Category Archives: IT Administration

Latest IE Security Threat

November 29th, 2005

An IT article is publicizing a remote hole in Microsoft Internet Explorer that can be allegedly used to execute arbitrary code. The latest virus definition update for McAfee VirusScan prevents the proof of concept page at computerterrorism.com from executing the payload right after Internet Explorer crashes, but systems without third-party security products may be vulnerable. […]

Misguided Response on XML-RPC Worm

November 15th, 2005

A recent worm, Lupper, is traversing the Internet and exploiting computers that run the XML-RPC package for PHP. The official XML-RPC for PHP homepage states that the package’s abuse of the PHP eval function created a security hole that allowed remote execution of arbitrary code. This means that any systems that run PHP and a […]

Linux Virtualization with Xen

November 3rd, 2005

This article is a great mini-howto on getting Xen deployed quickly on Fedora Core 3. Testing changes in server configuration is one useful application of virtual machines like those provided by Xen. Unlike VMWare, the operating systems on the host and guest machines must support or be modified to support the Xen architecture. In other […]

PricewaterhouseCoopers migrates to OpenBSD

October 25th, 2005

According to this article, a system administrator at PricewaterhouseCoopers adopted OpenBSD to resolve network computing problems. PricewaterhouseCoopers is allegedly a Windows shop, but fulfilling business needs without spending more money forced the system administrator to adopt open source solutions. “My experience is that if something has to be done, just do it – don’t ask! […]

Ingress Policing with Linux and tc

September 6th, 2005

I am simply amazed at the things GNU/Linux can now do, especially with regard to IP networking. I use pf under OpenBSD, a Unix-like operating system that is not Linux, to keep untrusted wireless access traffic from my trusted wired network at home. Lately, I have been working with Linux operating systems in a corporate […]