Archive for December, 2005

Common Networking Ports

Saturday, December 31st, 2005

Along the lines of “knowing your network” with the network security guide. Here are some of the most commonly used network ports. There are 65535 ports that can listen for a connection, so this is not a thorough listing. (These are tcp unless noted otherwise.)    Send article as PDF   

Scheduling tasks in linux kcron

Saturday, December 31st, 2005

I don’t know if kcron deserves a seperate entry for scheduling tasks under linux. Cron is what I typed on last time and it’s the daemon that controls scheduled tasks. The method for scheduling tasks that I went through last time is for the command line. Like many things in linux, there are other ways [...]

Mythtv remote frontend

Friday, December 30th, 2005

So, when I did the laptop upgrade I formated the root partition which means that working mythtv frontend was erased and it had to be set up from scratch. I had been running version 0.16 of mythtv on all the systems, but finding rpms for that older version looked challenging, so…. I went ahead with [...]

Linux Livecd Download

Friday, December 30th, 2005

This should probably go in the Windows tech support category too… but, as I’ve talked about before I’ve spent a good amount of time using different linux livecd’s. I’ve even made a few livecd’s of my own with Mandrake (now mandriva) linux, using the mklivecd scripts. One of the nice things about a livecd is [...]

Network Security guide for the home or small business network – Part 18 – What about Dialup Users?

Friday, December 30th, 2005

So, most everything so far has been targetted to high speed internet users or business networks. That means if I use dialup I’m safe. Wrong. For starters, in many ways dialup internet is LESS of a risk than high speed broadband for two main reasons. First, high speed/broadband connections are typically on ALL the time. [...]

5198 Security Vulnerabilities tracked by US-CERT in 2005

Friday, December 30th, 2005

The headline probably says most all… 5198 vulnerabilities tracked by US-Cert in 2005. This comes from The SecurityFix. It’s probably not every vulernability that was out in 2005, just those that US-CERT issued advisories for. The breakdown is 812 in Windows 2,328 in various Unix/Linux/Mac/BSD systems and 2,058 affecting multiple operating systems. It would be [...]

WMF exploit and DEP

Friday, December 30th, 2005

There’s a bit of controversy over the suggestion that Hardware DEP seemed to protect against the WMF zero day exploit. Sunbeltblog has responded to the controversy. George Ou in the first link above claims that there’s a lot of bad advice out about this exploit and that hardware DEP (Data execution prevention) doesn’t work to [...]

Lotus Notes WMF vulnerability

Friday, December 30th, 2005

This is really the same zero-day wmf vulnerability, but there is a twist. It’s been found that Lotus Notes v. 6.x and up are vulnerable to the Windows Meta File (WMF) exploit that’s making the rounds. Probably not surprising given that there are reports of many vectors of attack, not JUST the web browser. What [...]

Scheduling tasks in linux cron

Friday, December 30th, 2005

Windows has scheduled tasks which most people are only halfway aware of. Linux has very powerful scheduling capabilities coming from it’s unix heritage. cron is the daemon that deals with scheduled tasks under most linux distributions. There are a couple ways that you can schedule cron tasks. The first is from the command line.    [...]

Building RPM’s – building for several different releases on one machine

Thursday, December 29th, 2005

I support a few linux systems outside my own group. Those systems are not as quick to get upgraded to the latest and greatest version of Mandrake – now Mandriva as my home systems. But, I occasionally need to build rpms for them. I don’t want to have a build environment on each one and [...]

Google
 
Web www.averyjparker.com

Switch to our mobile site