Home Blog Page 10317

Computer broker jailed for cheating Hewlett-Packard

Author: JT Smith

A computer broker has been sentenced to 11 years in prison for
defrauding computer and printer maker Hewlett-Packard out of
millions of dollars by using pirated software to illegally upgrade
computer servers intended for resale, officials said Friday. From a report at ZDCOUK.

Category:

  • Linux

Fingerprint security gets handier

Author: JT Smith

Wired.com reports: When Qualcomm CEO Irwin Jacobs got his laptop stolen last month at a conference, the technology to
protect his information may already have been at his fingertips.

By using a biometric fingerprint scanner, Jacobs could have added a layer of security to his laptop, which he
said contained proprietary information that was possibly valuable to foreign governments.

Category:

  • Linux

Experts think MS hack was industrial espionage

Author: JT Smith

Security experts think it increasingly likely that the motive behind the
hacker attack on Microsoft was industrial espionage, the Financial
Times said Monday. From ZDCOUK.

Bob Young joins the Tucows board

Author: JT Smith

The National Post reports that Red Hat’s Bob Young has joined the board of directors for Tucows. Bob is also on the board of directors of XDL Capital Corp, a Toronto-based VC firm who are significant investors in Tucows. Gary Lawrence Murphy

Category:

  • Open Source

TrollTech will release Qt/Embedded under the GPL

Author: JT Smith

From AllLinuxDevices.com: Trolltech has decided to release their Qt/Embedded toolkit under the GNU GPL. CEO Haavard Nord said the decision was made after watching how Qt/Unix did under its dual-licensing scheme of two months ago, in which revenues actually improved after GPL’ing their software. Michael Hall

Category:

  • Linux

Time for Microsoft to fix its security problems

Author: JT Smith

By Jack Bryar
NewsForge Columnist

Maybe NOW they’ll get serious about fixing the security in their
software.

This hasn’t been a good couple of days for the executives at
Microsoft. The company fell victim to one of the oldest and dumbest
Web-hacks known. Someone at the company accidentally picked up a copy
of
QAZ Trojan, a virus, not much different from dozens of other Trojan
horse and worm programs, that have messed up Windows-based corporate
networks over the last couple of years courtesy of well-documented
flaws
in Windows, Office and Microsoft Outlook.

QAZ Trojan has been around for a while. It is usually picked up as
an
email attachment, and executes on opening. The user thinks they have
an
attached Windows Notepad message. QAZ executes a backdoor program,
which
effectively provides a third party with remote access to the user’s
system — and all the remote systems it has access to. Presumably this
back door allowed the hacker access to server files. Not long
afterwards, passwords were being sent to an email address in St.
Petersburg, Russia.

Sometime thereafter Microsoft “security” personnel noticed that that
someone or something was touring the network and had stopped to peek at
some source code files — at least that was the official story as of
Friday afternoon. The story kept changing throughout the course of the
day. At one point Microsoft’s whole happy-talk SWAT team had sprung
into
action. Guys like Mark Murray, Rick Miller, John Pinette, and Matt
Pilla
kept issuing ever-narrowing assurances that nothing happened that would
endanger Office or Windows, at least. There was no problem, nothing
had
really happened, nothing was touched (as far as they could tell) and
the
FBI was deeply involved.

Others suggested the problem was a little worse than that. The
Associated Press said that the breach might have begun a good five
weeks
ago, in mid-September. In addition, spokesmen for a security firm,
AXENT
Communications, sent out a press release late Friday that claimed that
Office and
Word source programs were accessed. I spent much of Friday
evening with the company’s press agency and never did discover how they
knew this.

In the meantime, senior Microsoft executives around the world were
being chased down by reporters eager to find out what really happened.
The guy who got Steve Ballmer to admit that hackers had looked at
source
code had to track him down in a Swedish hallway.

Unfortunately, even when reporters managed to corner Microsoft
managers or other “experts” they asked all the wrong questions.

Reporters asked whether the hackers had somehow “compromised” the
company’s software by taking a peek at files of source code. Of
course,
Ballmer and all the others solemnly maintained that nothing had been
compromised. Such a silly question. Source code, particularly beta or
alpha level stuff, is going to be of little use to anyone except
Microsoft, unless the hackers also got most of the accompanying
documentation and related libraries. Such code certainly isn’t going
to
be “held hostage,” as the Wall Street Journal suggested, or be
“auctioned off to criminal elements.”

Another guy, a reporter from the BBC, asked if perhaps some
competitor was trying “to get an edge” on the company — a question
which would presume that Microsoft HAD competition.

In Russia, a very silly person named Denis Zenkin who
works for a “Moscow based anti-virus company” called Kaspersky Labs
told
local reporters that he knew the hackers weren’t Russian despite the
St.
Petersburg email address. How did he know this? He said it was because
the “only known hacker in St. Petersburg quit a few years ago.”

That’s a pretty funny claim. Crackers and phreakers have so
thoroughly compromised segments of Russia’s telecom and data nets that
travelers are frequently warned that even a simple ATM or credit card
transaction can be a risky adventure. According to Alice Lagnado of
the
Times of London, crackers in the area are so organized that they have
their own magazine, which she called Khakers. I don’t know Khakers,
but
I do know Hackers Magazine. Its editor, a fellow by the name of Sergei
Pokrovsky, told the Moscow Times how much admired the Microsoft
crackers,
saying, “I want to meet them… They are real professionals.”

Another nitwit, a self-proclaimed American “security expert,
formerly
from NASA” intoned gravely to a European reporter that this was
evidence
that Microsoft might be letting too many people test their code.
(Supply
your own response here).

But by far the dumbest set of questions I heard anyone ask was
whether, somehow, this crack into a Microsoft code library meant that
Microsoft’s software might now be vulnerable to penetration by
outsiders
.

Excuse me?

Over the last couple of years, pointing out security holes in
Outlook
and Windows has grown into a virtual cottage industry. I get regular
emails from three web-based services that make money advising their
clients about new holes found in Microsoft’s suite of products.
Security
experts from around the globe make a good living by offering training
programs that point out these same security problems. Consulting
companies like Ernst & Young offer regular “Hacking 101” classes
focused largely on Microsoft, and they have three applicants for every
slot they
have available.

And there is a good reason for all this demand. According to the
Computer Security Institute, 273 large companies and government
agencies
reported losses totaling over $266 million last year, largely due to
software security problems.

In the past, concerns about Microsoft’s security flaws have been met
with an avalanche of press releases and cosmetic patches that always
address the immediate problem, but which never addressed the
fundamental
architectural issues that lay at the heart of many of these security
failures. Up to now, Microsoft has suggested that Windows, Outlook and
Office were certainly easier to secure than that Open Source
stuff.
The company implied that the problem was largely the fault
of
users, and that poor administrative or user practices were at fault, or
that people simply didn’t understand the software well enough to use it
properly.

All those things may be partly true. They may even be true at
Microsoft. But perhaps, now that these security problems have affected
the gnomes of Redmond, the company might try a little harder to fix
them. Even if you don’t run a single Microsoft program, I think you’ll
agree — that development would be good for everyone.

NewsForge editors read and respond to comments posted on our

discussion
page
.

Category:

  • Linux

Installing Snort 1.6.3 on SuSE 6.x-7.x

Author: JT Smith

From Linuxnewbie.org: Snort is a lightweight network intrusion detection system, capable of
performing real-time traffic analysis and packet logging on IP networks.
It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more.

Sensei

Category:

  • Linux

Great hacks of our time

Author: JT Smith

The original meaning of the word “hack” was
born at MIT, and originally meant an elegant,
witty or inspired way of doing almost anything. From a BBC report.

Category:

  • Linux

Oracle, trash-talking IBM, disses DB2

Author: JT Smith

An eWEEK columnist reports: “Just a few hours after IBM released its
quarterly financial statement, I got a
call from Oracle’s frenetic PR squad.
They wanted to gloat over IBM’s
financial misses, which they say prove
once and for all that the mammoth is
indeed extinct. This is why I love my job.”

Category:

  • Open Source

Is DSL all that it’s cracked up to be?

Author: JT Smith

“I remember when I found out that DSL was available in my area. I remember getting that connection and sharing
it out to the rest of my home. And there was much rejoicing. Since then, the party has died down somewhat. I’ve
lost connectivity for more than 48 hours at a time. I’ve been unable to download certain types of files. Tech
support representatives have treated me like a complete moron. And then things really got bad.” From 32BitsOnline.com.