Syslog being down for seconds is not obvious, on the other hand it's very easy to say... inject into syslogd to hide your modifications in real time. I hook libc functions using trampolines to write LD_PRELOAD rootkits myself. I just don't get the point, it seems like a really shitty half-measure.
It doesn't really make logging more secure, you can easily just modify the entire log. Plus if someone's modifying your logs they have root permissions on your machine and then you cannot trust your system, they can put hooks on the log read to just hide certain entries if necessary.
The only real solution is to NOT trust your own system - send all the data to a remote syslog server with no other services running.
Why take a half-measure when you should have gone all the way?
Tikelaed writes: http://www.trustedreviews.com/printers/review/2007
The single biggest complaint that customers have against manufacturers of ink-jet printers and all-in-ones is the cost of consumables. While hardware prices continue to drop, the costs of ink and paper stay pretty much the same and, each year, can well add up to a good proportion of the purchase price of a machine.
This is why third-party ink and paper has proved so popular. At a fraction of the price of manufacturer's own products, you can buy look-alike consumables which appear to do exactly the same job as the originals. But there's a nagging doubt in the back of the mind that the quality of the resulting prints won't be up to the original manufacturers' standard — a doubt which is played upon by all the main printer makers.
netbuzz writes: "A Russian media fabrication, says Charles Simonyi, who should know given that he was reportedly the source who told a Russian cosmonaut that the world's richest man would soon be taking an expensive out-of-this-world vacation. However, the cosmonaut is said to have made his remarks about Simonyi's comments and Gates' intentions on Russian television, which if true would put this media "fabrication" on a par with the NASA's fake moon landing.
Tikelaed writes: http://onemansblog.com/2007/03/26/how-id-hack-your -weak-passwords/
you invited me to try and crack your password, you know the one that you use over and over for like every web page you visit, how many guesses would it take before I got it?
Let's see... here is my top 10 list. I can obtain most of this information much easier than you think, then I might just be able to get into your e-mail, computer, or online banking. After all, if I get into one I'll probably get into all of them.
1. Your partner, child, or pet's name, possibly followed by a 0 or 1 (because they're always making you use a number, aren't they?)
2. The last 4 digits of your social security number.
3. 123 or 1234 or 123456.
5. Your city, or college, football team name.
6. Date of birth — yours, your partner's or your child's.
toinks writes: "Its surprising that there are still people out there that actually used a 40-pin IDE cable instead of an 80-pin one. Result? The blue screen Unmountable Boot Volume error. Good thing a simple IDE cable change is all that's needed. But there are two more that could be the cause of this annoyance... as I have found out at this unmountable boot volume error fix page ."
bWareiWare.co.uk writes: Microsoft's business plan is to double the number of Windows users by 2015. What is stopping Linux winning these new users instead and breaking Microsoft's monopoly?
Most of these users will be from markets where Microsoft's current monopoly is easier to overcome, and have a large incentive to keep there money in the local economy rather then flowing out to a US firm. The growing tend for copyright protectionism is making even pirate copies of Windows less attractive.
Surely Linux evangelists could do more could here then fighting on Microsoft's home ground.