Filtering out Ads with a Proxy using SafeSquid Proxy Server

Thursday, October 23rd, 2008

I just ran across this good how-to on replacing ads using a proxy server (in this case safesquid). A proxy server is a piece of software that requests web pages for other machines and then passes the pages along to the other computers. When the server requests a page it’s possible to make alterations and [...]

Windows XP repair install problems

Friday, December 7th, 2007

I’ve run into a few problems with a windows xp repair install in the last few days that I wanted to detail the problems and what the resolution was. First, it was someone elses laptop needing a hard drive replacement. The drive was imaged, but windows still would not boot, so I broke out the [...]

Torbutton – firefox anonymity browser extension

Sunday, September 16th, 2007

I don’t know if anonymity is exactly acheived, but…. anyway not too long ago I explored/setup tor on my system to play around with, no real reason I suppose, but doing what I do it pays to be aware of many different kinds of software. Tor proxies web requests from your machine through a tunnel [...]

Caching downloaded deb files with apt-cacher

Monday, January 29th, 2007

It seems silly with multiple machines to download the same file multiple times. At some level it’s not THAT inconvenient. It really depends on your connection speed and the size of the files in question. For Ubuntu and other systems based on the .deb package format and apt-get there is a nice option for setting [...]

The problems with cache servers

Thursday, October 12th, 2006

Networkworld brings us this report that exploit code removed from websites can live on for quite a while in caching servers. Which, in a way is NOT news, but it’s worth remembering. Many times when someone visits a website, their really visiting a caching proxy server that has previously grabbed a copy of data from [...]

Good sarc monitoring tip

Wednesday, August 23rd, 2006

Sarc is still in their month of security tips per day and todays is another good one. Todays tip is about monitoring machines, particularly those that “defend” your network. (Mail antivirus scanners/ proxy fitlers/scanners/etc.) The core of the advice is to not just ping – that only tells you if the system exists and is [...]

Symantec Antivirus Remotely Exploitable Vulnerability

Friday, May 26th, 2006

This is bad – whose defending the defender? eEye security has a bulletin announced that regards a remotely exploitable vulnerability in Symantec Antivirus 10.x and Symantec Client Security 3.x They say other versions MAY be vulnerable they’re waiting for information from Symantec. Now, Symantec is probably the biggest selling antivirus package out there. It looks [...]

Using ssh to protect web browsing over wireless or other hostile networks

Saturday, January 21st, 2006

This really could be used to encyrpt web traffic over any “hostile” network. Here’s what I’m talking about. Laptop using wireless. Within our internal network we would LIKE all our web traffic to be encrypted at least from the laptop to a wired host. (From there to the outside world it will be open.) At [...]

Federal Government funding research into VOIP wiretapping

Monday, August 15th, 2005

I can’t say I’m surprised, it makes sense. Plain old telephone service (POTS) can be tapped, and now that VOIP is coming into it’s own, the FBI and others need new ways of tapping the conversations. CNET is reporting on one such initiative that seems to be proving successful at the first step towards tapping [...]

Kstars – great personal astronomy software under linux

Monday, August 8th, 2005

I’ve played around with Kstars off and on for a good while. It reminds me vaguely of a program I used to have under windows. It’s essentially a planetarium on your desktop. It is GPL licensed and part of the KDE Education suite of programs for the KDE desktop under Linux. It has all the [...]


Switch to our mobile site