Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 38 declined, 19 accepted (57 total, 33.33% accepted)

×
Security

Submission + - Are Sensible Password Policies Starving The Hail M (blogspot.com)

badger.foo writes: "Remember the Hail Mary Cloud of distributed ssh password guessing bots? They're back (or may have been active all along), but the latest news is that they seem to be numbering hundreds, not thousands like they did some years ago. Peter Hansteen speculates that maybe we are seeing the effect of sensible passwords polidies or a move to key only ssh logins. And they're still not even attempting to attack OpenBSD systems."
AMD

Submission + - What to expect in OpenBSD 5.0 onwards (blogspot.com)

badger.foo writes: "OpenBSD-current just turned 5.0-beta, providing us a preview of what the upcoming release (slated for November 1st) will look like. Book of PF author Peter Hansteen takes us through the main new features and explains the development process that has consistently turned out high-quality releases on time, every six months for more than a decade."
Networking

Submission + - Anticipating the Post-ALTQ World (blogspot.com)

badger.foo writes: "In a new article, Book of PF author Peter Hansteen takes a peek at new features in the upcoming OpenBSD 5.0 release and the plan for upcoming releases (hint: ALTQ is on its way out). He also asks the crucial question: How do we teach our favorite operating system better? Comments and suggestions welcome via email or the comment field here."

Submission + - How to reward my 100,000th tutorial visitor (blogspot.com) 2

badger.foo writes: "I've been maintaining a PF tutorial for a few years, and the tea leaves (and apache logs) tell me that in the near future my unique visitor number 100,000 will turn up. How do we celebrate the event appropriately? The tutorial has morphed into The Book of PF, so an obvious prize possibility exists, but I would welcome suggestions from Slashdot readers."
BSD

Submission + - BSD: Bounties Offered for iPSEC Backdoor Evidence (blogspot.com)

badger.foo writes: "In response to the recent claims that the OpenBSD IPSEC stack contains backdoor code covertly added to the code base by developers working for the FBI, FreeBSD developer Dag-Erling Smørgrav is now offering triple $100 bounties for credible evidence to back up those claims. You have until New Year's Eve, 2012 to collect your bounties if you can find the backdoor code. See DES' blog at http://maycontaintracesofbolts.blogspot.com/2010/12/openbsd-ipsec-backdoor-allegations.html for details. You can even contribute your matching funds to make the bounties bigger!"
Software

Submission + - BSD: The Finest Software Tool, A Creative Force (blogspot.com)

badger.foo writes: "After 30+ years, the BSD family of operating systems is still a creative force to be reckoned with. In his conference report Peter Hansteen writes: From mainframe replacements to firewall appliances, the BSD family of systems is a toolbox flexible enough to baffle insiders and newbies alike. EuroBSDCon 2010 was good fun. Read on for the full story."
Security

Submission + - OpenBSD 4.7 preorders are up (openbsd.org)

badger.foo writes: The OpenBSD 4.7 pre-orders are up. That means the release is done, sent off to CD production, and snapshots will turn -current again. Order now and you more likely than not will have your CD set, T-shirt or other cool stuff before the official release date. You get the chance to support the most important free software project on the planet, and get your hands on some cool playables and wearables early. The release page is still being filled in, the changelog has detailed information about the goodies in this release.
Security

Submission + - The Hail Mary Cloud is Growing (blogspot.com)

badger.foo writes: The .au Rickrolling of jailbroken iPhones only goes to prove that bad passwords are bad for you, Peter Hansteen points out before he reports on the further exploits of password-guessing Hail Mary Cloud (previously /.ed here). The article contains log data that could indicate that the cloud of distributed password guessing hosts is growing.
Security

Submission + - Sloppy Linux Admins Enable Slow Bruteforcers (blogspot.com) 1

badger.foo writes: Peter N. M. Hansteen reports that a third round of the low-intensity, distributed bruteforce attacks is now in progress, and that sloppy admin practices on Linux systems is the main enabler: The fact that your rig runs Linux does not mean you're home free. You need to keep paying attention. When your spam washer has been hijacked and tries to break into other people's systems, you urgently need to get your act together, right now. The article has more info and references.
Security

Submission + - The slow brute zombies are back (blogspot.com)

Peter N. M. Hansteen writes: "In real life, zombies feed off both weak minds and the weak passwords they choose. When the distributed brute force attempts stopped abruptly after a couple of months of futile pounding on ssh server, most of us thought they had seen sense and given up. Now it seem that they have not. They are back. The article has some analysis and links to fresh log data."

Slashdot Top Deals

"I've seen it. It's rubbish." -- Marvin the Paranoid Android

Working...