment shall be prepared by a person as a Certified Information System Security Professional (CISSP) or as a Certified Information Systems Auditor (CISA); a person holding Global Information Assurance Certification from the SysAdmin, Audit, Network, Security Institute (SANS); or by a similarly qualified person or organization approved by the Associate Director for Enforcement, Bureau of Consumer Protection, Federal Trade Commission. |
Prediction: You'll see the quals thing get out of hand, even some fakery/foolery that will require either tighter control of quals or the government will create their own quals requirements.
Stand by for an industry shift!
Friday, December 10, 2004
The Broken
For you conspiracy types, it proves that there was dark forces behind that TV show. Hacking with Ramzi is really, really bad.
Thursday, December 9, 2004
Another semester ends
I'm addicted to the potato soup, which I'm not supposed to have due to its content. I don't have the recipe for it (hope to though) but it contains what looks like small bits of pot roast, potatoe slices, and spaetzle in a clear beef broth. Occasionally, another veggie may make a cameo appearance but the base recipe is delicious. Anything with spatzle can't be all that bad, right?
If you can find someone who makes good spatzle, heifering, and dumpfnodle hire 'em, marry 'em, or otherwise move in with them. Same goes for lumpia and pansit. And before you food vacuums at 757 ask, mine's only passable so you ain't moving in with me.
Apologies for the spelling.
fe3d
Wednesday, December 8, 2004
Questions to Ask
Tuesday, December 7, 2004
Spammer update
Monday, December 6, 2004
Wireless protocols
Fighting comment spam
Sunday, December 5, 2004
Spammer list for 4DEC04
2 | 12.158.228.18 | |||
1 | 168.143.113.5 | |||
5 | 193.95.113.114 | |||
12 | 194.213.41.11 | |||
127 | 194.213.41.12 | |||
26 | 194.213.41.13 | |||
72 | 194.213.41.14 | |||
1 | 194.7.246.43 | uu194-7-246-43.unknown.uunet.be | ||
1 | 195.132.141.251 | m251.net195-132-141.noos.fr | ||
4 | 195.27.14.2 | |||
1 | 200.12.238.23 | |||
40 | 200.21.45.4 | mangostino.ut.edu.co | ||
3 | 200.212.114.3 | |||
4 | 200.34.99.9 | |||
1 | 211.239.170.46 | |||
1 | 212.138.47.16 | cache6-1.ruh.isu.net.sa | ||
1 | 212.138.47.20 | cache10-4.ruh.isu.net.sa | ||
1 | 212.138.47.21 | cache13-4.ruh.isu.net.sa | ||
1 | 212.138.47.26 | |||
10 | 213.172.36.62 | |||
12 | 213.41.1.222 | wan-222.1.rev.fr.colt.net | ||
8 | 213.41.1.226 | wan-226.1.rev.fr.colt.net | ||
19 | 217.144.0.137 | |||
5 | 218.4.189.197 | |||
1 | 218.57.113.11 | |||
6 | 219.93.211.74 | |||
11 | 64.125.108.114 | 64.125.108.114.available.above.net | ||
42 | 65.54.188.139 | |||
1 | 66.249.64.146 | crawl-66-249-64-146.googlebot.com | ||
1 | 66.249.64.156 | crawl-66-249-64-156.googlebot.com | ||
1 | 66.249.64.160 | crawl-66-249-64-160.googlebot.com | ||
1 | 66.249.64.198 | crawl-66-249-64-198.googlebot.com | ||
4 | 68.167.94.202 | h-68-167-94-202.chcgilgm.covad.net | ||
6 | 68.98.206.172 | wsip-68-98-206-172.ks.ok.cox.net | ||
5 | 80.65.102.162 | ip102-162.introweb.nl |
Defeating Encryption
Saturday, December 4, 2004
Free time
and
, work on comment titles, and generally get back to tweaking the site. Are there any features that you'd like to see?
I'm considering dumping the Blogroll and replacing it with a links list or putting a "recent comments" frame there.
Thursday, December 2, 2004
Christmas music
What kind of person (that's the nice version) thinks it's important to post their Winamp-generated playlist to the Internet? (Hint: there's quite a few of them.)
I went shopping for a album, containing a Christmas song that I've not heard in fifteen years by Kevin Bloody Wilson (Hey Santa Claus...). It was amazing, the number of fake sites and playlist sites that I had to wade through before finding a legit site offering Kevin's albums.
Maybe I should write one?
living next door to spammers