This multimedia presentation details five “hacker tools” that every network admin needs to be familiar with. Along the lines of “know your enemy” I think it’s important to be well versed with what tools a cracker might use to infiltrate your network.
(more…)
Category: Computers
-
5 must have tools for the network admin
-
Daylight savings time changes could cause problems
The Boston Globe has a story about todays energy bill signing and an issue which I mentioned once before. It seems that there are many devices that are hardwired to change to DST on a fixed schedule.
(more…) -
Kstars – great personal astronomy software under linux
I’ve played around with Kstars off and on for a good while. It reminds me vaguely of a program I used to have under windows. It’s essentially a planetarium on your desktop. It is GPL licensed and part of the KDE Education suite of programs for the KDE desktop under Linux. It has all the basics for a program of this class (view the night sky and the stars from your latitude and longitude.)
(more…) -
The state of computer security
The Register has an interesting piece, reflecting on the current state of the computer security industry. The recent Blackhat convention has prompted this reflection and they conclude that not enough is being spent currently on computer security.
(more…) -
Display problems with livecds
One of the things I’ve run into with various linux livecds, whether it’s my own made with mklivecd, or others based on Knoppix, the Suse Livecd, or I could go on…. the problem I’ve seen is with the display drivers. Yes, MOST of the time the autodetection seems to work fine and you get a good legible display. There are sometimes that you get an illegible display of one or two flavors. One is the overlapping ghostted images. I personally like this one more because it means we’re close, that the autodetect has just chosen the wrong resolution or refresh rate. This can be fixed.
(more…) -
Pay per click hijacking
Interesting article at lurhq.com on pay per click hijacking, which is really an extension on old DNS poisoning attacks. Essentially the DNS poisoning attack works like this…
(more…) -
Review of Acer Ferrari 4000 notebook
The Register also has a review up today of the Acer Ferrarri 4000 notebook/laptop. Apparently, an older version of the Ferrari was too bright red for the taste of the reviewers. They do a thorough writeup of the newer version which appears to be a sleeker, more conservative colored model.
(more…) -
Sunbeltblog on Windows Vista’s attempt to keep Windows up to speed
Sunbelt blog has an article about Microsoft’s plan to keep Windows Vista from becomming more sluggish as the system aged. Microsoft’s plan is to run defragmentation in the background and preloading commonly used components as outlined in this article.
(more…) -
Trifinite clarifies some points on car whisperer
The big buzz in tech circles last week was the release of a tool called “car whisperer” which could allow someone to remotely insert audio into a bluetooth enabled vehicle. It was also possible, using the cars audio system to eavesdrop on the interior of the vehicle. Essentially, the folks at trifinite used a directional antenna, laptop and special software to take advantage of the fact that most manufacterors are not securing their bluetooth receivers with anything more than 0000 or 1234 for an access pin number.
(more…) -
Microsofts Linux Lab manager answers questions on slashdot
A few days back I mentioned that slashdot was posing questions to Bill Hilf, the manager of Microsoft’s Linux lab. Today his responses are being posted.
(more…)