Weekend Reading
ISPs turn blind eye to million-machine malware monster
Several weeks ago, security researcher Lawrence Baldwin dispatched an urgent email to abuse handlers at OptimumOnline, the broadband provider owned by Cablevision, warning that one of its customers stood to lose more than $60,000 to cyber crooks.
Read the article HERE.
==================================================================
Why We Haven't Stopped Spam
Several years ago when Bill Gates declared that the spam problem would be solved within two years, he appeared to be thinking of SMTP authentication as the heart of that solution. I wouldn't have said what he said, but I was pretty optimistic too. Not anymore. The overwhelming power of inertia seems too much for any solution to take on. People just won't stand for the inconveniences that fixing spam would bring.
Read the article HERE.
==================================================================
Searching for evil: Recommended video
Professor Ross Anderson gives an excellent video on malware, phishing and spam, called “Searching for Evil”. Highly recommended viewing.
Watch the video HERE.
==================================================================
Seven Wonders of the IT World
The fastest supercomputer. The most intriguing data center. The constantly changing core at the heart of Linux. Take a tour of the most impressive and most unusual marvels of the IT world.
Read the article HERE.
==================================================================
Eudora E-Mail Just Won't Die
Some programs just won't die. Qualcomm's Eudora e-mail is making a comeback as an open- source offering. Eudora 8.0 is a mail and news application from Qualcomm based on the open source Thunderbird client from the Mozilla Foundation. A beta of Eudora 8.0 went live Aug. 31. Users can download it and use it for free, while programmers can view the source code, make changes to it, and share it with others in the community.
Read the article HERE.
==================================================================
Python for system administrators
As a system administrator, you run across numerous challenges and problems. Managing users, disk space, processes, devices, and backups can cause many system administrators to lose their hair, good humor, or sanity. Shell scripts can help, but they often have frustrating limitations. This is where a full-featured scripting language, such as Python, can turn a tedious task into an easy and, dare I say it, fun one.
The examples in this article demonstrate different Python features that you can put to practical use. If you work through them, you'll be well on your way to understanding the power of Python.
Read the article HERE.
==================================================================
How Zombie Computers Work
A zombie computer is very much like the agent in "The Manchurian Candidate." A hacker secretly infiltrates an unsuspecting victim's computer and uses it to conduct illegal activities. The user generally remains unaware that his computer has been taken over -- he can still use it, though it might slow down considerably. As his computer begins to either send out massive amounts of spam or attack Web pages, he becomes the focal point for any investigations involving his computer's suspicious activities.
Read the article HERE.
==================================================================
Welcome to Wireless
Municipal wireless and Wi-Fi implementations are popping up all over, but successes have been few and far between. In some ways, the mind-set around municipal wireless technology is much like that around net neutrality: Most people think it's a good thing, but almost no one can agree on what it actually means. That's not stopping muni wireless from wending its way into cities across the United States, each of which is tweaking the technology to suit the needs of its many constituencies, as well as its budgetary concerns.
Read the article HERE.
Several weeks ago, security researcher Lawrence Baldwin dispatched an urgent email to abuse handlers at OptimumOnline, the broadband provider owned by Cablevision, warning that one of its customers stood to lose more than $60,000 to cyber crooks.
Read the article HERE.
==================================================================
Why We Haven't Stopped Spam
Several years ago when Bill Gates declared that the spam problem would be solved within two years, he appeared to be thinking of SMTP authentication as the heart of that solution. I wouldn't have said what he said, but I was pretty optimistic too. Not anymore. The overwhelming power of inertia seems too much for any solution to take on. People just won't stand for the inconveniences that fixing spam would bring.
Read the article HERE.
==================================================================
Searching for evil: Recommended video
Professor Ross Anderson gives an excellent video on malware, phishing and spam, called “Searching for Evil”. Highly recommended viewing.
Watch the video HERE.
==================================================================
Seven Wonders of the IT World
The fastest supercomputer. The most intriguing data center. The constantly changing core at the heart of Linux. Take a tour of the most impressive and most unusual marvels of the IT world.
Read the article HERE.
==================================================================
Eudora E-Mail Just Won't Die
Some programs just won't die. Qualcomm's Eudora e-mail is making a comeback as an open- source offering. Eudora 8.0 is a mail and news application from Qualcomm based on the open source Thunderbird client from the Mozilla Foundation. A beta of Eudora 8.0 went live Aug. 31. Users can download it and use it for free, while programmers can view the source code, make changes to it, and share it with others in the community.
Read the article HERE.
==================================================================
Python for system administrators
As a system administrator, you run across numerous challenges and problems. Managing users, disk space, processes, devices, and backups can cause many system administrators to lose their hair, good humor, or sanity. Shell scripts can help, but they often have frustrating limitations. This is where a full-featured scripting language, such as Python, can turn a tedious task into an easy and, dare I say it, fun one.
The examples in this article demonstrate different Python features that you can put to practical use. If you work through them, you'll be well on your way to understanding the power of Python.
Read the article HERE.
==================================================================
How Zombie Computers Work
A zombie computer is very much like the agent in "The Manchurian Candidate." A hacker secretly infiltrates an unsuspecting victim's computer and uses it to conduct illegal activities. The user generally remains unaware that his computer has been taken over -- he can still use it, though it might slow down considerably. As his computer begins to either send out massive amounts of spam or attack Web pages, he becomes the focal point for any investigations involving his computer's suspicious activities.
Read the article HERE.
==================================================================
Welcome to Wireless
Municipal wireless and Wi-Fi implementations are popping up all over, but successes have been few and far between. In some ways, the mind-set around municipal wireless technology is much like that around net neutrality: Most people think it's a good thing, but almost no one can agree on what it actually means. That's not stopping muni wireless from wending its way into cities across the United States, each of which is tweaking the technology to suit the needs of its many constituencies, as well as its budgetary concerns.
Read the article HERE.
0 Comments:
Post a Comment
<< Home