Monday , 20 May 2024
Breaking News

BIND 9 DNS Cache Poisoning

Details Vulnerable Systems:  * BIND versions 9.4.0-9.4.1  * BIND versions 9.3.0-9.3.4  * BIND versions 9.2.0-9.2.8  * BIND versions 9.1.0-9.1.3  * BIND versions 9.0.0-9.0.1 Immune Systems:  * BIND version 8  * BIND version 4 1. Introduction Attacks against DNS, and particularly the concept of DNS cache poisoning has been known for over a decade (e.g. [2] …

Read More »

Revolution OS – The First 8 Minutes

Meet the engineer, the philosopher and the lawyer who faced down the suits (and Bill Gates) to create the Open Source Movement and Linux operating system. A documentary on the Open Source movement, the Linux computing platform and their struggle to crack Microsoft’s iron grip on the world of computing. Includes interviews with Linus Torvalds, the creator of Linux, Richard Stallman, the ideologue of the movement, and other high-tech big shots like Bruce Perens, Eric Raymond, Brian Behlendorf, Michael Tiemann, Larry Augustin, Frank Hecker and Rob Malda. Official Site

Read More »

Open Source at Microsoft

Today, Microsoft took another step in its relationship with the open source software community. We did this by bringing up a new web property that clearly outlines Microsoft’s position on OSS by providing specific information about Microsoft, the OSS community and the interaction between the two. The new site also details information about getting started with OSS and Microsoft technologies.  We’ll keep the site updated with new content featuring Microsoft’s engagements with the OSS community – be that events like OSCON, partnerships, offers or just interesting articles highlighting different work we’re doing across the company. Port 25 will continue to be the source for technical analysis and community with the Open Source Software Lab. Visit the site

Read More »

How can I reset the administrator’s password if I forgot it

Ok, so you say you forgot your Windows administrator’s password, huh? Oh well, it doesn’t really matter if you did or you just say you did. The fact is that you need to gain access to a computer and you cannot “remember” the administrator’s password. How can you get out of this situation without formatting and re-installing the operating system? One method of gaining access to the system is by trying hard to remember the forgotten password, or a password of another user which has the same level of administrative rights. However I don’t think this approach will help you, otherwise you wouldn’t be sitting here reading article, would you?) Another method is by trying to restore a backed up System State (in Windows 2000/XP/2003) or a ERD (in NT 4.0) in which you do remember the password. The problem with doing so is that you’ll probably lose all of …

Read More »

Manage iPod From A Linux Desktop With Amarok

This article shows how you can use an iPod on a Linux desktop with Amarok. It covers how you can upload MP3 files from your desktop to your iPod, download MP3 files from your iPod to your desktop, and how you can delete files on the iPod. Normally, Apple’s iTunes software is needed to manage an iPod, but iTunes is not available for Linux. Fortunately, there are Linux alternatives such as Amarok that can handle the task. I do not issue any guarantee that this will work for you! Preliminary Note I have tested this with an iPod nano on a PCLinuxOS 2007 desktop where Amarok is installed by default. If Amarok isn’t installed on your desktop, install it using your distribution’s package manager. The usage of Amarok is the same, regardless of the distribution. Plug In Your iPod First plug in your iPod into your desktop system using the …

Read More »

Now Here, No Where

Membandingkan pandangan orang yang pesimis dan yang optimis. Yang pesimis mengatakan OPPORTUNITY IS NO WHERE, tidak ada peluang di mana pun. Sedang orang optimis selalu mengatakan OPPORTUNITY IS NOW HERE, peluang itu saat ini ada di sini. No where(tidak ada di mana pun) dan now here (sekarang ada di sini) jumlah dan urutan hurufnya sama persis. Hanya saja letak huruf “w” yang menyatu dengan kata yang di depan atau yang menyatu dengan kata yang di belakanglah yang membedakan artinya. Itu jelas berarti bahwa sudut pandang seseorang lah yang memastikan bahwa peluang, atau kesempatan, itu tidak ada di mana-mana, atau memang ada di sini. Toh bentuk peluangnya sama, tempat dan situasi yang dihadapi juga sama – hanya yang cukup jeli dan punya pengharapan (= optimis) dapat mengenalinya sebagai peluang yang harus ditangkap dan digarap, sedang yang lain tidak melihatnya sama sekali. Begitu peluang sudah berada di dalam dekapan kita, kita tetap …

Read More »

The reasons to fight spam on Yahoo! Messenger

I came across a disturbing story on Yahoo! News last week called “Confessions of a former spammer”. It detailed the practices of a former email spammer named “Ed” who earned a as much as $15,000 per week sending emails that promoted pills, porn and casinos. Like any good opportunist, Ed has written a book about his exploits. But just a read of the news story will give you a feel for what it’s like to work in this seedy sector of the internet. Read the full story Once my nausea subsided, reading the article got me to thinking about our own spam challenges. While we have powerful anti-spam protections in place on the Yahoo! network and in Messenger specifically, the ultimate spam protection comes from our millions of users who take the time to report unwanted messages. It’s vital that when you encounter spam on Yahoo! Messenger, you take the …

Read More »

Who you gonna call

Microsoft offers no-charge phone support for virus and spyware problems, and for other security-related questions for consumers. Before you call, make sure to take these four steps to help protect your computer: 1. Keep your firewall turned on. 2. Keep your operating system up-to-date. 3. Useantivirus software. 4. Use antispyware software. If you’re unsure if your antivirus software or anti-spyware software is up to date, you can get a free scan of your computer at the Windows Live OneCare Safety Center at http://onecare.live.com/scan, if you’re still having trouble, you can call: 1-866-PCSafety or 1-866-727-2338 Support engineers are available 24 hours a day for the U.S. and Canada. For phone numbers outside of the U.S. and Canada, select your region Note: Do not call with the same phone line that you use to connect to the Internet. You might have to connect to the Internet while you’re on the phone with …

Read More »

Safari exploit gives hackers full control over iPhones

Researchers just unveiled a pretty serious security vulnerability in the iPhone. More specifically, it’s Apple’s Safari web browser which exhibits the vulnerability. Researchers at Independent Security Evaluators have used the vulnerability to take malicious control of the iPhone from rogue websites loaded with the exploit. Once in, researchers have full administrative access over the phone allowing them to listen in on room audio or snatch the SMS log, address book, call history, email passwords and more — we’re talking full access to your phone. Researchers note that the only way to stay safe is to check those URLs and only visit sites that you trust (which isn’t very reassuring) and “may or may not be exploitable” from Mac and PC versions of Safari — the same vulnerability exists only they haven’t written the proof-of-concept exploit to test it yet. Apple has been notified of the vulnerability and a proposed fix …

Read More »