Operating Systems

91648658a3e987ddb81913b06dbdc57a

What is an "Undecillion"?

February 03, 2011 Added by:Ron Baklarz

The protocol allows for 340 undecillion addresses, which is 340 trillion groups of one trillion networks each that can handle a trillion devices. If the IPv4 pool of 4.3 billion addresses were the size of a golf ball, the new 340 undecillion IPv6 addresses would be about the size of the sun...

Comments  (2)

959779642e6e758563e80b5d83150a9f

Why Microsoft Shops Have to Worry About Security

January 26, 2011 Added by:Danny Lieberman

If you are a real hacker, look for companies with security administrators who are certified for Microsoft ISA server and you will have nothing to worry about. But if your target security administrators are facile with Wireshark, Ratproxy and Fiddler and Metasploit, then you should be really worried...

Comments  (12)

5c9886924588e138cc18290742c2095e

The Case for an Open Source Physical Security Software

January 18, 2011 Added by:Guy Huntington

The open source formula usually delivers free software with a low yearly license. Use of this software should lower enterprises overall physical security budget over time as opposed to paying proprietary vendors large purchase amounts and annual license fees...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

Tips for Deploying Secure Shell in Linux and UNIX

January 10, 2011 Added by:Jamie Adams

Secure Shell is the best method for remote access due to its flexibility and security. It makes it attractive for system administrators as well as system developers and architects. The ability to easily execute commands on remote systems and retrieve files over “secure” channels is seductive...

Comments  (14)

69dafe8b58066478aea48f3d0f384820

Unpatched Windows Zero-Day Vulnerability Confirmed

January 06, 2011 Added by:Headlines

Windows XP, Vista, Server 2003 and Server 2008 are vulnerable to the exploit, where a malformed thumbnail contained in a document could cause the targeted PC to be infected if the document was opened or even previewed...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hackers Crack the PS3 and Multi-touch iPod Nano

January 03, 2011 Added by:Headlines

The PS3 has been a veritable fortress since it came on the market in 2006, but a team of hackers has found a vulnerability in the unit's software that allows a bypass of the console's operating system...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Is Sandboxing the End-All Solution?

January 01, 2011 Added by:Dan Dieterle

When you have millions of lines of code, like you have in an Operating System, you will have bugs. Hackers can use these coding bugs to create exploits. Microsoft and Adobe products have been a favorite target for hackers. But how do you protect software from hackers when there are unknown bugs?

Comments  (1)

4085079c6fe0be2fd371ddbac0c3e7db

Using Temporary Files in Linux Scripts Securely

December 07, 2010 Added by:Jamie Adams

Some sysadmins who write scripts might store sensitive data in temporary files, don't restrict access to temporary files, and might forget to remove them from the system when they are no longer needed. In many cases, they use them when it isn't even necessary...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

Sandboxing: Understanding System Containment

November 29, 2010 Added by:Jamie Adams

The idea of containment within an operating system is sometimes referred to as sandboxing. Some of the more popular technologies specifically designed to accomplish this come to mind: FreeBSD jails, Solaris Containers (including Solaris Zones), and SUSE Linux's AppArmor...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

Mac Users Get Massive Security Wake Up Call

November 18, 2010 Added by:Headlines

Mac users, who have have long been used to lambasting Windows users over security issues, are getting a big dose of exploit reality this week as Apple releases fixes for 134 vulnerabilities. The record-breaking patch release for Mac OS dwarfs Microsoft's record of 49 patches...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

Which Linux or UNIX Version Am I Running?

November 17, 2010 Added by:Jamie Adams

Linux distributions are built off of standard kernels but are packaged and bundled differently. Some distributions are Debian-based while others might be Red Hat-based. The collection of packages and how the packages were compiled and delivered are what make Linux distributions unique...

Comments  (2)

6648b1abd4a9b964566c3690613f20a6

Mac Users Beware

November 12, 2010 Added by:Mark Baldwin

There is a widespread belief that Mac OS X is inherently more secure than Windows and that by using a Mac, one is protected from all threats. Unfortunately, not only is this not true, it is dangerous, as it leads people to not take appropriate precautions to protect their computers...

Comments  (1)

4085079c6fe0be2fd371ddbac0c3e7db

Dangers of Self-Managed Development Environments

November 03, 2010 Added by:Jamie Adams

I have seen developers relax security controls during unit development only to be bewildered when full integration testing fails. Many database administrators have strict controls which developers must adhere to. Why isn't it the same when it comes to base operating system resources?

Comments  (3)

E973b16363b3de77b360563237df7e32

Attacking an Unpatched Windows 2008 Server

October 28, 2010 Added by:Bozidar Spirovski

We will use a Windows 2008 target for this demonstration because even if it was released in 2008, and we now have the R2 version, a lot of companies are just starting to implement it. The attack is based on two well known vulnerabilities based on SRV2.SYS driver...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Using Windows XP Drop My Rights Utility

October 25, 2010 Added by:Robb Reck

Drop My Rights is a free Windows XP utility offered by Microsoft that allows you to be logged into your computer as an administrator while running high risk programs like Internet Explorer, Firefox and Outlook with reduced privileges...

Comments  (2)

E973b16363b3de77b360563237df7e32

Microsoft Patch Disclosure Summary - October 2010

October 25, 2010 Added by:Bozidar Spirovski

Remote Code Execution vulnerabilities, Elevation of Privilege vulnerabilities, Information Disclosure vulnerability, Denial of Service condition, Information Tampering scenario...

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »