Tag: IP

  • Using ssh to protect web browsing over wireless or other hostile networks

    This really could be used to encyrpt web traffic over any “hostile” network. Here’s what I’m talking about. Laptop using wireless. Within our internal network we would LIKE all our web traffic to be encrypted at least from the laptop to a wired host. (From there to the outside world it will be open.) At the minimum we would like to have the traffic encrypted over the wireless leg of the journey. Here’s the most straightforward approaches uing ssh.

    (more…)

  • Warning – old wolf in sheeps clothing cloned…

    Our “good friend” spyaxe, which is one of the “wolves in sheeps clothing” that masquerade as security software, but in actuality are delivered WITH spyware, has a new clone. Apparently SpywareStrike is making the rounds, and has a website which is identical to the SpyAxe site and it looks to be the same program. The only thing that appears different is the new name. I guess with all the publicity over the spyaxe name, they figured they wanted a fresh start for the new year.

    (more…)

  • The D-Link DWL-800AP+ as a wireless repeater to extend wireless range – Part 2

    For starters, I hooked the D-link DWL-800AP+ up and connected it through a crossover cable to my usb network card. That way I could access it exclusively on one adapter and look online for information with the other adapter, which came in quite handy. The first thing I found was that by default the dwl-800ap+ was configured to use 192.168.0.30 as it’s IP address. This one was not configured with the default settings. (Used / via ebay….) So, I did an nmap -sT 192.168.0.* -e eth1 which scanned the whole 192.168.0. list of addresses using my eth1 adapter (as opposed to the default adapter eth0)

    (more…)

  • Small Ethernet Print Server

    The Hawking Technology Print Server (HPS1P) is a nice little parallel port to ethernet print server that can be configured to make a single printer available to multiple machines on a LAN (local area network). It supports a number of different protocols and can be configured through a web interface, or with a Windows based control application. There are disadvantages with hooking a printer up to a pc to share over a network. First, the pc that shares the printer has to be up and reliable. Second, that pc has to be in a convenient location to the printer.

    (more…)

  • Network administration over the holidays

    Nobody wants to be tied to their job over the holidays, but what if someone has hacked your servers and is using your machine to scam thousands of people a day? Does that keep for two weeks? Does someone monitor the abuse address? Incidents.org has a post on messages they’ve got from some reporting to abuse administrators receiving back vacation notices that things are basically on “autopilot until sometime next year.”

    (more…)

  • Artists revolting against DRM

    This is under the security tab because DRM software protection has proven to be a computer security issue… Spyware Confidential is reporting on artists revolting against the Sony DRM. According to the story…

    My Morning Jacket, the artists who recorded the copy protected CD “Z” I mentioned here, are doing more than protesting Sony BMG’s use of DRM spyware. They are revolting. Yesterday I read that My Morning Jacket was doing their own recall of the affected CDs. Now I see they are burning unrestricted copies of their CD and mailing them to users. Hmm… I wonder if they are breaking the law under the DMCA.

    (more…)

  • A couple warnings related to fake security sites

    Sunbelt has this warning about yet another fake security site. This one is laid out a bit different than the others we’ve seen in recent days. It’s not quite the same spoof of the Windows Security Center, but it makes use of Microsoft’s security logo. (And it does say Security Center at the top of the page along with “Help protect your pc”.) From sunbelt…

    For your block lists:
    amaena[dot]com

    (more…)

  • Beware: Wolves in sheeps clothing found on different sites (security scams)

    This is another “wolf in sheeps clothing” alert. The Sunbelt blog has information and tips on a number of other sites that are posing as either the Windows security center page, or a page not found error. The windows security center spoof once again claims the following “Attention! Your system is under control of remote computer with IP address >>>>>>> The remote computer has access to the following folders on your PC: \windows\system32 \program files\internet explorer \my documents drive C;\ files, click here to download official anti-spyware software. Your private info is collected by w32.sinnaka.a@mm”

    (more…)

  • Is the EFF helping? Which side?

    The Register has an opinion piece today on the EFF, claiming that they’ll lose their case against Sony. They go back through the history of the EFF and it’s “successes?” or not… in the realm of attempted protection against IP overprotection.

    (more…)

  • Handy Online Network Tools

    Most of the time when I need to do a Dig or whois or traceroute I’m at a machine that I can use a good command line version of these essential network utilities. However, there are always times when you’re at a PC or situation that is either missing some of those, or you’d rather not run the utility on the machine for other reasons. Fortunately, many of these can be found online. For a long time, I’ve kept SamSpade.org in the back of my mind as a good utility address. There you’ll find Whois lookups, reverse IP -> domain lookups, traceroutes, etc. One thing I didn’t find though on the page was Dig…

    (more…)