Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:pfsense (Score 1) 193

I've been using pfSense for the last 3 years or so and really love it. pfSense just by itself isn't the best solution for Wi-Fi, but combined with APs or routers in bridged mode loaded with Tomato, DD-WRT, OpenWRT, etc, you can do a lot with it. Include managed switches with VLAN support, multiple NICs and you can nearly run an entire infrastructure off of it.

The captive portal has been improved since 2.0 and received a lot more features with the recent 2.1 release. There is also support for plugins that greatly expand the capabilities of your pfSense box.

Comment Re:No problem here (Score 1) 266

Have a friend with a 4s and iOS 6.0.x that has some kind of background process keeping the phone from going into standby. The standby and usage timers are the same and the phone only gets about 8 hours of use.

I'm wondering if some misbehaving apps or mail/sync configurations are keeping the phone awake. Something in the iOS 6.1 update could be causing a similar problem for some of those who update.

Both my iPhone 4 and wife's 4s seem to be relatively normal since the 6.1 update.

Comment Old PC + pfSense (Score 1, Interesting) 172

Why not install pfSense on an old PC (Pentium 4-class is more than enough) with a couple of NICs and the FreeRADIUS 2 module? Put the APs in bridged mode and set up 802.1x authentication.

If you didn't want to use self-signed certs and a private CA, your only cost would be for certificate purchases/renewals. The cost is negligible if you count your staff IT hours as costing you nothing.

Comment Re:What's the impact of those new viruses? (Score 1) 183

On a system that you do not wish to format, you can use TDSSKiller from Kaspersky Labs to remove the MBR hook and the data in the TDL4 partition (if the system still boots). Kaspersky Rescue Disc or Windows Defender Offline are pretty good at detection from bootable media on a system that does not boot.

From there, you can use pretty any Linux Live CD loaded with GParted to re-merge the TDL4 partition with the partition next to it. TDL4 typically carves out space for a partition containing its own custom encrypted file system and loader files between 1MB and 8MB in size. Just be careful that the partition is a TDL4 partition you're removing and not a diagnostic or EFI partition from your manufacturer.

Comment Re:What's the impact of those new viruses? (Score 3, Insightful) 183

I'm still finding systems with infected MBRs and hidden partitions loaded with TDSS.tdl4. How old is this rootkit now?

I think these AV companies need to figure out how to properly clean/repair a system that has already been compromised before trying to play the cat and mouse game with the malware developers. I find AV software far more useful if a late detection can be removed/repaired rather than have it sit on my system for years undetected.

Comment Re:I'd like to nominate iTunes on a Mac (Score 3, Informative) 94

...uh. Not sure if sarcasm...

iTunes 11.0.1 on my iMac has "Hide iTunes" and "Hide Others" just like every other version of iTunes I've ever installed.

- Menu Bar
-- iTunes
--- Hide iTunes

I insert an audio CD or video DVD and I'm asked what I want to do with this disc...just like every other version of Mac OS X since who knows when. Have you looked at your settings here?

- System Preferences
-- CDs & DVDs
--- When you insert a music CD:
--- When you insert a video DVD:

Actually, iTunes on Mac OS X runs a hell of a lot better than it does on Windows. Kinda like how poorly Microsoft Office runs on the Mac compared to on Windows.

Comment What a weak list... (Score 1) 94

No ZeroAccess?! I guess it could be argued that portions of ZeroAccess are/were designed with the BlackHole dev kit, but it blows my mind that something as sophisticated, stealth and widespread as ZeroAccess isn't on the list. The method of infection, its resilience/resistance to removal and use of the compromised workstation are pretty unique.

I'm pretty sure that a large chunk of the malware on this list did not have file infecting variants or true "viruses".

Comment Re:What is broken? the reader or the specs? (Score 1) 56

Adobe Reader and Flash were previously the largest attack vectors...Java is by far #1 and has been for the last few years. Since Sun/Oracle states "Java Runs on 3 Billion Devices" and that a large chunk of those devices will never or rarely see a patch, it has been a HUGE painted target lately.

Comment Already doing this (Score 1) 332

I'm on an IT committee at my church as well. We've set up an old Dell Dimension 2400 with pfSense 2.0. 3 NICs (1 on-board, 2 PCI) and set up two VLANs, one VLAN being their office LAN and the other being a Captive Portal enabled VLAN with three WRT54G WAPs loaded with Tomato.

Firewall rules were created in pfSense to prevent wireless users from accessing the office LAN and wireless segregation was enabled on the access points to prevent chatter between wireless clients (prevents infected clients from attacking potentially vulnerable clients on the same network).

pfSense has a voucher system that allows you to create several rolls of time-based vouchers. You can either give the teachers a roll of active vouchers that are only good for a certain length of time, (say, the length of the Sunday school class) or you can set pfSense scheduling to restrict all access to the Captive Portal off-hours.

You can also add MAC address exceptions to the Captive Portal instead, (not really completely secure, but keeps your average users out) limit the number of associated users and bandwidth per associated client to prevent one user from monopolizing the entire connection.

Comment Re:Marathon and the Halo Series (Score 1) 105

Marathon could also be played over dial-up networking or the Internet with a utility called NetLink. NetLink allowed two devices to create an AppleTalk connection between two users over dial-up. Most of the time, it was abysmally slow and caused games to go out-of-sync, but in cases where users had a good modem (14.4/28.8) on both ends, it worked pretty well.

Slashdot Top Deals

Kleeneness is next to Godelness.

Working...