Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Networking

Submission + - DNS All Over the Place

Juha Holkkola writes: "On November 15, SANS published 2006 annual update of the Top-20 Internet Security Attack Targets (www.sans.org/top20/). Each year, some of the most security conscious organizations all over the world help SANS in compiling this list based on severe vulnerabilities that have been discovered during the last 12 months or so. If any network service or product that has made this list has been more or less safe for more than 12 months, it gets dropped out. What strikes me the most with SANS's Top-20 is that DNS and BIND have made the list every single year since SANS started publishing it in 2000. That's every year for seven years now. And so, one would imagine that the networking community would finally like to do something to address the associated security problems, DNS being one of the most critical TCP/IP services and all. As some information security experts have recently pointed out, network administrators often shun away from interfering DNS as that could potentially have dire implications on functioning networks. I guess what they mean by this is that as DNS is one of the few applications that dates back to the pre-firewall-era of Internet, managing and securing DNS is like having a pet dinosaur. It's really not that cute and you'd really prefer not to touch it at all. Pet talk aside, perhaps the time has come to take the bull by the horns? While DNS and plain BIND may be somewhat cumbersome to secure and to manage, there are also more advanced options out there that make protecting and managing DNS servers a walk in the park."
It's funny.  Laugh.

Submission + - Wozniak's secret history of Apple

destinyland writes: "Steve Wozniak shares his life story, debunking the started-in-my-garage myth and remembering his idolization of phone phreaker Captain Crunch. His father couldn't discuss his top secret work on the Polaris missile, but he taught him to love and understand technology, and today the passion gives him "a kind of innocence there you don't see often among billionaires." And while telling the stories to his biographer, he also kept playing practical jokes on her."
Linux Business

Submission + - Malaysian Open Source Procurement Policy Reversed

Ditesh writes: "The Malaysian Open Source Masterplan, which favoured open source over proprietary public sector procurements when all other evaluations are equal, has been reversed to a purely "neutral technology platform" policy due to "negative reaction towards open source (from the IT market)". This comes after months of hard lobbying by Microsoft Malaysia. This reversal is certainly unfortunate, as the policy has helped raise comfort levels of other policy makers worldwide in pursuing similar goals. The Malaysian Open Source Alliance has published a position statement asking for clarification of the term "neutrality", and has received support from MNC's, local companies and free software developers in Malaysia."
HP

Submission + - HP Agrees to Pay 14.5 Million to Settle Civil Suit

elzurawka writes: "HP has agreed to pay 14.5 Million dollars to settle a civil suit brought on them by California Attorney General. This stiff fine goes to show that need to watch out how they conduct business. HP may have saved themselves a world of hurt by cooperating instead of trying to cover this us. FTA:
"Hewlett-Packard (HP) has agreed to pay $14.5m (£7.4m) to settle a civil lawsuit over its much-criticised investigation into a boardroom leak. The probe by the Californian attorney general came after allegations that HP had wrongly spied on its directors to try and find the source of the leak....The investigators were said to have illegally gained phone records by pretending to be the people they were spying on, a practice known as 'pretexting'. HP's chief executive Mark Hurd has already admitted that the methods the investigators used to try and identify who was behind the boardroom leaks were 'very disturbing'.""
Security

Submission + - Zero day exploit found in Windows Media Player

filenavigator writes: Another zero day flaw has been reported in Windows Media player. It comes only one day after a serious zero day flaw was found in word. The flaw is dangerous because it involves IE and Outlook's ability to automatically launch .asx files. No fix from Microsoft has been announced yet.
Security

Submission + - Why can't registrars filter out blatant phishers?

netbuzz writes: "(Note to Slashdot editors: Since this item is still "pending," I thought I would alert you to the fact that two additional posts on the topic are available, making for a nicely rounded package. Details below. Thanks.)

Security expert Mikko Hypponen asks an interesting question: Why can't domain name registrars simply refuse to accept the business of individuals who are trying to register names that would only be used for phishing? Example: directNIC's granting to a "Craig Smith" the obviously phishy "signin-ebay-c.com."

http://www.networkworld.com/community/?q=node/9540

DirectNIC's CEO defends his company's anti-fraud practices, acknowledges the system isn't perfect, and suggests a measure that might help make it better.

http://www.networkworld.com/community/?q=node/9573

Head of the Anti-Phishing Working Group says ICANN policies are responsible for enabling much of the abuse, and hence the issue is "complex."

http://www.networkworld.com/community/?q=node/9565 "
The Internet

Submission + - The Web Analyzed

Yvo Schaap writes: "http://www.yvoschaap.com/index.php/weblog/8_questi ons_about_the_web_you_always_wanted_answers_to/

Provides answers to these questions: Is porn dominating the web? Is China taking over the web? Why do I always see ads by Gooooooogle? What are the most used languages? Are all websites made in Silicon Valley? Who is best in link building? Are Yahoo and MSN really more visited then Google? And is the web evolving to web 2.0?"
Programming

Submission + - The Architecture of Mailinator

hypnofrog writes: The creator of Mailinator gives a very comprehensive explanation of the architecture of the system. Up to 5million emails a day on 1 server! Not to mention the subpoena's and daily spam attacks. Interesting read!
SuSE

Submission + - openSUSE 10.2 Released

apokryphos writes: "Michael Loeffler writes: "After a lot of work, we proudly announce the availability of openSUSE 10.2, formerly known as SUSE Linux 10.x As usual, we ship all the latest open source packages available at the time. But we want to give a special mention to the redesigned GNOME and KDE desktop, Firefox 2.0, ext3 as the new default file system, support for internal SD card readers, new power management and, last but not least, our improved package management.""
Privacy

Submission + - RFID Personal Firewall

JanMark writes: "Prof. Andrew Tanenbaum and his student Melanie Rieback (who published the RFID virus paper in March) and 3 coauthors have now published a paper on a personal RFID firewall called the RFID Guardian. This device protects its owner from hostile RFID tags and scans in his or her vicinity, while letting friendly ones through. Their work has won the Best Paper award at the USENIX LISA Conference. More information about the RFID Guardian can be found at www.rfidguardian.org."
Space

Submission + - Seeing the Earth almost live

arobic writes: European Space Agency (ESA) is putting recent pictures of the Earth (taken 2 hours before) online using Envisat. To avoid filling up their disks too quickly, only the bmp of the last 30 days are available but jpg are kept. Also, only region receiving light can be seen, which explains why no recent pictures of Scandinavia are available.

Feed Loves Linux, Runs Windows (wired.com)

Europe is struggling to kick the Windows habit. Eurocrats make a lot of noise about moving to Linux, but the actual migrations are few and far between. Bruce Gain reports from Paris.


Slashdot Top Deals

Work continues in this area. -- DEC's SPR-Answering-Automaton

Working...