An IT article is publicizing a remote hole in Microsoft Internet Explorer that can be allegedly used to execute arbitrary code. The latest virus definition update for McAfee VirusScan prevents the proof of concept page at computerterrorism.com from executing the payload right after Internet Explorer crashes, but systems without third-party security products may be vulnerable. […]
A recent worm, Lupper, is traversing the Internet and exploiting computers that run the XML-RPC package for PHP. The official XML-RPC for PHP homepage states that the package’s abuse of the PHP eval function created a security hole that allowed remote execution of arbitrary code. This means that any systems that run PHP and a […]
This article is a great mini-howto on getting Xen deployed quickly on Fedora Core 3. Testing changes in server configuration is one useful application of virtual machines like those provided by Xen. Unlike VMWare, the operating systems on the host and guest machines must support or be modified to support the Xen architecture. In other […]
According to this article, a system administrator at PricewaterhouseCoopers adopted OpenBSD to resolve network computing problems. PricewaterhouseCoopers is allegedly a Windows shop, but fulfilling business needs without spending more money forced the system administrator to adopt open source solutions. “My experience is that if something has to be done, just do it – don’t ask! […]
I am simply amazed at the things GNU/Linux can now do, especially with regard to IP networking. I use pf under OpenBSD, a Unix-like operating system that is not Linux, to keep untrusted wireless access traffic from my trusted wired network at home. Lately, I have been working with Linux operating systems in a corporate […]