<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-26757419</id><updated>2024-03-06T22:43:22.839-08:00</updated><title type='text'>Secure Tech - The Internet Security Blog</title><subtitle type='html'>Secure Web Surfing Information &amp; Tools, Anonymous Web Surfing, IP Address Security, OS Security, and more.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://securetech.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default?alt=atom'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default?alt=atom&amp;start-index=26&amp;max-results=25'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>43</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-26757419.post-117084179474232556</id><published>2007-02-07T01:49:00.000-08:00</published><updated>2007-02-07T01:49:54.796-08:00</updated><title type='text'>Hackers crack Vista Activation Server</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Pirates have released another ingenious workaround to Vista&#39;s copy protection: a hacked copy of Microsoft&#39;s yet-to-be-released volume licencing activation server, running in VMware.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Volume Activation 2.0 is one of the more controversial features of Vista: it means that every copy of Vista has to be activated, even the Business/Enterprise volume licenced editions.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;However, to make life easier for administrators, Microsoft worked in a more convenient system of in-house for en masse activation of PCs called KMS – Key Management Service.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;The idea behind KMS is that you have a single PC running KMS which can then handle activation for all your Vista clients, so that they don’t have to connect back to Microsoft every single time.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;The downside of KMS is that the activation is only good for 180 days, to discourage people bringing in their home systems, activating them and wandering off again.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Bearing in mind that KMS wasn’t scheduled to be released until next year, pirates have managed to get hold of KMS and produce a standalone, fully-activated KMS server called “Windows Vista Local Activation Server – MelindaGates”. Tongue-in-cheek of course…the first “cracked” version of Vista was called Vista BillGates.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/117084179474232556'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/117084179474232556'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2007/02/hackers-crack-vista-activation-server.html' title='Hackers crack Vista Activation Server'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-116945942111933232</id><published>2007-01-22T01:34:00.000-08:00</published><updated>2007-01-22T01:50:21.436-08:00</updated><title type='text'>Contextual Link Exchange Programs</title><content type='html'>&lt;span style=&quot;font-size:130%;&quot;&gt;Stop exchanging reciprocal links!&lt;/span&gt;&lt;br /&gt;If you maintain a blog or general websites. your inbound links are primarily coming from back end links pages you are probably noticing that this is becoming less and less effective. Even if the pages are based on a theme they are still not passing very much reputation since they are on pages with hundreds of links.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Start swapping contextual links.&lt;/span&gt;&lt;br /&gt;It is much more effective to get links embedded within the context of an article or blog that is based on the same theme as your site. If you use appropriate anchor text this can greatly supplement your SEO efforts. Not only will your pages rank higher in the search engines you will also be building residual traffic from the content pages linking to you.&lt;br /&gt;This is really common sense. If you place yourself in the shoes of the people who are visiting your contextual partners site would you be more likely to be interested in a page linked from the article you are reading or to a page within their link exchange directory? I don’t know about you but I often visit pages linked to from articles. I also stay away from back end directories like they are a pit filled with poisonous snakes.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;So how do you kick the reciprocal habit?&lt;/span&gt;&lt;br /&gt;You could simply search for related articles and contact webmasters with contextual exchange proposals. This method is a little tedious. It works but it is not always time efficient. Many webmasters prefer simple directory submission.&lt;br /&gt;Another, more efficient, option is to join the &lt;a href=&quot;http://contextual.v7n.com/&quot; alt=&quot;V7 Contextual Link Network&quot; title=&quot;V7 Contextual Link Network&quot;&gt;V7 Contextual Link Network&lt;/a&gt;. &lt;b&gt;Contextual Links @ V7N&lt;/b&gt; provides the perfect link - the ideal link - by design. The link is no longer a matter of happenstance, random haphazard or something to be left to divine intervention. The perfect link is now a commodity.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Conclusions&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Websites building perpetual traffic as opposed to disposable traffic are      much more likely to sustain themselves. Writing web content is an excellent way to build passive income.      An article can potentially pull visitors from search engines for years. In my opinion self sustaining websites      or pages are the basis for building larger and larger income streams.&lt;br /&gt;&lt;br /&gt;Webmasters have the option to display additional ads to increase the EPM.      Although this may have short term benefits it can damaging in the long term.      If the end user is dissatisfied with the number of ads on the site they may      not return in spite of the quality of content. This is what I call “disposable      traffic“.&lt;br /&gt;&lt;br /&gt;Afterall, you could always hit up Google and search for your site topic and look out for sites providing targeted links. ;)&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/116945942111933232'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/116945942111933232'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2007/01/contextual-link-exchange-programs.html' title='Contextual Link Exchange Programs'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-116932929932882419</id><published>2007-01-20T13:41:00.000-08:00</published><updated>2007-01-20T13:41:39.643-08:00</updated><title type='text'>$12,000 for a serious Vista or IE 7 bug</title><content type='html'>&lt;img src=&quot;http://www.alleuroperail.com/images/verisign-logo.gif&quot; align=&quot;right&quot; /&gt;Bug hunters of the world, VeriSign&#39;s iDefense has an updated bug bounty challenge for you.&lt;br /&gt;&lt;p&gt;   For the current quarter, the company will &lt;a href=&quot;http://labs.idefense.com/vcp/challenge.php&quot;&gt;pay $8,000 for a security vulnerability&lt;/a&gt; that lets an attacker remotely gain control over a computer running Microsoft&#39;s Windows Vista or Internet Explorer 7, the company said on its Web site. iDefense will pay for a maximum of six vulnerabilities, if more are reported only the first six will qualify, it said. &lt;/p&gt;&lt;p&gt; In addition to the $8,000 award for the submitted vulnerability, iDefense will pay between $2,000 and $4,000 for working exploit code that exploits the submitted vulnerability, the company said.&lt;/p&gt;&lt;p&gt;Internet Explorer 7 is the latest version of Microsoft&#39;s widely used Web browser and Vista is the newest release of its operating system. Microsoft has promoted both as its best work yet in terms of browser and operating system security.&lt;/p&gt;The &quot;quarterly hacking challenge&quot; is part of iDefense&#39;s existing bug bounty program. The company started the challenges last year. Previous ones focused on Microsoft software in general, databases, Web browsers and instant message applications. The typical bounty has always been $10,000.&lt;br /&gt;&lt;br /&gt;A few companies offer monetary rewards for pinpointing software vulnerabilities. These are mostly security companies that pay for flaws found in other companies&#39; software products. The payouts are used to gain a competitive edge over rivals by having their security products recognize more vulnerabilities. The security companies typically report the issues to the applicable vendors so a patch can be produced.&lt;br /&gt;&lt;br /&gt;Flaw finders could also sell vulnerability information to cybercrooks on underground online markets.&lt;br /&gt;&lt;br /&gt;Microsoft doesn&#39;t agree with paying for vulnerability details, the company has said. Instead, the company works with security research and security software companies.&lt;br /&gt;&lt;br /&gt;Posted by &lt;a href=&quot;mailto:joris.evers@cnet.com&quot;&gt;Joris Evers&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/116932929932882419'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/116932929932882419'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2007/01/12000-for-serious-vista-or-ie-7-bug.html' title='$12,000 for a serious Vista or IE 7 bug'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-116766568697719227</id><published>2007-01-01T07:33:00.000-08:00</published><updated>2007-01-01T07:46:50.050-08:00</updated><title type='text'>Criminals Loved Password Stealers In 2006</title><content type='html'>&lt;b&gt;A lot of the spam that crawled into inboxes all over the world arrived with one mission - trick the person into dropping a password stealing program onto the system.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; width=&quot;350&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td align=&quot;center&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://photos1.blogger.com/x/blogger/2186/1828/1600/767785/122706criminals.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer;&quot; src=&quot;http://photos1.blogger.com/x/blogger/2186/1828/320/284017/122706criminals.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;caption&quot; style=&quot;padding-bottom: 10px; padding-left: 45px; padding-right: 45px;&quot; align=&quot;right&quot;&gt;Criminals Loved Password Stealers In 2006&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;Once in place, the majority of those password stealers looked for a specific category of logins. Bank and financial institution passwords offered the criminal spammers the greatest potential for a payoff, so the programs they created looked for those.&lt;br /&gt;&lt;br /&gt;Password stealers became much more numerous in 2006. Researcher Francois Paget at McAfee &lt;a href=&quot;http://www.avertlabs.com/research/blog/?p=157&quot;&gt;blogged&lt;/a&gt; how such programs increased by 240 percent for 2006.&lt;br /&gt;&lt;br /&gt;The majority of those password stealers, about 62 percent of the group, sought out financial information. Gamers should be wary of them as well, as Paget noted 18 percent of these programs targeted logins for MMORPGs like World of Warcraft.&lt;br /&gt;&lt;br /&gt;A smaller number, 10 percent, sought out social networking and instant messaging login information. That could indicate a belief that many people tend to use the same login information to access other, more lucrative sites, making a theft of such details key to accessing other websites.&lt;br /&gt;&lt;br /&gt;Spam has been the vector for criminal activities like these, but as new technologies gain mainstream usage, the attacks shift as well. One password stealer dubbed &lt;a href=&quot;http://us.mcafee.com/virusInfo/default.asp?id=description&amp;virus_k=141164&amp;amp;affid=108&quot;&gt;PWS-JO&lt;/a&gt; was discovered recently traveling across &lt;a href=&quot;http://www.skype.com/&quot;&gt;Skype&#39;s&lt;/a&gt; VoIP network.&lt;br /&gt;&lt;br /&gt;That password stealer also had the capability to connect to a remote site and bring in additional components. However, McAfee said in its description of the program that the particular site no longer appears to be accessible.&lt;br /&gt;&lt;br /&gt;During 2006, McAfee observed the number of password stealers jump from 5,000 to 12,000. That can only increase over time.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/116766568697719227'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/116766568697719227'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2007/01/criminals-loved-password-stealers-in.html' title='Criminals Loved Password Stealers In 2006'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-116766556010711505</id><published>2007-01-01T07:31:00.000-08:00</published><updated>2007-01-01T07:33:12.136-08:00</updated><title type='text'>PHP security under scrutiny</title><content type='html'>&lt;h3 class=&quot;Standfirst&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;PHP = pretty hard to protect?&lt;/span&gt;&lt;/h3&gt;&lt;div id=&quot;Body&quot;&gt;&lt;p&gt;A week after a prominent bug finder and developer left the PHP Group, data from the National Vulnerability Database has underscored the need for better security in PHP-based web applications.&lt;/p&gt;  &lt;p&gt;A search of the database, maintained by the National Institute of Standards and Technology (NIST), found that web applications written in PHP likely account for 43 per cent of the security issues found so far in 2006, up from 29 per cent in 2005. While flaws in the language itself account for a very small percentage the total, the problems with PHP underscore the difficulty that developers - many of them amateurs - have in locking down applications written in the language, said Peter Mell, senior computer scientist for the NIST and the program manager for the National Vulnerability Database.&lt;/p&gt;     &lt;p&gt;&quot;In the dynamic programming language (and) scripting realm, we certainly have a problem,&quot; Mell said. &quot;Any time a third or more of the vulnerabilities in a given year are attributed to a single language, you know you have a problem.&quot;&lt;/p&gt;  &lt;p&gt;The concerns come as attackers and security researchers have &lt;a href=&quot;http://www.securityfocus.com/brief/57&quot; target=&quot;_blank&quot;&gt;increasingly focused on finding flaws in web applications&lt;/a&gt;. Earlier this year, one researcher highlighted the upward trend in web flaws in general, and PHP in particular, when data for the first nine months of 2006 showed that vulnerabilities in web applications had &lt;a href=&quot;http://www.securityfocus.com/news/11413&quot; target=&quot;_blank&quot;&gt;taken the top three spots&lt;/a&gt; in a list of most common flaws. The researcher, Steven Christey, found that about 45 per cent of the vulnerabilities found as of September were either cross-site scripting flaws, database injection bugs, or PHP file inclusion vulnerabilities.&lt;/p&gt;  &lt;p&gt;At the heart of the debate is the popular language, PHP - an acronym that originally stood for Personal Home Page tools when it was a small project created by Rasmus Lerdorf in 1994. Two Israeli developers, Zeev Suraski and Andi Gutmans, &lt;a href=&quot;http://en.wikipedia.org/wiki/PHP&quot; target=&quot;_blank&quot;&gt;rewrote the language parser&lt;/a&gt; in 1997 and changed the name to PHP: Hypertext Preprocessor, adopting the recursive naming convention historically used by some Unix programs. The language is now used by websites hosted on nearly 20 million domains and 1.3 million IP addresses, according to data collected by Internet monitoring service Netcraft for its &lt;a href=&quot;http://www.php.net/usage.php&quot; target=&quot;_blank&quot;&gt;October 2006 survey&lt;/a&gt;.&lt;/p&gt;  &lt;p&gt;The popular dynamic web programming language came under scrutiny last week after a longtime developer, Stefan Esser, left the PHP Group&#39;s internal security team, criticising its members for not responding quickly to security issues. Members of the &lt;a href=&quot;http://www.php.net/&quot; target=&quot;_blank&quot;&gt;PHP Group&lt;/a&gt; fired back at Esser, stating his reasons for leaving were less about security and more about not working together with the team.&lt;/p&gt;  &lt;p&gt;Esser quit the PHP security team on 9 December, after a rocky relationship with the group, but claimed that security issues constituted his main reason for leaving.&lt;/p&gt;  &lt;p&gt;&quot;The reasons for this are many, but the most important one is that I have realised that any attempt to improve the security of PHP from the inside is futile,&quot; Esser &lt;a href=&quot;http://blog.php-security.org/archives/61-Retired-from-securityphp.net.html&quot; target=&quot;_blank&quot;&gt;wrote in his blog&lt;/a&gt;. &quot;The PHP Group will jump into your boat as soon you try to blame PHP&#39;s security problems on the user, but the moment you criticise the security of PHP itself you become persona non grata.&quot;&lt;/p&gt;  &lt;p&gt;Esser promised to publicly &lt;a href=&quot;http://www.securityfocus.com/brief/30&quot; target=&quot;_blank&quot;&gt;release more advisories&lt;/a&gt; on the security holes he finds in PHP and will not hold back, even if there is not a patch available for the problem, he said. Esser did not respond to requests for comment from SecurityFocus.&lt;/p&gt;  &lt;p&gt;The PHP Group and &lt;a href=&quot;http://www.zend.com/&quot; target=&quot;_blank&quot;&gt;Zend&lt;/a&gt;, the company founded by the two original Israeli developers that rewrote PHP in the mid-1990s, have disputed Esser&#39;s version of events.&lt;/p&gt;  &lt;p&gt;&quot;I do not believe the main reason for his disengagement has to do with the way we deal with security issues, but the way he interacted with other people on the team,&quot; said &lt;a href=&quot;http://suraski.net/blog/index.php?/archives/17-PHP-Security.html&quot; target=&quot;_blank&quot;&gt;Zeev Suraski&lt;/a&gt;, co-chief technology officer for Zend. Suraski also stressed that the PHP Group has looked for ways of making web applications written in the language more secure, in spite of less security-savvy developers. The move away from making a set of global variables accessible by PHP scripts, for example, attempted to make the language more foolproof, he said. It also took more effort to develop than to create version 5.0 of the language, Suraski said.&lt;/p&gt;  &lt;p&gt;&quot;We have shown in the past that we are willing to change defaults and sometimes to remove features, just to make it more difficult for developers to make security mistakes,&quot; Suraski said.&lt;/p&gt; &lt;hr class=&quot;pagebreak&quot;&gt;  &lt;p&gt;Yet, mistakes are still being made and in record numbers.&lt;/p&gt;  &lt;p&gt;A search of the National Vulnerability Database revealed that, as of 15 December, out of the 6,198 vulnerabilities recorded in 2006, as many as 2,690 - or 43 per cent - had the word &quot;PHP&quot; in the description. A random sampling of the flagged flaws showed that the search appeared to only reveal issues in PHP applications. A search of the database using &quot;PHP&quot; as a vendor flagged some 84 vulnerabilities for 2006 (including in optional components of the language, such as PEAR), while a search using &quot;PHP&quot; as the product returned 33 bug, ostensibly in the core functions.&lt;/p&gt;  &lt;p&gt;The vast numbers of bugs attributed to PHP applications is not surprising given that many amateur developers create their websites using the language, said NIST&#39;s Mell.&lt;/p&gt;  &lt;p&gt;&quot;I think it is tough for the general public to write secure dynamic web applications,&quot; he said. &quot;As much as possible scripting languages for Web sites should be dummy proof. In many incidences, I, a security professional, wondered how to code some bit securely. I wanted to, but how to do it was not immediately obvious.&quot;&lt;/p&gt;  &lt;p&gt;Flaws in PHP applications have caused headaches for many webmasters. A year ago, the Lupper worm &lt;a href=&quot;http://www.securityfocus.com/brief/38&quot; target=&quot;_blank&quot;&gt;spread among vulnerable applications&lt;/a&gt; that used the PHP extensions for extensible markup language (XML), or RPC-XML. Other worms have utilised flaws in popular PHP bulletin board programs as well.&lt;/p&gt;  &lt;p&gt;Continuing to educate PHP developers on the latest techniques to secure their applications is extremely important, said Chris Shiflett, a manager in the web application security practice at &lt;a href=&quot;http://omniti.com/&quot; target=&quot;_blank&quot;&gt;OmniTI&lt;/a&gt; and author of O&#39;Reilly&#39;s &lt;a href=&quot;http://phpsecurity.org/&quot; target=&quot;_blank&quot;&gt;Essential PHP Security&lt;/a&gt;.&lt;/p&gt;  &lt;p&gt;&quot;To say PHP has a security problem suggests that it&#39;s impossible to develop a secure PHP application, but to say PHP doesn&#39;t have a security problem suggests that everything is perfect - neither is true,&quot; Shiflett said. &quot;Web application security is a rapidly evolving discipline, and it&#39;s difficult for the average developer to keep up with the pace.&quot;&lt;/p&gt;  &lt;p&gt;Developers need to start thinking about security as soon as start designing their applications, he said. Moreover, the focus on securing code needs to continue throughout the life of the website, he added.&lt;/p&gt;  &lt;p&gt;&quot;Over time, web application security should start to mature just as other security disciplines have, but that only means the pace of evolution will slow down, not stop,&quot; Shiflett said. This article originally appeared in &lt;a href=&quot;http://www.securityfocus.com/news/11430?ref=rss&quot; target=&quot;_blank&quot;&gt;Security Focus&lt;/a&gt;.&lt;/p&gt;  &lt;p&gt;Copyright © 2006, &lt;a href=&quot;http://www.securityfocus.com/&quot; target=&quot;_blank&quot;&gt;SecurityFocus&lt;/a&gt;&lt;/p&gt; &lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/116766556010711505'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/116766556010711505'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2007/01/php-security-under-scrutiny.html' title='PHP security under scrutiny'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-116766546396002268</id><published>2007-01-01T07:27:00.000-08:00</published><updated>2007-01-01T07:31:04.873-08:00</updated><title type='text'>Bots, breaches and bugs plague 2006</title><content type='html'>Online fraudsters, big-time spammers and computer intruders had little problem finding security holes to exploit in 2006.&lt;br /&gt;&lt;div class=&quot;quoteauthor&quot;&gt;&lt;blockquote&gt; “ Cybercrime and the criminals behind malware are getting more and more organized. They can afford to hire professionals, and it is becoming a business for many people. ”&lt;br /&gt;Karel Obluk, chief technology officer, Grisoft&lt;/blockquote&gt;&lt;span class=&quot;body&quot;&gt;&lt;p&gt; Whether the openings came from user ignorance or poor judgment, a software maker&#39;s error or misconfiguration, the profiteers of the Internet had a banner year turning the security mistakes of others into money.&lt;/p&gt; &lt;p&gt; Signs of the trend are obvious. The number of phishing sites used by online fraudsters jumped more than eight-fold year over year, according to the Antiphishing Working Group. The number of denial-of-service attacks doubled between January and June, according to Symantec, the owner of SecurityFocus. And, mail service provider MessageLabs intercepted, on average, one targeted Trojan horse attack every day in 2006, up from one a week in 2005.&lt;/p&gt; &lt;p&gt; If there is a lesson in 2006, it&#39;s that cybercrime is a booming business.&lt;/p&gt; &lt;p&gt; &quot;Cybercrime and the criminals behind malware are getting more and more organized,&quot; Karel Obluk, chief technology officer for antivirus firm &lt;a href=&quot;http://www.grisoft.com/&quot;&gt;Grisoft&lt;/a&gt;, told SecurityFocus. &quot;They can afford to hire professionals, and it is becoming a business for many people.&quot;&lt;/p&gt; &lt;p&gt; The trend is quickly making the defacto term for such code--malicious software or malware--a misnomer. The virus writers and spyware coders are not creating the code for malicious reasons but to make money illegally, making the term coined by antivirus firms--crimeware--more appropriate.&lt;/p&gt; &lt;p&gt; For example, spammers are using bot nets--large numbers of compromised computers controlled by a single person--to help them send a greater volume of messages. The development has increased the global volume of spam by at least a third in the last six months, according to Symantec, though other firms put the increase as high as 450 percent.&lt;/p&gt; &lt;p&gt; When one firm, Blue Security, claimed to have impacted the operations of major spammers, one bulk e-mailer decided to take on the Israeli company. A sustained denial-of-service attack took down the company&#39;s Web site, domain registrar and blog site. The company eventually capitulated and closed its doors.&lt;/p&gt; &lt;p&gt; &quot;This is their primary form of employment now--it&#39;s a 9-to-5 job,&quot; Oliver Friedrichs, senior director for Symantec Security Response, said in a recent interview. &quot;They are not doing it on weekends, and they are not doing it during the summer months.&quot;&lt;/p&gt; &lt;p&gt; Other cybercriminals are taking a more personal approach: Hijacking people&#39;s stock accounts and using the access to drive up the price of certain thinly-traded penny stocks has also become popular. Details of one scheme appeared in the court papers filed by the U.S. Securities and Exchange Commission (SEC) in support of a civil action against one apparent stock scammers. A Russian national allegedly used a company registered in Belize and based in Estonia to execute trades in stock whose prices had been manipulated by compromised accounts.&lt;/p&gt; &lt;p&gt; Such attacks are not isolated incidents. Account intrusion has resulted in $22 million in losses in the third quarter alone for two U.S. financial firms. TD Ameritrade posted $4 million in losses in their third quarter to account for replacing the funds customers lost due to account hijacking. E*Trade Financial reported that online identity theft by hackers cost them $18 million in the same period.&lt;/p&gt; &lt;p&gt; Identity theft, of course, continued to be a major worry in 2006. Because of data breach disclosure laws that have passed in the majority of states, companies, government agencies and schools regularly released details of significant data leaks.&lt;/p&gt; &lt;p&gt; In May, the Department of Veterans Affairs revealed that the names, social security numbers and birth dates of nearly 26.5 million veterans had been stored on a laptop and external hard drive that were stolen from an employee&#39;s home. The laptop and hard drive were later recovered, but the incident resulted in the federal government tightening data handling and laptop security rules.&lt;/p&gt; &lt;p&gt; Both the University of California, Los Angeles and the University of Texas at Austin reported major breaches this year affecting hundreds of thousands of students.&lt;/p&gt; &lt;p&gt; In total, more than 48 million personal records were exposed in 2006, according to the &lt;a href=&quot;http://attrition.org/dataloss/&quot;&gt;Data Loss Archive and Database&lt;/a&gt; maintained by Attrition.org&lt;/p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/116766546396002268'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/116766546396002268'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2007/01/bots-breaches-and-bugs-plague-2006.html' title='Bots, breaches and bugs plague 2006'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-116766522074975394</id><published>2007-01-01T07:26:00.000-08:00</published><updated>2007-01-01T07:27:00.836-08:00</updated><title type='text'>Firefox update guards against critical flaws</title><content type='html'>&lt;div id=&quot;Body&quot;&gt;&lt;h3 class=&quot;Standfirst&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Patch issued, calamity averted&lt;/span&gt;&lt;/h3&gt;By &lt;a href=&quot;http://forms.theregister.co.uk/mail_author/?story_url=/2006/12/21/firefox_upgrade/&quot; title=&quot;Send email to the author&quot;&gt;John Leyden&lt;/a&gt;&lt;p&gt;Firefox users need to upgrade their browsers following the discovery of multiple security vulnerabilities.&lt;/p&gt;  &lt;p&gt;The flaws affect both Firefox 1.x and the latest Firefox 2.0.x releases. Surfers need to upgrade to version 1.5.0.9 or 2.0.0.1 of the browser, respectively. Users also need to upgrade to a new version of the Mozilla email client, Thunderbird 1.5.0.9, for similar reasons.&lt;/p&gt;The nine security bugs (reported by various security researchers) create a means for hackers to swipe sensitive information, run cross-site scripting attacks, or gain control of vulnerable systems, security notification firm Secunia reports.  &lt;p&gt;The bugs involve flaws in Firefox&#39;s JavaScript engine, the feed preview feature of Firefox 2.0, Scalable Vector Graphics (SVG) processing code, and various buffer overflow flaws in other components of the browser software, as explained in greater detail &lt;a href=&quot;http://secunia.com/advisories/23282&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;. ®&lt;/p&gt; &lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/116766522074975394'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/116766522074975394'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2007/01/firefox-update-guards-against-critical.html' title='Firefox update guards against critical flaws'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-116766482996740630</id><published>2007-01-01T07:19:00.000-08:00</published><updated>2007-01-01T07:20:30.030-08:00</updated><title type='text'>Locking Down Ubuntu - Firewalls</title><content type='html'>&lt;p&gt;The best way to protect yourself from attackers on the Internet is to disconnect yourself from the Internet. The next best way is to install a firewall, which is like a lock on a door to a room inside of a building. It allows only authorized programs and protocols to open the door between your computer and the Internet. It also locks the door from the outside, keeping people and programs from opening the &quot;door&quot;, walking in, and harming your computer. A firewall uses filters that either allow or prevent programs from sending or receiving data. If there is protocol with a security hole in your computer, you can configure the firewall to block all incoming connections to that protocol until the hole is fixed.&lt;/p&gt;&lt;p&gt;Although both Ubuntu and Kubuntu are fairly secure--they do not leave any ports open by default--it is always a good idea to install a firewall. Since firewalls are important to making a computer more secure, two firewalls are evaluated in this article: Firestarter and Guarddog. Each has strengths and weaknesses, both in the GUIs(Graphical User Interface) and the way they run, so it is a matter of personal preference. Both of them work on any official Ubuntu distribution or other popular Linux distributions (such as SUSE or Fedora Core). The following instructions will show you how to set up Firestarter for Ubuntu and Guard dog for Kubuntu, but they work just fine vice versa. Even though the firewalls are different, there are some firewall security principles that apply to any firewall and operating system. All firewalls either white-list or blacklist IP addresses (Internet Protocol address) and protocols. A white-list isan explicit list of protocols and IP addresses that the firewall lets pass through. A blacklist is the exact opposite of a white-list: it is an explicit list of protocols and IP addresses that the firewall will block.&lt;/p&gt;&lt;p&gt;There are some common protocols that you will either want to white-list not want to blacklist. They are:&lt;/p&gt;&lt;p&gt;&lt;b&gt;Http/Https(Common web site protocol)&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Ftp, (A file transfer protocol. Many web sites use this to upload and download files)&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Smpt(An email sending protocol)&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Pop3(An email receiving protocol)&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;(A list of more ports can be found at:http://www.chebucto.ns.ca/~rakerman/port-table.html)&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Allow the firewall to permit only the few protocols and/or IP addresses that you will be using. If you don&#39;t recognize a protocol, block it. You can unblock any protocol later when you have a need for it.&lt;/p&gt;&lt;br /&gt;&lt;p&gt;&lt;b&gt;Firestarter(For Ubuntu)&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Firestarter(based on the GTK GUI toolkit) focuses on simplicity. Firestarter allows the white-listing of good connections; it blocks all connections from the start, both incoming and outgoing. After you have installed Firestarter, go to &lt;b&gt;Applications -- System Tools-- Firestarter&lt;/b&gt; to start it. You should see a blue icon appearing your system tray. The first time you run Firestarter, a wizard is automatically launched. If you need to return to the wizard later,you can access it from the Firewall menu. All of the choices that you make in the wizard can be changed by going to &lt;b&gt;Edit --Preferences&lt;/b&gt;.&lt;/p&gt;&lt;p&gt;Click on the &lt;b&gt;Policy&lt;/b&gt; tab to get started. You will see a drop down menu next to the word &lt;b&gt;Editing&lt;/b&gt;. Click on it and select the &lt;b&gt;Outbound traffic policy&lt;/b&gt;. Now make sure the radio button that says&lt;b&gt;Restrictive by default&lt;/b&gt;, causing the firewall to block all traffic that is not white-listed. This will make your computer very secure by only allowing a few programs to open the &quot;door&quot;.&lt;/p&gt;&lt;p&gt;The next step is to tell Firestarter what protocols you don&#39;t want to lock down. Right click on the &lt;b&gt;Allow Service Port&lt;/b&gt;and&lt;b&gt; For&lt;/b&gt; tables. Click on &lt;b&gt;Add Rule&lt;/b&gt;, select a name from the drop down menu, or enter your own protocol name and port. You have the option to allow any computer on the Internet or network, the firewall host (your computer), or IP address (a specific computer Internet Protocol address on the Internet or your network).Select the appropriate source and click &lt;b&gt;Add&lt;/b&gt;. Do this for any protocol you want to use (such as email, web, etc). You can use this same process to allow incoming connections (click on &lt;b&gt;Incoming traffic policy&lt;/b&gt; next to the word &lt;b&gt;Editing&lt;/b&gt; instead of&lt;b&gt;Outgoing traffic policy&lt;/b&gt;).&lt;/p&gt;&lt;p&gt;(Insert firestarter.jpg here)&lt;/p&gt;&lt;p&gt;When Firestarter blocks a connection, the icon in the system tray turns red. If you are having trouble with either connecting to another computer or browsing the web, click on the red icon and then click onthe &lt;b&gt;Events&lt;/b&gt; tab. This will show you what protocol(s)Firestarter has blocked and you can now white-list the protocol if you need to use it.&lt;/p&gt;&lt;p&gt;If you notice that Firestarter blocks a particular computer&#39;s IP and you recognize it (as it may be a family member or colleague&#39;s computer),add the IP to the &lt;b&gt;Allow connections from host&lt;/b&gt; table under the appropriate outgoing or incoming policies.&lt;/p&gt;&lt;br /&gt;&lt;p&gt;&lt;b&gt;Guarddog(For Kubuntu)&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Guarddog(which uses Qt for it GUI toolkit) differs from Firestarter because it lets you configure a firewall for numerous networks such as the Internet, your local computer, and your Local Area Network. The advantage of using Guarddog is that you can configure a firewall for as many different networks as you want. To configure Guarddog, go to &lt;b&gt;Kmenu -- System -- Guarddog&lt;/b&gt;.Enter your password to continue. After you enter your password, click on the &lt;b&gt;Protocol &lt;/b&gt;tab and select on the the &quot;zone&quot;(what Guarddog calls the configurations for different networks) that you would like to configure. On the right you will notice the &lt;b&gt;Zone Properties&lt;/b&gt; tree. Click on the tree category that you would like to configure (such as &lt;b&gt;Chat&lt;/b&gt;)and it will expand, revealing several common protocols. Guarddog automatically blocks every protocol by default so you will have to white-list the protocols you&#39;d like the firewall to accept, and blacklist the protocols you&#39;d like the firewall to outright reject.You should click on the &lt;b&gt;Network&lt;/b&gt; tree and enable &lt;b&gt;DNS&lt;/b&gt; and&lt;b&gt;ICMP Redirect&lt;/b&gt; if you can not browse the web.&lt;/p&gt;&lt;p&gt;To to add a protocol that is not in any of the trees, click on the &lt;b&gt;Advanced&lt;/b&gt;tab and add a new protocol under &lt;b&gt;User Defined Protocols&lt;/b&gt; to be able to enable or disable it in the &lt;b&gt;Protocol&lt;/b&gt; tab. To block a certain IP address or domain, create a new zone and leave all the check boxes blank (to block all protocols).&lt;/p&gt;&lt;p&gt;If you use a router to connect to the Internet and/or are behind a NAT you should create a new zone for the &lt;b&gt;Local Area Network&lt;/b&gt; that you belong to. You should d enable the &lt;b&gt;Internet&lt;/b&gt; and &lt;b&gt;Local&lt;/b&gt;zones so that you will be able to connect to the Internet and the Local zones. Now click on the &lt;b&gt;Protocol&lt;/b&gt; tab and check to see if the new zone you have created is selected under &lt;b&gt;Protocols Served from Zone&lt;/b&gt;. Configure the firewall to allow the protocols you need to pass through it for the &lt;b&gt;Local and Internet &lt;/b&gt;column. By selecting the check boxes in both columns you allow your computer to use the checked protocols on your local area network (which goes to your router which is connected to the Internet).&lt;/p&gt;&lt;p&gt;Now move over to the &lt;b&gt;Protocol&lt;/b&gt; tab and make sure that &lt;b&gt;Protocols Served from Zone&lt;/b&gt; is set to your newly created zone. Check the protocols you need to enable. By turning these on for the &lt;b&gt;Local&lt;/b&gt;or&lt;b&gt;Internet&lt;/b&gt;zones, you allow your computer to use the checked protocols in the new zone you created.&lt;/p&gt;&lt;p&gt;(Insert guarddog.png here)&lt;/p&gt;&lt;p&gt;When you are finished with configuring your changes, click &lt;b&gt;Apply&lt;/b&gt; to change the settings. If your firewall keeps you from browsing theweb, or starting certain system services you can temporarily disable it until you find out what it&#39;s blocking; click on the &lt;b&gt;Advanced&lt;/b&gt;tab, check &lt;b&gt;Disable Firewall&lt;/b&gt; and click &lt;b&gt;Apply&lt;/b&gt;.&lt;/p&gt;&lt;br /&gt;&lt;b&gt;Testing your firewall&lt;/b&gt;&lt;p&gt;To see if your firewall is doing what you want it to do you can test it at&lt;b&gt;http://www.grc.com&lt;/b&gt; at the Gibson Research Center. Go to&lt;b&gt;Shields Up&lt;/b&gt; or &lt;b&gt;Leak Test&lt;/b&gt; to try out your firewall.&lt;/p&gt;&lt;br /&gt;&lt;h2&gt;Summing it up&lt;/h2&gt;&lt;p&gt;You now have a fairly secure system. It will be hard for a cracker to break into your computer, or for some other user on your computer to read sensitive data (you may want to encrypt that data to be even safer).Always remember that your computer will remain secure if you are careful and do not accidentally enable a protocol that you don&#39;t use,or copy sensitive data to a folder that anyone can read.&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/116766482996740630'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/116766482996740630'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2007/01/locking-down-ubuntu-firewalls.html' title='Locking Down Ubuntu - Firewalls'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-116766472132572580</id><published>2007-01-01T07:16:00.000-08:00</published><updated>2007-01-01T07:19:07.176-08:00</updated><title type='text'>Locking Down Ubuntu - Getting ready</title><content type='html'>Security is an important issue in computing. Unfortunately, many computers allow a cracker to gain access to them and retrieve sensitive information, or just make life hard. This article will review the basics in general security and explain how to apply it to two Linux distributions--Ubuntu and Kubuntu.&lt;br /&gt;&lt;h2&gt;Preliminaries&lt;/h2&gt;&lt;p&gt;This article assumes that you know how to install programs on either Ubuntu or Kubuntu. It also assumes that you have some knowledge of basic computer networking principles. If you do not know how to install programs on Ubuntu, go to &lt;a href=&quot;https://help.ubuntu.com/community/InstallingSoftware&quot;&gt;https://help.ubuntu.com/community/InstallingSoftware&lt;/a&gt;. If you do not know much about networking,  go to &lt;a href=&quot;http://www.faqs.org/docs/linux_network/x-087-2-intro.html&quot;&gt;http://www.faqs.org/docs/linux_network/x-087-2-intro.html&lt;/a&gt;. This article also assumes that you are using Ubuntu or Kubuntu 6.06(Dapper Drake), but the Firewall section can be adapted for any recent Linux distribution.&lt;/p&gt;&lt;h2&gt;Downloading Security Updates&lt;/h2&gt;&lt;p&gt;A program is only secure if it has no vulnerabilities. Even the most popular software can have a hidden one. When someone fixes the vulnerability,a new version of the program is usually released. Both Ubuntu and Kubuntu have software repositories dedicated to security updates.When a vulnerability is fixed, a package of the program is released so that you can download it. Ubuntu and Kubuntu usually enable some of their security update repositories by default, but it is always a good idea to check to see if all of them are enabled. You may also want to specify how often you want your computer to look for security updates--and even install them--while you&#39;re at it (for Ubuntu 6.06only).&lt;/p&gt;&lt;p&gt;If you are using Ubuntu, click on &lt;b&gt;System -- Administration --Software Properties&lt;/b&gt; and click on the &lt;b&gt;Installation Media&lt;/b&gt;tab. Now scroll down until you see a repository with the word&lt;b&gt;Security&lt;/b&gt; in it. Make sure that it is checked. If it is not,click on the check box to enable it.&lt;/p&gt;&lt;p&gt;On Kubuntu, click on &lt;b&gt;Kmenu -- System -- Adept (PackageManager)&lt;/b&gt;. Enter your password and then click on &lt;b&gt;Adept&lt;/b&gt; and then on &lt;b&gt;Manage Repositories&lt;/b&gt;. Find a line that  contains the words &lt;b&gt;deb http://security.ubuntu.com/ubuntu&lt;/b&gt;. Those are security repositories. If it is grayed out, right click on the entry,select &lt;b&gt;Enable&lt;/b&gt;, and click &lt;b&gt;Apply&lt;/b&gt;. It is important to enable every grayed-out security repository that you can find.&lt;/p&gt;&lt;p&gt;Now you can configure how often you want your computer to check for new updates. With Ubuntu, click on &lt;b&gt;System -- Administration --Software Properties&lt;/b&gt; and click on the &lt;b&gt;Internet Updates&lt;/b&gt; tab.Check the box that is marked &lt;b&gt;Check for updates automatically&lt;/b&gt;and from the drop down menu select how often you want your computer to look for updates. You can even configure Ubuntu to automatically download updates and install security updates. When there are new updates available, Ubuntu will alert you by starting &lt;b&gt;Update-Manager&lt;/b&gt;.The &lt;b&gt;Update-Manager&lt;/b&gt;&#39;s notification icon will appear in the system tray. Click on it to install new updates.&lt;/p&gt;&lt;p&gt;Kubuntu uses a program called &lt;b&gt;adept_updater&lt;/b&gt; which appears in your system tray when new updates are available. You can click on the iconto install new updates. As of this writing, you can not configure&lt;b&gt;adept_updater&lt;/b&gt; to install security updates automatically.&lt;/p&gt;&lt;h2&gt;Securing the /home directories&lt;/h2&gt;&lt;p&gt;There may be times when you want to protect your data from malicious users, but you don&#39;t want the hassle of encrypting that data. As long as no one else on your computer can log in as root, (the super administrator account) your data will be hidden from other users&#39; eyes. To make your data safer, go to &lt;b&gt;Applications -- Accessories --Terminal&lt;/b&gt; (on Ubuntu) or &lt;b&gt;Kmenu -- System -- Konsole &lt;/b&gt;(onKubuntu) and type: &lt;b&gt;chmod 0700 /home/your-user-name&lt;/b&gt; (where your-user-name is the name you use to login to your computer). You can also use this command for individual files and folders if you want to keep other users fromviewing any of your files. (For more information on securing your home directory, go to &lt;b&gt;https://wiki.ubuntu.com/SecureHome&lt;/b&gt;).&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/116766472132572580'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/116766472132572580'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2007/01/locking-down-ubuntu-getting-ready.html' title='Locking Down Ubuntu - Getting ready'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-116766374802265619</id><published>2007-01-01T06:58:00.000-08:00</published><updated>2007-01-01T07:02:28.386-08:00</updated><title type='text'>Microsoft promises Vista security</title><content type='html'>&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;div&gt;     &lt;img alt=&quot;Windows Vista Screen&quot; src=&quot;http://newsimg.bbc.co.uk/media/images/42182000/jpg/_42182055_41938622_vista203b.jpg&quot; align=&quot;right&quot; border=&quot;0&quot; height=&quot;152&quot; hspace=&quot;0&quot; vspace=&quot;0&quot; width=&quot;203&quot; /&gt;     &lt;div style=&quot;font-weight: bold;&quot; class=&quot;cap&quot;&gt;Microsoft says Vista will contain a raft of new security features&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;    &lt;/div&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;A senior Microsoft executive has promised that its new operating system will be more secure than ever.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Jean-Philippe Courtois, president of Microsoft International, said that beefing-up security was one reason behind delays to Windows Vista.&lt;br /&gt;&lt;br /&gt;Microsoft has been criticised for flaws in previous systems that left users vulnerable to attacks by hackers.&lt;br /&gt;&lt;br /&gt;Mr Courtois said Microsoft had done &quot;tons of work to make Vista a fantastic experience when it comes to security&quot;.&lt;br /&gt;&lt;br /&gt;The firm had originally aimed to launch Vista - the first major update since Windows XP was introduced five years ago - in the second half of 2006.&lt;br /&gt;&lt;br /&gt;The new operating system will now be released to business customers &quot;within the next few weeks&quot; and to consumers early next year, he said.&lt;br /&gt;&lt;br /&gt;Secure steps&lt;br /&gt;&lt;br /&gt;Speaking in Barcelona at the European Technology Round Table Mr Courtois, the most senior Microsoft executive outside of the US, said that Windows Vista was the continuation of an ongoing effort by Microsoft to improve security across its software line-up.&lt;br /&gt;&lt;br /&gt;&quot;In the last 18 months, the number of vulnerabilities [in Windows&#39; software] has been much lower,&quot; he said.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;The launch of Windows Vista is certainly one of the defining moments of the company&lt;br /&gt;Jean-Philippe Courtois&lt;br /&gt;Microsoft&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&quot;Microsoft has raised its game in a big way on security and Windows Vista is the next big step. The company has learnt to design software which is secure by default.&quot;&lt;br /&gt;&lt;br /&gt;Mr Courtois outlined features of Windows Vista that are designed to make it easier for users to protect themselves.&lt;br /&gt;&lt;br /&gt;At the heart of the system will be the new Windows Security Centre which will show consumers any holes in their defences.&lt;br /&gt;&lt;br /&gt;Vista will also feature new encryption technology designed to protect the data on a computer.&lt;br /&gt;&lt;br /&gt;&quot;Even if your laptop is stolen, nobody will be able to use it because it will be fully encrypted,&quot; he said.&lt;br /&gt;&lt;br /&gt;But Jean-Philippe Courtois said users had to play their part in making computers more secure.&lt;br /&gt;&lt;br /&gt;&quot;You&#39;ve got to make sure that your firewall is on, that you&#39;ve got anti-virus protection on your PC, you&#39;ve got to understand what not to do on the internet,&quot; he said. &quot;It&#39;s just like protecting your own home.&quot;&lt;br /&gt;&lt;br /&gt;This week the BBC set up a so-called &quot;honeypot&quot; computer running Windows XP without protection. The PC came under attack every 15 minutes.&lt;br /&gt;&lt;br /&gt;But not everybody in the security software world is happy about Microsoft&#39;s plans for Vista.&lt;br /&gt;&lt;br /&gt;Symantec, which makes Norton anti-virus software, is among many security firms warning that Vista appears designed to shut out security products made by outside firms.&lt;br /&gt;&lt;br /&gt;However, what is clear is that the long-awaited arrival of the new operating system will be a crucial weapon in Microsoft&#39;s battle to retain its dominant position at a time when firms like Google are mounting a serious challenge.&lt;br /&gt;&lt;br /&gt;&quot;The launch of Windows Vista is certainly one of the defining moments of the company,&quot; admitted Jean-Philippe Courtois.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/116766374802265619'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/116766374802265619'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2007/01/microsoft-promises-vista-security.html' title='Microsoft promises Vista security'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-114880151846643210</id><published>2006-05-28T00:30:00.001-07:00</published><updated>2006-05-28T00:31:58.540-07:00</updated><title type='text'>Google and child porn?</title><content type='html'>&lt;p&gt;&lt;img id=&quot;image182&quot; src=&quot;http://geeksbay.monzilla.info/wp-content/uploads/2006/05/google8gk2.PNG&quot; alt=&quot;Google Porn&quot; align=&quot;left&quot; height=&quot;97&quot; width=&quot;207&quot; /&gt;&lt;br /&gt;Now heres a person seeking instant fame by sueing Google for distributing Child Porn . He claims that Google has profited many million dollars from child pornography. Jeffrey Toback, a member of the Nassau County Legislature said that Google had put up many paid links on its search result pages which linked to sites which distributed pornography including of minors. He also said that Google has the technology to filter out porn results from search results as it was demonstrated in China (Good point, he has).&lt;/p&gt; &lt;p&gt;A Google spokesman denied the allegations and said the Mountain View, Calif.-based company takes numerous steps to prevent access to child pornography.&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt; “When we find or are made aware of any child pornography, we remove it from our products, including our search engine,” spokesman Steve Langdon said in an e-mail statement to The Associated Press. “We also report it to the appropriate law enforcement officials and fully cooperate with the law enforcement community to combat child pornography.”&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;Somebody please mention to Mr. Toback that if he wants he can filter out those ‘nasty’ results from the settings in Google. And I don’t get it why its just Google. What about Yahoo, MSN and millions of other search engines.&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.technewsworld.com/story/50366.html&quot; target=&quot;blank&quot;&gt;Read more&lt;/a&gt; &lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114880151846643210'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114880151846643210'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2006/05/google-and-child-porn.html' title='Google and child porn?'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-114880144186509118</id><published>2006-05-28T00:30:00.000-07:00</published><updated>2006-05-28T00:30:41.923-07:00</updated><title type='text'>A worm that gives you headache!</title><content type='html'>&lt;p&gt;&lt;img id=&quot;image188&quot; src=&quot;http://geeksbay.monzilla.info/wp-content/uploads/2006/05/virus.jpg&quot; alt=&quot;Virus&quot; align=&quot;right&quot; height=&quot;76&quot; width=&quot;102&quot; /&gt;&lt;br /&gt;A new kind of worm has been creating a hell in the cyber world recently. Named as Yhoo32.explr, it transmits itself through Yahoo Instant Messenger (Yikes must be careful). After successfully installing itself it downloads its own browser without users permission. The new downloaded browser is a IE look alike. They say there is no difference except a start-up tune. To make things worse it takes users to weird sites and cannot be uninstalled the ‘normal’ way.&lt;/p&gt; &lt;p&gt;Thats all? Not at all. You have not seen the last of this worm. According to &lt;a href=&quot;http://www.informationweek.com/security/showArticle.jhtml?articleID=188101147&amp;amp;subSection=Viruses+and+Patches&quot; target=&quot;blank&quot;&gt;Information Week&lt;/a&gt;, it blares out some kind of guitar music played by some idiot who has never seen a guitar in his life. Information Week says that &lt;strong&gt;the music has chances to create headaches!&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;What a time. First Computer viruses just used to infect out computer. Now it directly affects us!. Heavens there is no difference between computer virus and real virus now. I am sure this is the first kind of worm that gives humans headache.&lt;/p&gt; &lt;p&gt;What do you think fellas? Comment you thoughts about this nuisance.. &lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114880144186509118'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114880144186509118'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2006/05/worm-that-gives-you-headache.html' title='A worm that gives you headache!'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-114879971675619227</id><published>2006-05-28T00:01:00.000-07:00</published><updated>2006-05-28T00:29:44.506-07:00</updated><title type='text'>Protect the protector</title><content type='html'>&lt;p&gt;&lt;img alt=&quot;The image “http://www.symantec.com/img/util/logo_nav.jpg” cannot be displayed, because it contains errors.&quot; src=&quot;http://www.symantec.com/img/util/logo_nav.jpg&quot; align=&quot;right&quot; /&gt;How could they do this to us?! Symantec’s Norton Antivirus may betray us all soon. A gigantic security hole has been found in it. Using this ‘hole’, a hacker can take control of our PC and access all the sensitive datas (if there are any in first place).&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;Researchers from eEye Digital Security of Aliso Viejo, Calif., discovered the vulnerability and provided evidence to Symantec engineers this week, said eEye’s chief hacking officer, Marc Maiffret. He demonstrated the attack for The Associated Press.&lt;/p&gt; &lt;p&gt;Maiffret’s company — which has discovered hundreds of similar flaws in other software products — also produces intrusion-protection software, called “Blink,” that he said already blocks such attacks and can operate alongside Symantec’s anti-virus products.&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;To those who use Norton Antivirus: Just hope that Norton release a patch to cover things up.&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114879971675619227'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114879971675619227'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2006/05/protect-protector.html' title='Protect the protector'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-114819752581401791</id><published>2006-05-21T00:34:00.000-07:00</published><updated>2006-05-21T00:45:25.896-07:00</updated><title type='text'>Linux Security Quick Reference Guide</title><content type='html'>This Quick Reference Guide is intended to provide a starting point for improving the security of your system. Contained within include references to security resources around the net, tips on securing your Linux box, and general security information :-)&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://www.linuxsecurity.com/docs/QuickRefCard.pdf&quot;&gt;Download&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114819752581401791'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114819752581401791'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2006/05/linux-security-quick-reference-guide.html' title='Linux Security Quick Reference Guide'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-114819682671168577</id><published>2006-05-21T00:31:00.000-07:00</published><updated>2006-05-21T00:33:47.073-07:00</updated><title type='text'>Ten tips for managing passwords</title><content type='html'>&lt;img align=&quot;right&quot;  alt=&quot;http://www.password-service.com/images/lock-bottom.gif&quot; src=&quot;http://www.password-service.com/images/lock-bottom.gif&quot; /&gt;&lt;span class=&quot;smdeck&quot;&gt;Passwords are fatally flawed, it&#39;s true, but for now they are the best option for many companies. But almost everybody could be managing them more effectively.&lt;/span&gt;  &lt;p&gt;In all likelihood passwords will remain a problem until the very day they are replaced by technologies such as biometrics, which is the direction the industry appears to be heading. However, until that day comes, below are some tips for fostering a culture of secure and more effective password management.&lt;/p&gt;      &lt;p&gt;&lt;strong&gt;1. Passwords must not be written down&lt;/strong&gt;&lt;br /&gt;If it seems incredible that we are still talking about password management at all, then it is unimaginable that we have to make this first point.&lt;/p&gt;   &lt;p&gt;If staff are writing down their passwords, having been told why they must not do so, then the system is too complex and too much is being asked of them. Companies must strike a balance between security and usability because a failure to understand the latter can easily undermine the former.&lt;/p&gt;   &lt;p&gt;So consider whether employees have been properly educated about the need to keep passwords secure and then consult the measures below if you need to update your password policy.&lt;/p&gt;   &lt;p&gt;&lt;strong&gt;2. Passwords must be set&lt;/strong&gt;&lt;br /&gt;And you thought the first tip seemed obvious? It&#39;s staggering to hear instances where systems have been compromised because the password was still set as a default &#39;password&#39; or &#39;changeme&#39; or similar.&lt;/p&gt;   &lt;p&gt;&lt;strong&gt;3. Require as few passwords as possible&lt;/strong&gt;&lt;br /&gt;Balance how much password protection you need with how many passwords can reasonably be managed. Identify which networks, systems and applications have the highest priority. If staff have to remember 10 passwords -- from ones guarding highly sensitive data to ones that really serve little or no purpose - they may be unable to manage all of them.&lt;/p&gt;   &lt;p&gt;What&#39;s to say the one they write down and lose isn&#39;t the most sensitive?&lt;/p&gt;   &lt;p&gt;&lt;strong&gt;4. Staff must change their passwords regularly&lt;/strong&gt;&lt;br /&gt;This limits the likelihood of old passwords, shared between colleagues in less-secure times, coming back to haunt you. It also limits the window of opportunity if passwords subsequently fall into the wrong hands.&lt;/p&gt;   &lt;p&gt;How often they are changed must again be a balance between security and usability. If staff are required to come up with a new password every week, they will likely become confused and start writing them down. In fact longer periods between changes -- 90 days rather than 30 days for example -- can actually prove beneficial as knowing a password will have a longer lifespan makes a more complex password far more manageable and may encourage staff to give it more careful consideration.&lt;/p&gt;   &lt;p&gt;&lt;strong&gt;5. Make new passwords &lt;em&gt;new&lt;/em&gt; &lt;/strong&gt;&lt;br /&gt;When passwords are changed users must not distinguish them from a previous password by just one character. RandomW0RD1, RandomW0RD2, RandomW0RD3 becomes a pattern that is pretty easy to figure out.&lt;/p&gt;   &lt;p&gt;&lt;strong&gt;6. Avoid obvious words&lt;/strong&gt;&lt;br /&gt;Passwords must be more complex than a single word which can be hacked with a dictionary attack (using software to automatically enter all the words in the dictionary as well as proper nouns). Names, addresses and other words which are easily linked back to the individual should also be blocked from use. It&#39;s alarming how many instances there are of staff using their name, their partner&#39;s name or their pet&#39;s name.&lt;/p&gt;   &lt;p&gt;&lt;strong&gt;7. Think long -- but not too long&lt;/strong&gt;&lt;br /&gt;A password which consists of at least eight characters with a mix of upper case, lower case and numbers is a good start. If the minimum requirement is too long staff may be encouraged to be lazy and use repeat characters or obvious strings: ABCDEFG123456789.&lt;/p&gt;   &lt;p&gt;However, a minimum with a reasonably high upper limit would allow staff to be creative. One suggestion is to use phrases rather than words. Certainly &#39;mYd0g1sCALLEDf1d0&#39; is less likely to be guessed that &#39;Fido&#39;. Again, it&#39;s a step in the right direction towards creating more secure passwords.&lt;/p&gt;   &lt;p&gt;&lt;strong&gt;8. Automate password changes&lt;/strong&gt;&lt;br /&gt;The process of making staff reset and choose secure passwords must also be automated. Do not rely on staff to remember how long it has been since they last reset it, what passwords they have used in the past year or what types of words are off-policy. It&#39;s not a question of trust. It&#39;s a question of history showing us that policies are never adhered to by choice.&lt;/p&gt;   &lt;p&gt;&lt;strong&gt;9. Educate staff&lt;/strong&gt;&lt;br /&gt;Ensure password policy is written into employment contracts and that all staff understand why and what that entails. Hopefully, if all other measures work, the most serious human piece of the jigsaw will be the requirement for staff not to share their password and not to write it down. Such wording should also prohibit repetition of passwords between services -- particularly between those outside and inside the enterprise. A corporate login is likely to be more sensitive than a newspaper subscription login which may be shared with friends and family.&lt;/p&gt;   &lt;p&gt;&lt;strong&gt;10. Look to the future&lt;/strong&gt;&lt;br /&gt;Finally, look at long-term solutions which will eventually replace passwords -- such as biometrics and two-factor authentication. Passwords are flawed and the above tips are recommendations for how they can be more secure -- for now.&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114819682671168577'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114819682671168577'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2006/05/ten-tips-for-managing-passwords.html' title='Ten tips for managing passwords'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-114776402196738552</id><published>2006-05-16T00:08:00.000-07:00</published><updated>2006-05-16T00:20:22.160-07:00</updated><title type='text'>&#39;Useful Firefox Security Extensions&#39; by CERIAS</title><content type='html'>&lt;p&gt;&lt;img alt=&quot;http://www.visiomode.com/pics/firefox.png&quot; src=&quot;http://www.visiomode.com/pics/firefox.png&quot; align=&quot;right&quot; /&gt;Mozilla’s Firefox browser claims to provide a safer browsing experience out of the box, but some of the best security features of Firefox are only available as &lt;a href=&quot;https://addons.mozilla.org/extensions/?application=firefox&quot;&gt;extensions&lt;/a&gt;.  Here’s a roundup of some of the more useful ones I’ve found.&lt;/p&gt; &lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://addons.mozilla.org/extensions/moreinfo.php?application=firefox&amp;category=Privacy%20and%20Security&amp;amp;numpg=10&amp;id=573&quot;&gt;&lt;strong&gt;Add n’ Edit Cookies&lt;/strong&gt;&lt;br /&gt;&lt;/a&gt;This might be more of a web developer tool, but being able to view in detail the cookies that various sites set on your visits can be an eye-opening experience. This extension not only shows you all the details, but lets you modify them too. You’ll be surprised at how many web apps do foolish things like saving your password in the cookie.&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://addons.mozilla.org/extensions/moreinfo.php?application=firefox&amp;amp;category=Privacy%20and%20Security&amp;numpg=10&amp;amp;id=938&quot;&gt;&lt;strong&gt;Dr. Web Anti-Virus Link Checker&lt;/strong&gt;&lt;br /&gt;&lt;/a&gt;This is an interesting idea — scanning files for viruses &lt;em&gt;before&lt;/em&gt; you download them. Basically, this extension adds an option to the link context menu that allows you to pass the link to the Dr. Web AV service. I haven’t rigorously tested this or anything, but it’s an interesting concept that could be part of an effective multilayer personal security model.&lt;a href=&quot;https://addons.mozilla.org/extensions/moreinfo.php?application=firefox&amp;category=Privacy%20and%20Security&amp;amp;numpg=10&amp;id=938&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://addons.mozilla.org/extensions/moreinfo.php?application=firefox&amp;amp;category=Privacy%20and%20Security&amp;numpg=10&amp;amp;id=1579&quot;&gt;&lt;strong&gt;FormFox&lt;/strong&gt;&lt;br /&gt;&lt;/a&gt;This extension doesn’t do a whole lot, but what it does is important — showing a tooltip when you roll over a form submission button of the form action URL. Extending this further to visually differentiate submission buttons that submit to SSL URLs would be really nice (as suggested by &lt;a title=&quot;Secure Logins&quot; href=&quot;http://shiflett.org/archive/186&quot;&gt;Chris Shiflett&lt;/a&gt;).&lt;a href=&quot;https://addons.mozilla.org/extensions/moreinfo.php?application=firefox&amp;category=Privacy%20and%20Security&amp;amp;numpg=10&amp;id=1579&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://addons.mozilla.org/extensions/moreinfo.php?application=firefox&amp;amp;category=Privacy%20and%20Security&amp;numpg=10&amp;amp;id=433&quot;&gt;&lt;strong&gt;FlashBlock&lt;/strong&gt;&lt;br /&gt;&lt;/a&gt;Flash hasn’t been quite as popular an attack vector as Javascript, but it still potentially could be a threat, and it’s often an annoyance. This extension disables all embedded Flash elements by default (score one for securing things &lt;em&gt;by default&lt;/em&gt;), allowing you to click to activate a particular one if you like. It lacks the flexibility I’d like (things like whitelists would be very handy), and doesn’t give you much (any?) info about the Flash element before you run it, but it’s still a handy tool.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;&lt;a href=&quot;http://livehttpheaders.mozdev.org/&quot;&gt;LiveHTTPHeaders&lt;/a&gt; &amp; &lt;/strong&gt;&lt;a href=&quot;https://addons.mozilla.org/extensions/moreinfo.php?application=firefox&amp;amp;category=Privacy%20and%20Security&amp;numpg=10&amp;amp;id=575&quot;&gt;&lt;strong&gt;Header Monitor&lt;/strong&gt;&lt;br /&gt;&lt;/a&gt;LiveHTTPHeaders is an incredibly useful too for web developers, displaying all of the header traffic between the client and server. Header Monitor is basically an add-on for LiveHTTPHeaders that displays a chosen header in Firefox’s status bar. They’re not really specifically security tools, but they do offer a lot of info on what’s really going on when you’re browsing, and an educated user is a safer user.&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://users.blueprintit.co.uk/%7Edave/web/firefox/jsoptions/index.html&quot;&gt;&lt;strong&gt;JavaScript Option&lt;br /&gt;&lt;/strong&gt;&lt;/a&gt;This restores some of the granularity Firefox users used to have over what Javascript can and cannot do. I’d like to see this idea taken farther (see below), but it’s handy regardless.&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.noscript.net/&quot;&gt;&lt;strong&gt;NoScript&lt;/strong&gt;&lt;br /&gt;&lt;/a&gt;This extension is pretty smooth.  Of all the addons for Firefox covered here, this is &lt;em&gt;the&lt;/em&gt; one to get. NoScript is a powerful javascript execution whitelisting tool, allowing full user control over what domains allow scripts to run. Notifications of blocked execution and the allowed domain interface are nearly identical to the built-in Firefox popup blocker, so users should find it comfortable to work with. NoScript can also block Flash, Java, and “other plugins;” forbid &lt;a href=&quot;http://www.squarefree.com/bookmarklets/&quot;&gt;bookmarklets&lt;/a&gt;; block or allow &lt;a href=&quot;http://weblogs.mozillazine.org/darin/archives/009594.html&quot;&gt;the “ping” attribute&lt;/a&gt; of the tag; and attempt to rewrite links that execute javascript to go to their intended donation without triggering the script code. &lt;p&gt;The one thing I’d really like to see from this extension would be more ganularity over what the Javascript engine can access. Now it’s only “on” or “off,” but being able to disable things like cookie access would eliminate a lot of potential security issues while still letting JS power rich web app interfaces. Also read &lt;a href=&quot;http://www.cerias.purdue.edu/weblogs/pmeunier/secure-it-practices/post-8/&quot;&gt;Pascal Meunier’s take on NoScript&lt;/a&gt;. &lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://addons.mozilla.org/extensions/moreinfo.php?application=firefox&amp;category=Privacy%20and%20Security&amp;amp;numpg=10&amp;id=1237&quot;&gt;&lt;strong&gt;QuickJava&lt;/strong&gt;&lt;br /&gt;&lt;/a&gt;Places handy little buttons in the status bar that let you quickly enable or disable Java or Javascript support. Note that this will &lt;em&gt;not&lt;/em&gt; work with the latest stable Firefox (1.5.0.1).  Hopefully a new version will be available soon.&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://addons.mozilla.org/extensions/moreinfo.php?application=firefox&amp;amp;category=Privacy%20and%20Security&amp;numpg=10&amp;amp;id=590&quot;&gt;&lt;strong&gt;ShowIP&lt;br /&gt;&lt;/strong&gt;&lt;/a&gt;This is another tool that isn’t aimed at security per se, but offers a lot of useful information. ShowIP drops the IP address of the current site in your status bar. Clicking on it brings up a menu of lookup options for the IP, like whois and DNS info. You can add additional web lookups if you like, as well as passing the IP to a local program. Handy stuff.&lt;a href=&quot;https://addons.mozilla.org/extensions/moreinfo.php?application=firefox&amp;category=Privacy%20and%20Security&amp;amp;numpg=10&amp;id=590&quot;&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.spoofstick.com/&quot;&gt;&lt;strong&gt;SpoofStick&lt;br /&gt;&lt;/strong&gt;&lt;/a&gt;The idea with this extension is to make it easier to catch spoofing attempts by displaying a very large, brightly colored “You’re on ” in the toolbar. For folks who know what they’re doing this isn’t wildly useful, but it could be just the ticket for less savvy users. It requires a bit too much setup for them, though, and in the end I think this is something the browser itself should be handling.&lt;a href=&quot;http://www.spoofstick.com/&quot;&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt; &lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://addons.mozilla.org/extensions/moreinfo.php?application=firefox&amp;amp;category=Privacy%20and%20Security&amp;numpg=10&amp;amp;id=966&quot;&gt;&lt;strong&gt;Tamper Data&lt;br /&gt;&lt;/strong&gt;&lt;/a&gt;Much like LiveHTTPHeaders, Tamper Data is a very useful extension for web devs that lets the user view HTTP headers and POST data passed between the client and server. In addition, Tamper Data makes it easy for the user to alter the data being sent to the server, which is enormously useful for doing security testing against web apps. I also like how the data is presented in TD a bit better than LiveHTTPHeaders: it’s easier to see at a glance all of the traffic and get an overall feel of what’s going on, but you can still drill down and get as much detail as you like.&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;Got more Firefox security extensions?  Leave a comment and I’ll collect them in an upcoming post.&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114776402196738552'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114776402196738552'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2006/05/useful-firefox-security-extensions-by.html' title='&#39;Useful Firefox Security Extensions&#39; by CERIAS'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-114751897954948079</id><published>2006-05-13T03:52:00.000-07:00</published><updated>2006-05-13T04:16:24.530-07:00</updated><title type='text'>Microsoft Windows Defender beta: One easy interface</title><content type='html'>&lt;div class=&quot;Related&quot;&gt;                                                                                                                                                                                                                                           &lt;div class=&quot;RelatedContent&quot;&gt;&lt;img alt=&quot;http://www.moederdegans.be/images/softwareicon.jpg&quot; src=&quot;http://www.moederdegans.be/images/softwareicon.jpg&quot; align=&quot;right&quot; /&gt; Microsoft will soon be putting pressure on anti-spyware vendors to provide better performance and more valuable features. Once Microsoft releases its anti-spyware program for Windows, other vendors will have a harder sell. The software is free to legitimate owners of the Windows operating system.&lt;p&gt; We took a look at the beta version of the program, which is currently called Windows Defender and available for download &lt;a href=&quot;http://www.microsoft.com/athome/security/spyware/software/default.mspx&quot;&gt;here&lt;/a&gt;. And we were generally impressed.&lt;/p&gt;&lt;p&gt; The program’s interface is one of the easiest to use. Automatic scans are simple to configure, and if you have a constant Internet connection, you can also specify that the program check for updates before scanning.&lt;/p&gt;&lt;p&gt;&lt;/p&gt; The program also monitors your wireless network and alerts you if someone else is using it. It tracks and notifies you to changes in many Windows configuration settings, including TCP/IP settings, the Hosts file, Winsock Layered Service Providers and the Messenger service. In addition to scanning for spyware signatures, Windows Defender monitors more than 50 Windows and Web browser components that spyware often targets. The program also gives a detailed profile of all programs and services running on your computer. &lt;p&gt;&lt;img src=&quot;http://images.windowsmarketplace.com/img/edt/home/bg_features.gif&quot; align=&quot;left&quot; /&gt; One major limitation of Windows Defender — at least in this beta version — is that it doesn’t integrate with browsers other than Internet Explorer. If you use a different browser, you’ll still have general protection against spyware, but you won’t have nice features such as monitoring of changes to your browser. Also, note that the program’s protection against malicious ActiveX controls only works through Internet Explorer.&lt;/p&gt;&lt;p&gt; Also, the beta version of the software does not monitor cookies.&lt;/p&gt;&lt;p&gt; Finally, although Windows Defender did a great job of alerting us to suspicious behavior, the beta program failed to catch two of the key loggers we had installed on our test system. Hopefully, Microsoft will fix that weakness before releasing the program to the public. &lt;/p&gt;&lt;/div&gt;                                                                                                                       &lt;div class=&quot;RelatedTitle&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;                                                                 Steps to protect yourself:&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;                                                              &lt;/div&gt;                                                                                                                    &lt;div class=&quot;RelatedContent&quot;&gt; In addition to installing an anti-spyware solution, you should take several steps to protect your computer against spyware. &lt;ul&gt;&lt;li&gt;&lt;b&gt;&lt;i&gt;Be cautious about visiting Web sites and downloading software.&lt;/i&gt;&lt;/b&gt; Most spyware arrives on computers from Web sites that offer downloadable freeware or shareware. Don’t download anything from a site unless you trust it. Close any windows that pop up by using the “X” in the corner of the window instead of clicking on any buttons in the window.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;&lt;b&gt;&lt;i&gt;Use a firewall.&lt;/i&gt;&lt;/b&gt; Firewalls can prevent hackers from directly planting spyware on your computer.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;&lt;b&gt;&lt;i&gt;Check security settings in your Web browser.&lt;/i&gt;&lt;/b&gt; Most Web browsers allow you to prevent scripts and ActiveX applets from downloading. Browsers also let you control whether your computer stores cookies.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;&lt;b&gt;&lt;i&gt;Update your operating system software.&lt;/i&gt;&lt;/b&gt; Spyware often exploits vulnerabilities in your operating system, so keep current with system patches to provide significant protection.&lt;/li&gt;&lt;/ul&gt;                                                                                                                       &lt;/div&gt;                                                                                                                       &lt;div class=&quot;RelatedTitle&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;                                                                 Symptoms of spyware infection:&lt;/span&gt;                                                              &lt;/div&gt;                                                                                                                    &lt;div class=&quot;RelatedContent&quot;&gt;                                                                                                                       &lt;ul&gt;&lt;li&gt;&lt;b&gt;&lt;i&gt;Pop-up advertisements.&lt;/i&gt;&lt;/b&gt; If you have advertisements pop up when your browser is not running, you may have inadvertently installed adware. These pop ups cannot be prevented by pop-up blockers, which only block advertisements triggered by visiting a Web site.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;&lt;b&gt;&lt;i&gt;Configuration changes.&lt;/i&gt;&lt;/b&gt; If your home page has been changed and you can’t change it back, you are probably the victim of a piece of hijacker spyware. Spyware may also change other configuration settings on your computer and may install toolbars to your browser or other applications.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;&lt;b&gt;&lt;i&gt;Sluggish performance or system crashes.&lt;/i&gt;&lt;/b&gt; Spyware designers don’t put much effort into making sure their programs work efficiently. If you notice a sudden drop in performance during routine tasks or an increase in system crashes, you may have recently been infected with spyware.&lt;/li&gt;&lt;/ul&gt;                                                                                                                       &lt;/div&gt;                                              &lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114751897954948079'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114751897954948079'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2006/05/microsoft-windows-defender-beta-one.html' title='Microsoft Windows Defender beta: One easy interface'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-114751751383081862</id><published>2006-05-13T03:43:00.000-07:00</published><updated>2006-05-13T03:51:59.883-07:00</updated><title type='text'>Site of the moment, FirewallGuide.com</title><content type='html'>&lt;p align=&quot;left&quot;&gt;&lt;a href=&quot;http://www.firewallguide.com&quot;&gt;FirewallGuide.com&lt;/a&gt; provides easy access to basic information about, and independent, third-party reviews of Internet security and privacy products for home, telecommuter, and SOHO (small office, home office) end-users. For current  security news, reviews and alerts, see their &lt;b&gt; &lt;a href=&quot;http://www.firewallguide.com/newsletter.htm&quot;&gt;   Internet Security News&lt;/a&gt;&lt;/b&gt; page.&lt;/p&gt;  &lt;p align=&quot;left&quot;&gt;&lt;b&gt;&lt;span style=&quot;color:#0000ff;&quot;&gt;The Wild West?&lt;/span&gt;&lt;/b&gt; A personal  computer connected to the Internet without a firewall can be hijacked in just a  few minutes by automated hacker &#39;&#39;Bots&#39;&#39;. The only way to make your computer  100% secure is to turn it off or disconnect it from the Internet. The real issue  is how to make your computer 99% secure when it is connected. Not having  protection is like leaving your car running with the doors unlocked and the keys  in it which a thief might interpret as &quot;please steal me&quot;. Stated another way,  when was the last time you handed a stranger your wallet and encouraged them to  take your social security card, drivers license, cash and credit cards? Locking  a car, using a &quot;club&quot; or installing a security system makes stealing a car more  difficult. Internet security and privacy products provide adequate protection by  making it difficult for &quot;outlaws&quot; to take control of your computer and  rip you off.&lt;/p&gt;    &lt;p&gt;&lt;span style=&quot;color:#0000ff;&quot;&gt;&lt;b&gt;Bottom Line --&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;color:#ff0000;&quot;&gt;   &lt;/span&gt;&lt;/b&gt;At minimum, any computer connected to the Internet needs to    have all current patches to its operating system and browser installed    as well as personal firewall, antivirus and anti-spyware software. A    more complete solution is taking a layered approach to protect your    security and privacy as follows:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;&lt;span style=&quot;color:#cc0000;&quot;&gt;First line of defense&lt;/span&gt;&lt;/b&gt; -- Choose an     &lt;b&gt;Internet service provider&lt;/b&gt; and/or an    &lt;b&gt;    email service&lt;/b&gt;     that offers online (server side) virus and spam email filters.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;span style=&quot;color:#cc0000;&quot;&gt;Second line of defense&lt;/span&gt;&lt;/b&gt; -- Install a    &lt;b&gt;wired&lt;/b&gt; or &lt;b&gt;    wireless&lt;/b&gt; hardware router  with a built in firewall between your modem and your computer or     network. Also consider using a &lt;b&gt;broadband gateway&lt;/b&gt;     offering a combination of hardware and security software.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;span style=&quot;color:#cc0000;&quot;&gt;Third line of defense&lt;/span&gt;&lt;/b&gt; -- Use    a  &lt;b&gt;security software suite&lt;/b&gt; or a     collection of individual software products including, at a minimum,    &lt;b&gt;personal  firewall&lt;span style=&quot;color:#000080;&quot;&gt;, anti-spyware, &lt;/span&gt;&lt;/b&gt; &lt;span style=&quot;color:#000080;&quot;&gt;   and&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;b&gt;anti-virus&lt;/b&gt;&lt;span style=&quot;color:#000080;&quot;&gt;     products. Also consider using &lt;/span&gt;&lt;b&gt;anti-Trojan&lt;span style=&quot;color:#000080;&quot;&gt;,      &lt;/span&gt;anti-spam&lt;span style=&quot;color:#000080;&quot;&gt;,    &lt;/span&gt;anti-phishing&lt;span style=&quot;color:#000080;&quot;&gt;,     &lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color:#000080;&quot;&gt;and&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;b&gt;privacy&lt;/b&gt; software.     Please note that cost is not an issue since there is good &lt;b&gt;    security freeware&lt;/b&gt; available.&lt;/li&gt;&lt;/ul&gt;&lt;a href=&quot;http://www.firewallguide.com/index.html&quot;&gt;Read More...&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114751751383081862'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114751751383081862'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2006/05/site-of-moment-firewallguidecom.html' title='Site of the moment, FirewallGuide.com'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-114748259496645275</id><published>2006-05-12T17:28:00.000-07:00</published><updated>2006-05-12T19:01:21.053-07:00</updated><title type='text'>Fake MSN Feedback Request emails</title><content type='html'>&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; float: right;&quot; src=&quot;http://www.lostremote.com/images/head_msn.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;b&gt;Shailendra Rai&lt;/b&gt; (v-srai@microsoft.com), more probably a fake name sent out a fake email in masses. Here&#39;s a copy of what I got yesterday:&lt;br /&gt;&lt;div&gt;&lt;div class=&quot;LabelData&quot;&gt;&lt;br /&gt;&lt;div&gt;&lt;div class=&quot;LabelData&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;div  style=&quot;font-family:georgia;&quot;&gt;&lt;div class=&quot;LabelData&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;blockquote&gt;&lt;div  style=&quot;font-family:georgia;&quot;&gt;&lt;div class=&quot;LabelData&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;b&gt;Shailendra Rai&lt;/b&gt; (v-srai@microsoft.com) &lt;/span&gt;&lt;/div&gt;&lt;/div&gt; &lt;div  style=&quot;font-family:georgia;&quot;&gt; &lt;div class=&quot;Label&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;To: &lt;/span&gt;&lt;/div&gt; &lt;div class=&quot;LabelData&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;******@hotmail.com&lt;/span&gt;&lt;/div&gt;&lt;/div&gt; &lt;div&gt; &lt;div class=&quot;Label&quot;  style=&quot;font-family:georgia;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Subject: &lt;/span&gt;&lt;/div&gt; &lt;div class=&quot;LabelData&quot;&gt;&lt;span style=&quot;;font-family:georgia;font-size:85%;&quot;  &gt;Give Feedback about the Windows Live Messenger Beta&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://photos1.blogger.com/blogger/2186/1828/1600/msnfeedbackfakemail.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;http://photos1.blogger.com/blogger/2186/1828/320/msnfeedbackfakemail.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div&gt;&lt;div class=&quot;LabelData&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;    Just give it a try, it&#39;s not getting out any secret information from you but illegally representing themselves from microsoft. Give the try,&lt;/span&gt;&lt;span style=&quot;;font-family:georgia;font-size:100%;&quot;  &gt; &lt;/span&gt;&lt;span style=&quot;color: rgb(45, 64, 119); line-height: 14px;font-family:Tahoma,Verdana,Arial,Helvetica,sans-serif;font-size:100%;&quot;  &gt;&lt;span style=&quot;color: rgb(45, 64, 119); line-height: 14px;font-family:Tahoma,Verdana,Arial,Helvetica,sans-serif;&quot; &gt;&lt;span style=&quot;color: rgb(45, 64, 119); line-height: 14px;font-family:Tahoma,Verdana,Arial,Helvetica,sans-serif;&quot; &gt;&lt;a style=&quot;font-family: georgia;&quot; href=&quot;https://www.msnfeedback.com/perseus/surveys/961278308/542c3b69.htm?id=31840&quot; target=&quot;_blank&quot;&gt;Click here.&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);font-family:georgia;&quot; &gt;For the first question: &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;question-text&quot;  style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;Are you a Microsoft employee?&lt;/b&gt;; Choose: &lt;span style=&quot;font-weight: bold;&quot;&gt;Yes&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://photos1.blogger.com/blogger/2186/1828/1600/msnfeedback1.0.jpg&quot;&gt;&lt;img style=&quot;width: 413px; height: 210px;&quot; src=&quot;http://photos1.blogger.com/blogger/2186/1828/1600/msnfeedback1.0.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;This is what I got:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://photos1.blogger.com/blogger/2186/1828/1600/msnfeedback2.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; cursor: pointer; width: 292px; height: 95px; float: left;&quot; src=&quot;http://photos1.blogger.com/blogger/2186/1828/320/msnfeedback2.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;    If you feel insecure giving out information like what you use as alternative to MSN Live, your observations, suggestions, and other information, please dont follow the survey link. It is rather suggested no one should follow the survey unless being aware of what you are doing. Oh, did I forgot? Forgot what? this -&gt; LOL&lt;br /&gt;&lt;br /&gt;Good Luck!&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(45, 64, 119); line-height: 14px;font-family:Tahoma,Verdana,Arial,Helvetica,sans-serif;font-size:11;&quot;  &gt;&lt;span style=&quot;color: rgb(45, 64, 119); line-height: 14px;font-family:Tahoma,Verdana,Arial,Helvetica,sans-serif;font-size:11;&quot;  &gt;&lt;span style=&quot;color: rgb(45, 64, 119); line-height: 14px;font-family:Tahoma,Verdana,Arial,Helvetica,sans-serif;font-size:11;&quot;  &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114748259496645275'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114748259496645275'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2006/05/fake-msn-feedback-request-emails.html' title='Fake MSN Feedback Request emails'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-114736255836048576</id><published>2006-05-11T08:31:00.000-07:00</published><updated>2006-05-11T08:54:02.463-07:00</updated><title type='text'>Hacker&#39;s Challenge 3 - Review at Amazon</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://photos1.blogger.com/blogger/2186/1828/1600/0072263040.01._SCLZZZZZZZ_V54363080_.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; alig=&quot;left&quot; src=&quot;http://z.about.com/d/netsecurity/1/0/0/3/hc3.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;        &lt;b&gt;Book Description&lt;/b&gt;&lt;br /&gt;&lt;p&gt;&lt;b&gt;The ultimate test of hacking skills for IT security professionals&lt;/b&gt;&lt;/p&gt; &lt;p&gt;This unique volume helps you determine if you have what it takes to keep hackers out of your network. Twenty brand-new, real-life security incidents test computer forensics and response skills--all in an entertaining and informative style. The latest security topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS hacks, wireless hacks,VoIP hacks,Windows, Mac OS X, UNIX/Linux, and much more!&lt;/p&gt; &lt;p&gt;Each challenge unfolds like a chapter from a novel and includes details of the incident—how the break-in was detected, evidence, and background such as log files and network diagrams--and is followed by a series of questions for you to solve. Detailed solutions for all the challenges are included in the second part of the book.&lt;br /&gt;&lt;iframe src=&quot;http://rcm.amazon.com/e/cm?t=webicious-20&amp;o=1&amp;amp;p=8&amp;l=as1&amp;amp;asins=0072263040&amp;fc1=000000&amp;amp;IS2=1&amp;lt1=_blank&amp;amp;amp;amp;amp;amp;amp;lc1=0000ff&amp;bc1=000000&amp;amp;bg1=ffffff&amp;f=ifr&quot; style=&quot;width: 120px; height: 240px;&quot; marginwidth=&quot;0&quot; marginheight=&quot;0&quot; align=&quot;right&quot; frameborder=&quot;0&quot; scrolling=&quot;no&quot;&gt;&lt;/iframe&gt;&lt;/p&gt;&lt;br /&gt;&lt;b&gt;From the Back Cover&lt;/b&gt;&lt;br /&gt;&lt;p&gt;&lt;b&gt;The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in &lt;i&gt;Hacker’s Challenge 3&lt;/i&gt;. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you’ll get a detailed analysis of how the experts solved each incident.&lt;/p&gt;  &lt;p&gt;Exerpt from “Big Bait, Big Phish”: &lt;/p&gt; &lt;p&gt;&lt;b&gt;The Challenge:&lt;/b&gt; “Could you find out what’s going on with the gobi web server? Customer order e-mails aren’t being sent out, and the thing’s chugging under a big load…” Rob e-mailed the development team reminding them not to send marketing e-mails from the gobi web server…. “Customer service is worried about some issue with tons of disputed false orders….” Rob noticed a suspicious pattern with the “false” orders: they were all being delivered to the same P.O. box…He decided to investigate the access logs. An external JavaScript file being referenced seemed especially strange, so he tested to see if he could access it himself…. The attacker was manipulating the link parameter of the login.pl application. Rob needed to see the server side script that generated the login.pl page to determine the purpose….&lt;/p&gt;  &lt;p&gt;&lt;b&gt;The Solution:&lt;/b&gt; After reviewing the log files included in the challenge, propose your assessment: What is the significance of the attacker’s JavaScript file? What was an early clue that Rob missed that might have alerted him to something being amiss? What are some different ways the attacker could have delivered the payload? Who is this attack ultimately targeted against? Then, turn to the experts&#39; answers to find out what really happened.&lt;/p&gt;&lt;br /&gt;&lt;b&gt;About the Author&lt;/b&gt;&lt;br /&gt;&lt;p&gt;&lt;b&gt;David Pollino&lt;/b&gt; leads research focusing on wireless and security technologies.&lt;/p&gt; &lt;p&gt;&lt;b&gt;Mike Schiffman, CISSP&lt;/b&gt;, holds a research role at Cisco Systems, Inc., and serves on the advisory boards of Qualys, IMG Universal,Vigilant, and Sensory Networks.&lt;/p&gt; &lt;p&gt;&lt;b&gt;Bill Pennington&lt;/b&gt;, CISSP, CCNA, manages research and development at WhiteHat Security, Inc.&lt;/p&gt; &lt;p&gt;&lt;b&gt;Tony Bradley, CISSP-ISSAP&lt;/b&gt;, is a Fortune 100 security architect and consultant who has written for several computer security–related magazines and websites.&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114736255836048576'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114736255836048576'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2006/05/hackers-challenge-3-review-at-amazon.html' title='Hacker&#39;s Challenge 3 - Review at Amazon'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-114736114115761853</id><published>2006-05-11T08:18:00.000-07:00</published><updated>2006-05-11T08:25:41.266-07:00</updated><title type='text'>Microsoft Issues Three Security Updates</title><content type='html'>&lt;p&gt;&lt;img align=&quot;right&quot; alt=&quot;The image “http://www.microsoft.com/belux/nl/security/images/WUicon.gif” cannot be displayed, because it contains errors.&quot; src=&quot;http://www.microsoft.com/belux/nl/security/images/WUicon.gif&quot; /&gt;&lt;strong&gt;Microsoft&lt;/strong&gt; today issued three software patches to fix a security flaw in &lt;strong&gt;Windows&lt;/strong&gt;, another in iits&lt;strong&gt; Exchange Server&lt;/strong&gt; e-mail product, and  two &quot;critical&quot; vulnerabilities in older versions of &lt;strong&gt;Adobe&lt;/strong&gt;&#39;s &lt;strong&gt;Macromedia Flash Player&lt;/strong&gt; that comes bundled with Windows. &lt;/p&gt;  &lt;p&gt;The &lt;a href=&quot;http://www.microsoft.com/technet/security/Bulletin/MS06-020.mspx&quot;&gt;Flash patch being distributed by Redmond&lt;/a&gt; fixes two serious vulnerabilities present in &lt;strong&gt;versions 6.0.79&lt;/strong&gt; or earlier installed on either &lt;strong&gt;Windows 98&lt;/strong&gt;, &lt;strong&gt;Windows 98SE&lt;/strong&gt;, &lt;strong&gt;Windows ME&lt;/strong&gt; or &lt;strong&gt;Windows XP&lt;/strong&gt; (Flash is installed by default on all of those). To see what version you have installed, &lt;a href=&quot;http://www.macromedia.com/software/flash/about/&quot;&gt;check out this link&lt;/a&gt;. &lt;/p&gt;  &lt;p&gt;This patch also includes the security fixes for Flash &lt;strong&gt;versions 7.x&lt;/strong&gt; and &lt;strong&gt;8.x&lt;/strong&gt; that Adobe released in March. If you applied those patches, you shouldn&#39;t have to update, but &lt;a href=&quot;http://www.macromedia.com/software/flash/about/&quot;&gt;just check your Flash version&lt;/a&gt; anyway to be sure. The most recent safe version of Flash is &lt;a href=&quot;http://www.adobe.com/shockwave/download/download.cgi?P1_Prod_Version=ShockwaveFlash&quot;&gt;&lt;strong&gt;8.0.24.0&lt;/strong&gt;&lt;/a&gt;. &lt;/p&gt;  &lt;p&gt;The &lt;a href=&quot;http://www.microsoft.com/technet/security/Bulletin/MS06-018.mspx&quot;&gt;second update&lt;/a&gt; fixes a couple of security flaws in Windows that Microsoft said could be used by attackers to cause systems to seize up. This flaw exists in XP, &lt;strong&gt;Windows 2000&lt;/strong&gt;, and &lt;strong&gt;Windows Server 2003&lt;/strong&gt;. If you are using one of these operating systems, visit &lt;a href=&quot;http://update.microsoft.com/&quot;&gt;&lt;strong&gt;Microsoft Update&lt;/strong&gt;&lt;/a&gt; and install this patch.&lt;/p&gt;  &lt;p&gt;The &lt;a href=&quot;http://www.microsoft.com/technet/security/Bulletin/MS06-019.mspx&quot;&gt;final patch&lt;/a&gt; fixes a critical problem in &lt;a href=&quot;http://www.microsoft.com/exchange/default.mspx&quot;&gt;Exchange Server&lt;/a&gt;, which many businesses use to manage their incoming and outgoing e-mail.   &lt;/p&gt;&lt;p&gt;For businesses using Exchange, this is a very important update to install. The problem is, even Microsoft admits it may cause problems for some third-party applications that work hand-in-hand with Exchange. For instance, &lt;strong&gt;&lt;strong&gt;Reseach in Motion&lt;/strong&gt;&lt;/strong&gt;, the company that makes the popular &lt;strong&gt;BlackBerry&lt;/strong&gt; mobile phone/organizer, said applying this patch will break some functionality required by its software. Microsoft has &lt;a href=&quot;http://support.microsoft.com/kb/912918&quot;&gt;published some workarounds&lt;/a&gt; for businesses that have trouble after installing this update.&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114736114115761853'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114736114115761853'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2006/05/microsoft-issues-three-security.html' title='Microsoft Issues Three Security Updates'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-114729463534583175</id><published>2006-05-10T13:54:00.000-07:00</published><updated>2006-05-11T04:40:27.463-07:00</updated><title type='text'>Operating System Sucks-Rules-O-Meter</title><content type='html'>Sucks-Rules-O-Meter? Hah, this time for Operating Systems.&lt;br /&gt;&lt;br /&gt;        Here&#39;s the results. &lt;a href=&quot;http://linux.com&quot;&gt;Linux&lt;/a&gt; rules according to those whoo know what it is. It sucks according to those who can&#39;t install it. Heh!, my point of view. :D &lt;a href=&quot;http://apple.com&quot;&gt;MacOS&lt;/a&gt; is sweet, whoever used has voted rules. MacOS sucks less because of lower approach to everyone. Wishlist, adsense will buy me the &lt;a href=&quot;http://www.apple.com/macbookpro/&quot;&gt;MacBookPro&lt;/a&gt;, fingers crossed. Lastly, &lt;a href=&quot;http://microsoft.com&quot;&gt;Windows&lt;/a&gt;! Sucks!! :D&lt;br /&gt;&lt;br /&gt;        This operating system quality and approval metric is based on a periodic &lt;a href=&quot;http://ragingsearch.altavista.com/&quot;&gt;AltaVista&lt;/a&gt; search for each of several operating systems, directly followed by &quot;sucks&quot;, &quot;rules&quot;, or &quot;rocks&quot;.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://photos1.blogger.com/blogger/4252/2607/1600/144184500_23d0d8eac9_o.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;&quot; src=&quot;http://photos1.blogger.com/blogger/4252/2607/320/144184500_23d0d8eac9_o.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Read more, as said by the original sucks-rules-o-meter site [&lt;a href=&quot;http://srom.zgp.org/&quot;&gt;http://srom.zgp.org&lt;/a&gt;] :&lt;br /&gt;&lt;blockquote style=&quot;font-style: italic;&quot;&gt;We search for all operating system names exactly as shown above, with the exceptions of &lt;p&gt;&lt;nobr&gt;Mac OS&lt;/nobr&gt;, Mac OS X, and VMS.  For &lt;nobr&gt;Mac OS,&lt;/nobr&gt; we add the search results for the incorrect but common spelling &quot;MacOS&quot;.  Because Mac OS X is sometimes abbreviated to simply &quot;OS X&quot;, the Mac OS X search is just for &quot;OS X&quot; -- we have not found other instances of this term on the web, so we can use it without confusion. For VMS, we add the results for &quot;OpenVMS&quot;.  We do not search for any derogatory slang misspellings of any operating system name.&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;/p&gt;Well, right I reached that page from Google too, searching &lt;a href=&quot;http://www.google.com/search?q=linux+rules&quot;&gt;linux rules&lt;/a&gt;. Pretty Techy? :D&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114729463534583175'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114729463534583175'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2006/05/operating-system-sucks-rules-o-meter.html' title='Operating System Sucks-Rules-O-Meter'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-114729254954855937</id><published>2006-05-10T13:22:00.000-07:00</published><updated>2006-05-10T13:23:57.023-07:00</updated><title type='text'>Today&#39;s Website - SecureRoot.com</title><content type='html'>&lt;img src=&quot;http://www.secureroot.com/webmasters/secureroot-ban3.jpg&quot; align=&quot;left&quot; height=&quot;60&quot; width=&quot;300&quot; /&gt;Today I dont have time to write much longer, but here&#39;s a recommendation.&lt;br /&gt;&lt;a href=&quot;http://SecureRoot.com&quot;&gt;SecureRoot&lt;/a&gt; is one of the most popular computer security sites                   on the web. Over thousands of sites listed in the security directory, security news, tools, forums, newsletter, etc.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114729254954855937'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114729254954855937'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2006/05/todays-website-securerootcom.html' title='Today&#39;s Website - SecureRoot.com'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-114726788513125546</id><published>2006-05-10T06:23:00.000-07:00</published><updated>2006-05-10T13:04:06.616-07:00</updated><title type='text'>Hacker Sentenced to Five Years in Jail</title><content type='html'>&lt;img alt=&quot;http://www.libertaddigital.com/fotos/noticias/whacker090206.jpg&quot; src=&quot;http://www.libertaddigital.com/fotos/noticias/whacker090206.jpg&quot; align=&quot;left&quot; /&gt;Jeanson James Ancheta was sentenced to 57 months in federal prison on Monday for creating and spreading viruses from which he earned profits.  Jeanson, a 20-year old Downey, CA, pleaded guilty in January to federal criminal charges.  His sentence is currently the longest prison term handed down for a computer virus related crime.&lt;br /&gt;&lt;br /&gt;After he is released from prison, Jeanson will spend three more years on supervised release, during which time he will have limited access to computers or the Internet.&lt;br /&gt;&lt;br /&gt;Ancheta created and sold botnets to spammers and hackers.  These botnets were capable of taking over thousands of computers and launching Internet-based attacks.&lt;br /&gt;&lt;br /&gt;Although Ancheta avoided a possible sentence of 25 years, $60,000 worth of assests were seized from him.  Additionally, Ancheta will be responsible for repaying $15,000 to the US military for networks he damaged.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114726788513125546'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114726788513125546'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2006/05/hacker-sentenced-to-five-years-in-jail.html' title='Hacker Sentenced to Five Years in Jail'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-26757419.post-114679813775474288</id><published>2006-05-04T20:00:00.000-07:00</published><updated>2006-05-04T20:03:49.386-07:00</updated><title type='text'>LinuxSecurity.com &#39;s Security Dictionary</title><content type='html'>&lt;img src=&quot;http://www.linuxsecurity.com/images/stories/dictionary.gif&quot; align=&quot;right&quot; /&gt;LinuxSecurity.com &#39;s Security Dictionary!!!&lt;br /&gt;&lt;br /&gt;http://www.linuxsecurity.com/content/view/117309/&lt;br /&gt;&lt;table&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td colspan=&quot;3&quot;&gt;&lt;span style=&quot;font-family:Arial,Helvetica;&quot;&gt;&lt;h3&gt;Key&lt;/h3&gt;&lt;/span&gt;    &lt;/td&gt;  &lt;/tr&gt;  &lt;tr&gt;    &lt;td width=&quot;10%&quot;&gt;&lt;br /&gt;&lt;/td&gt;    &lt;td width=&quot;10%&quot;&gt;&lt;span style=&quot;;font-family:Arial,Helvetica;font-size:85%;&quot;  &gt;&lt;b&gt;I&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;    &lt;td align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial,Helvetica;font-size:85%;&quot;  &gt;      Recommended Terms with an Internet Basis    &lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr&gt;    &lt;td width=&quot;10%&quot;&gt;&lt;br /&gt;&lt;/td&gt;    &lt;td width=&quot;10%&quot;&gt;&lt;span style=&quot;;font-family:Arial,Helvetica;font-size:85%;&quot;  &gt;&lt;b&gt;N&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;    &lt;td align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial,Helvetica;font-size:85%;&quot;  &gt;      Recommended Terms with a Non-Internet Basis    &lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr&gt;    &lt;td width=&quot;10%&quot;&gt;&lt;br /&gt;&lt;/td&gt;    &lt;td width=&quot;10%&quot;&gt;&lt;span style=&quot;;font-family:Arial,Helvetica;font-size:85%;&quot;  &gt;&lt;b&gt;D&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;    &lt;td align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial,Helvetica;font-size:85%;&quot;  &gt;      Deprecated Terms, Definitions, and Uses    &lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr&gt;    &lt;td width=&quot;10%&quot;&gt;&lt;br /&gt;&lt;/td&gt;    &lt;td width=&quot;10%&quot;&gt;&lt;span style=&quot;;font-family:Arial,Helvetica;font-size:85%;&quot;  &gt;&lt;b&gt;C&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;    &lt;td align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial,Helvetica;font-size:85%;&quot;  &gt;      Commentary and Additional Guidance    &lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;tr&gt;    &lt;td width=&quot;10%&quot;&gt;&lt;br /&gt;&lt;/td&gt;    &lt;td width=&quot;10%&quot;&gt;&lt;span style=&quot;;font-family:Arial,Helvetica;font-size:85%;&quot;  &gt;&lt;b&gt;O&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;    &lt;td align=&quot;left&quot;&gt;&lt;span style=&quot;;font-family:Arial,Helvetica;font-size:85%;&quot;  &gt;      Other Definitions&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;pub-0090087530041757&quot;;
google_ad_width = 468;
google_ad_height = 60;
google_ad_format = &quot;468x60_as&quot;;
google_ad_type = &quot;text_image&quot;;
google_ad_channel =&quot;&quot;;
google_page_url = document.location;
google_color_border = &quot;DC143C&quot;;
google_color_bg = &quot;FFDEAD&quot;;
google_color_link = &quot;000080&quot;;
google_color_url = &quot;808080&quot;;
google_color_text = &quot;000000&quot;;
//--&gt;&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
  src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114679813775474288'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26757419/posts/default/114679813775474288'/><link rel='alternate' type='text/html' href='http://securetech.blogspot.com/2006/05/linuxsecuritycom-s-security-dictionary.html' title='LinuxSecurity.com &#39;s Security Dictionary'/><author><name>Gurpartap Singh</name><uri>http://www.blogger.com/profile/08841916084149050289</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='http://img138.imageshack.us/img138/8190/freebsdavatar6me.gif'/></author></entry></feed>