|Security Focus brings us:
Use a Honeypot, Go to Prison?.
"Using a honeypot to detect and surveil computer intruders might put you on the working end of federal wiretapping beef, or even get you sued by the next hacker that sticks his nose in the trap, a Justice Department attorney warned Wednesday."
( Permalink: Use a Honeypot, Go to Prison? Submitted by Noel Mon Apr 28, 2003 )
|Slackware: Myths and Cliches|
|A Russian physicist debunks seven "myths" about Slackware, from a newbie's point of view. The article is at OSNews.com.|
( Permalink: Slackware: Myths and Cliches Submitted by Anonymous Fri Apr 25, 2003 )
|Socket Programming in C|
|"In this tutorial I will introduce you guys how to use socket programming routines in your C code .The tutorial assumes that you know well C programming and also that you are familiar with the operating system Linux or Unix or FreeBSD...
If you are not familiar with the above operating systems then no problem you can still go forward...I will also discuss the code for WinDoze."|
( Permalink: Socket Programming in C Submitted by Dr.T Fri Apr 25, 2003 )
|Hack Attacks Revealed|
|The continuing growth of the Internet, as seen from ever growing number of new Internet users and companies doing their business online, is creating a new line of possible victims susceptible to Internet attacks. The primary objective of this book is to lay a solid foundation from which to explore the world of security.
( Permalink: Hack Attacks Revealed Submitted by LogError Fri Apr 25, 2003 )
|Burning CDs on Linux|
|Linux offers powerful, flexible tools for creating CDs. You can create disks that are readable on almost any platform and create .iso files for download and distribution. Creating CDs on Linux is easy -- once you know your way around the terminology, standards, and a few hardware issues. Take a look at this article, then you, too, can burn CDs from the command line.|
( Permalink: Burning CDs on Linux Submitted by Anonymous Fri Apr 25, 2003 )
|Mandrake Linux Corporate Server 2.1 for AMD|
|Mandrake's GaŽl Duval and MozillaQuest.Com's Mike Angelo discuss the new AMD64 OS. MozillaQuest Magazine (mozillaquest.com) reports: "There does not seem to be much difference between the Mandrake Linux Corporate Server 2.1 released in February 2003 and its new AMD Opteron offering -- other than it is optimized to run on AMD 64-bit Opteron based machines . . . Linux Corporate Server 2.1 for AMD Opteron 'allows users to run both 32- [sic] and 64-bit Linux applications' . . . . 'The Mandrake Corporate Server 2.1 for Opteron is really the x86 version ported to the Opteron. It offers a long product life and a big stability for deployment inside corporations, and at the same time it benefits from the additional power of the Opteron' . . . 'the new Corporate Server offers all the tools needed to create a full-featured [sic] enterprise network, complete with the latest up-to-date software and security updates.'"
Check MozillaQuest.com for the full story and links!
( Permalink: Mandrake Linux Corporate Server 2.1 for AMD Submitted by Anonymous Thu Apr 24, 2003 )
|Editorials: Linux and the Desktop Market|
|Two positive editorials on the web today regarding Linux and its status as a desktop OS. OSNews published "A View of Linux from the Sidelines" while NewsForge published "Linux Is Ready For Some Desktops, Not Others".|
( Permalink: Editorials: Linux and the Desktop Market Submitted by Anonymous Thu Apr 24, 2003 )
|Dual Opteron vs Dual P4 Xeon|
|Ace's Hardware has a comprehensive review of the new 1.8 GHz Opteron, with a strong focus on server-oriented benchmarks. Among the test results are benchmarks on SQL Server 2000 (Windows), Sybase ASE (Linux), and MySQL (Linux). There are also Java web application benchmark results as well as SPECjbb2000 results.|
( Permalink: Dual Opteron vs Dual P4 Xeon Submitted by Brian Neal Thu Apr 24, 2003 )
|Securing 802.11 Transmissions|
|Write down your most private information, and then throw that piece of paper out the window. After all, that's essentially what wireless data transfers are doing to you when they're not secured. Meanwhile, network architects are faced with the challenge of designing secure networks in light of these obvious problems. This article talks about the problems involved and provides tips, and best bets for 802.11x\'s elusive security.|
( Permalink: Securing 802.11 Transmissions Submitted by Anonymous Thu Apr 24, 2003 )
|Application Development on Linux Power|
|Deploying and developing your application on Linux for the IBM pSeries and iSeries POWER platforms is similar to deploying and developing on other Linux systems. In this article the similarities and differences that you need to be aware of for the Linux POWER systems are discussed.|
( Permalink: Application Development on Linux Power Submitted by Anonymous Tue Apr 22, 2003 )
|Interview with the PostgreSQL Team|
|OSNews features an interview with some members of the PostgreSQL team regarding the much needed replication feature, their competition to MySQL, their future plans and a "native" Windows/.NET port.|
( Permalink: Interview with the PostgreSQL Team Submitted by Anonymous Tue Apr 22, 2003 )
|Snort Enterprise Implementation|
|The purpose of this guide is to document the installation and configuration of a complete Snort implementation. It contains all the necessary information for installing and understanding the architectural layout of the implementation.
The Enterprise Snort Implementation version 3 has been updated for RH 9.0, includes information on securing your console via SSL, a new version of SnortCenter using Templates, and firewalling your IDS sensor.
Article (Article is in a PDF file)
( Permalink: Snort Enterprise Implementation Submitted by John Silver Tue Apr 22, 2003 )
|In this weeks
Security Alerts, we look at buffer overflows in Snort and SheerDNS, and problems in Xinetd, vixie-cron, Oracle E-Business Suite FNDFS, xfsdump, Ximian Evolution, GtkHTML, kdegraphics, and psbanner.|
( Permalink: Snort Problems Submitted by Noel Tue Apr 22, 2003 )
|Linux Security: Kinds of Encryption|
|This is an excerpt from "A Practical Guide to Red Hat Linux 8" by Mark G. Sobell, the author of best-selling UNIX and Linux books: "A Practical Guide to the UNIX System", "UNIX System V: A Practical Guide" and "A Practical Guide to Linux". This excerpt provides an overview of the complexity of setting up and maintaining a secure system.|
( Permalink: Linux Security: Kinds of Encryption Submitted by LogError Tue Apr 22, 2003 )
|Novell Elaborates on Linux|
|Linux Planet talks about
Novell and Linux.
"With the need for acceptance clearly in mind, Novell CEO Jack Messman and other execs spent a good bit of time this week casting aside notions that Novell will try to produce a "NetWare version of Linux," or take any sort of "ownership" stake in Linux. "
( Permalink: Novell Elaborates on Linux Submitted by Noel Fri Apr 18, 2003 )