Archive for December, 2005

Building RPM’s – building from tarballs

Wednesday, December 28th, 2005

Again – I’m NOT an expert on the subject, but have had some success with building rpm’s from either src.rpms (covered last time) and building from tarballs… This entry will talk about the simplest kind of rpm build from tarballs. This is a situation where the developer’s in their great foresight have actually got a […]

Converting spaces in filenames to underscores

Wednesday, December 28th, 2005

Linux supports long file names, in some (many?) ways better than windows. However, when I moved over to linux I had tons of files with spaces in the name. This isn’t really a problem usually, but it can be a bit annoying having to enclose the filename in quotes for everything… anyway. Most of these […]

Another workaround for WMF exploit

Wednesday, December 28th, 2005

There are at least two other workarounds for the Windows Meta File (WMF) exploit that I’ve been looking into this afternoon. These from sunbelt blog. First up… 2. Change file associations for WMF files. An equally ugly fix (but perhaps preferable) is to do the following: 1. Go to My documents, Tools, Folder Options, File […]

Workaround for zeroday WMF exploit

Wednesday, December 28th, 2005

It’s worth repeating a few things here. There is a nasty exploit in the way that WMF images are parsed in Windows. This means that WITHOUT user intervention a system can be remotely exploited and through that exploit various software (spyware, viruses, other malware) can be installed. There is no patch at this moment, I […]

Workaround for the critical WMF zero-day exploit

Wednesday, December 28th, 2005

The Windows Meta File (WMF) zero-day (0-day) exploit is apparently, VERY nasty, no user intervention required (unless running firefox or opera). Just VISITING a malicous site (viewing a malicious email with image…) would be enough to get the system owned. It sounds as though a FULL reinstall is the best solution. Sunbelt has had some […]

Windows Metafile zeroday exploit

Wednesday, December 28th, 2005

There’s more on the WMF 0-day exploit… According to f-secure it’s being used to distribute the following nasties…. Trojan-Downloader.Win32.Agent.abs Trojan-Dropper.Win32.Small.zp Trojan.Win32.Small.ga Trojan.Win32.Small.ev.    Send article as PDF   

More on the Windows WMF zero-day exploit

Wednesday, December 28th, 2005

There seems to be quite a bit developing on the Windows Meta File (WMF) zero-day (0-day) exploit which was first reported yesterday. Sans has raised their alert level to yellow in an effort to get attention to this problem. It looks like the original site serving the exploit is down, but now it’s being served […]

Small Ethernet Print Server

Wednesday, December 28th, 2005

The Hawking Technology Print Server (HPS1P) is a nice little parallel port to ethernet print server that can be configured to make a single printer available to multiple machines on a LAN (local area network). It supports a number of different protocols and can be configured through a web interface, or with a Windows based […]

Network Security guide for the home or small business network – Part 16 – Learn about the enemy

Wednesday, December 28th, 2005

I remember I had a geography teacher once that was a former Marine and he said when he was growing up it was the height of the cold war and geography was interesting to him from a “know your enemy” point of view. That’s a good concept to apply to computer security and network security. […]

Keeping the new PC spyware free

Wednesday, December 28th, 2005

Spyware Confidential has the top 10 tips to keep that new pc spyware free. Some good tips here and these should be on the checklist when setting up a new pc any time of the year… Paraphrased here….    Send article as PDF   

Google
 
Web www.averyjparker.com