Tag: OK

  • Using the command line in linux – part 4

    Dealing with text…. we’ve looked at a couple of basics on logging in and starting to use the command line and hopefully not feeling too helpless there… we’ve seen ways to navigate directories and how to find new commands and how to find out more about how to use them. Now it’s time to talk about how to manipulate (work with) text files. Most every important configuration file in linux is text based and editable from the command line. This can be a VERY good thing at times, or very intimidating if you’re not comfortable with a command line environment. It’s worth noting that you CAN edit configuration files with a graphical interface text editor….

    (more…)

  • Microsoft releases patch early for WMF exploit

    Microsoft has released the patch for the WMF vulnerability that’s been all over the news early. It was released to http://windowsupdate.microsoft.com ahead of the previously announced January 10th “patch Tuesday”.

    Congrats to Microsoft for getting this out the door early. That should go a long ways to blunting the attacks that are making use of this vulnerability.

    (more…)

  • Update on the WMF exploit – more sites to block

    I haven’t checked to see if these are already on other block lists for the WMF exploit, but the following addresses are advised to be blocked (from f-secure)….

    toolbarbiz[dot]biz
    toolbarsite[dot]biz
    toolbartraff[dot]biz
    toolbarurl[dot]biz
    buytoolbar[dot]biz
    buytraff[dot]biz
    iframebiz[dot]biz
    iframecash[dot]biz
    iframesite[dot]biz
    iframetraff[dot]biz
    iframeurl[dot]biz

    (more…)

  • Network Security guide for the home or small business network – Part 11 – Why?

    Alright, so you’re still reading this series and you’re thinking. Look, I’m not protecting national security secrets. All I’m doing is (running a business|emailing my grandkids|using the web for research).

    True, good point. You’re not at the defense department. OK. Let’s say you just use your computer for email and web browsing. That’s low priority stuff right? No sensitive information on your PC? Do you ever do banking online? Yes – then you should be concerned… No? You should still be concerned… here’s why…

    (more…)

  • Disinfecting a PC… part 7

    Ok, another reboot after the BHO cleaning. Things are a good deal more responsive now, less disc swapping going on. (I suspect that those three missing BHO entries may have been causing the slow down, but I don’t know.) Installing wintop so that processes can be monitored. Also, getting spybot S&D *(search and destroy) installed and copying update from disc. The system is pretty much won at this point, I don’t see anything running that I haven’t LET run at boot, everything that I had as suspect has been disabled, now it’s just a matter of cleaning up the remnants and leftovers.

    (more…)

  • The 2nd journey begins… Mandriva 2006 upgrade 2 – Part 6

    OK – there may be those that read the last entry and had some obvious “oh, you ought to look in the ***** directory for menu information.” On the issue I ran into with missing menu items after the upgrade. (And even after moving my .kde folder to .kdeold and logging back in.) OK – it’s been a while since I’ve taken a long hard look at HOW menu’s are built in Mandrake (Mandriva)….

    (more…)

  • The 2nd journey begins… Mandriva 2006 upgrade 2 – Part 3

    Mirrors are added, now it’s time to start the process. OK, everything up until now has been preparatory and hasn’t REALLY upgraded anything. I’ve skimmed over the errata and release notes (again) at http://qa.mandriva.com to make sure there isn’t anything hardware specific or urpmi –auto-select from Mandrake 10.1 specific that I need to be aware of.

    (more…)

  • Disinfecting a PC… part 3

    Picking up from last time… AVG was failing to install with a peculiar registry error. (Which I didn’t see much reference to online.) OK, so here is another fruit of the online search (so many bugs to identify…)

    jawa32.exe is listed as spyware.seekseek in sarc’s database.

    OK – let’s see if we can kill of some of these suspects… it’s time for a couple cycles of ctrl-alt-del to remove running processes that look suspect, followed by msconfig – disabling of processes running at boot, reboot, repeat.

    (more…)

  • Self destructing messages

    Good luck Jim… this message will self destruct in 40 seconds… A UK mobile (cell) company says it’s developed self-destructing text messages. In the spring they hope to introduce self destructing email/photo and voice messages. The recipient receives a link to the message and once viewed the message “self destructs” in 40 seconds. The good things they claim from this…

    ultimately no one will ever have to worry about their messages or pictures ending up in the wrong hands ever again,

    (more…)

  • Another entry on DBAN (boot disk to securely wipe a hard drive)

    This kind of get’s glommed into hardware, software and security categories all…. I’ve mentioned DBAN a couple times already (Darik’s Boot and Nuke). I had a chance to sit down this afternoon to nuke a few disks I’ve collected over the last little while and thought I’d pass along some points on the DBAN for securely wiping the contents of hard drives. First, no matter what you do to a drive, there may be a data recovery center that can get something from it. I’m talking clean rooms, 1000’s of dollars and some good forensic recovery techniques. Why?

    (more…)