Free time?
Since Microsoft gave us a free month, how are you spending all your newly-found free time? I'm specifically interested in readers that are custom-coding solutions to security or system administration problems. Got any C/Perl/Python code that you want to share? You coders don't get enough credit here, so let's here from you.
For example, last year I looked for a solution to monitor the changes to a Windows file share. I needed a report at the end of the day showing new files, deleted files, etc. This would allow me to detect security policy violations in an automated fashion. I couldn't find anything free or commercial to do it, so I rolled my own in Python and SQLite (a light-weight database engine). Interestingly, I discussed my project with several Windows system admins and none had ever thought about monitoring a file server in this manner.
Be sure to include whether you would allow us to reprint the code or description of the code on the site.
For example, last year I looked for a solution to monitor the changes to a Windows file share. I needed a report at the end of the day showing new files, deleted files, etc. This would allow me to detect security policy violations in an automated fashion. I couldn't find anything free or commercial to do it, so I rolled my own in Python and SQLite (a light-weight database engine). Interestingly, I discussed my project with several Windows system admins and none had ever thought about monitoring a file server in this manner.
Be sure to include whether you would allow us to reprint the code or description of the code on the site.
Keywords:
0 comment(s)
Microsoft Windows Update Errors
Two of our handlers noticed some weirdness with Microsoft update. See the image.
Update (handler Kyle Haugsness): Several people have responded with proposed fixes. Unfortunately, they are all different. The suggestions are diverse: disable all anti-virus (especially Norton and McAfee), re-install Internet Explorer, delete the Internet Explorer cache, re-install XP service pack 2, flush the DNS cache, and log-in as local administrator.
So the moral of this story is: several people seem to be having the problem occassionally and if this is affecting you, good luck in figuring out the right approach. This one seems to have no consistent cause or solution.
Keywords:
0 comment(s)
Multiple Linksys WRT54G Vulnerabilities
iDefense has released five vulnerabilities against the Linksys WRT54G wireless access point/switch/router. Some of these vulnerabilities are very serious. Users of these products are highly recommended to patch their devices. Patches for the latest versions are available at http://www.linksys.com .
The iDefense advisories are here:
iDefense advisory 304
iDefense advisory 305
iDefense advisory 306
iDefense advisory 307
iDefense advisory 308
The iDefense advisories are here:
iDefense advisory 304
iDefense advisory 305
iDefense advisory 306
iDefense advisory 307
iDefense advisory 308
Keywords:
0 comment(s)
MacOS X Java patches
Apple Computers earlier today released patches for MacOS X versions 10.4.2 and 10.3.9. These security patches update Java installed on the computer to protect against certain vulnerabilities that could allow attackers to bypass security restrictions, disclose sensitive information, or elevate system priviledges. More information is available at http://www.frsirt.com/english/advisories/2005/1734 or from Apple Information Article 302265. The FRSirt advisory is enumerating 5 vulnerabilities, evolving around race conditions and some vaguely defines applet issues. Not much details available at this point from either site.
The downloads are available at Apple Support Download.
Scott Fendley, Handler on Duty
The downloads are available at Apple Support Download.
Scott Fendley, Handler on Duty
Keywords:
0 comment(s)
×
Diary Archives
Comments
www
Nov 17th 2022
4 months ago
EEW
Nov 17th 2022
4 months ago
qwq
Nov 17th 2022
4 months ago
mashood
Nov 17th 2022
4 months ago
isc.sans.edu
Nov 23rd 2022
4 months ago
isc.sans.edu
Nov 23rd 2022
4 months ago
isc.sans.edu
Dec 3rd 2022
3 months ago
isc.sans.edu
Dec 3rd 2022
3 months ago
<a hreaf="https://technolytical.com/">the social network</a> is described as follows because they respect your privacy and keep your data secure. The social networks are not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go.
<a hreaf="https://technolytical.com/">the social network</a> is not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go. The social networks only collect the minimum amount of information required for the service that they provide. Your personal information is kept private, and is never shared with other companies without your permission
isc.sans.edu
Dec 26th 2022
3 months ago
isc.sans.edu
Dec 26th 2022
3 months ago