Home Blog Page 9285

Intel and BEA Link up on Itanium

Author: JT Smith

ZDNet: “Intel and BEA Systems on Monday are expected to announce an expanded partnership under which the two companies will jointly optimize BEA’s WebLogic application server software for Intel’s new Itanium processor as well as its 32-bit processors.”

Category:

  • Open Source

Unsafe at any Runlevel

Author: JT Smith

Slashdot: “In an effort, much like Ralph Nader’s effort to increase safety standards for the car industry, The Center for Internet Security plans to pressure software vendors into shipping products with the ‘highest security settings available, making them less vulnerable to viruses and hacking …'”

Category:

  • Linux

Chinese Government Further Restricts Internet Cafes

Author: JT Smith

As reported on Slashdot, the Chinese goverment has moved to lessen internet access for its populace.

*Nuke version ID standard proposed by PostNuke.com

Author: JT Smith

Harry Zink writes, Proposed *Nuke Version ID Standard
written 07/22/2001 by Harry Zink (harry at fizbin.com) published under the GNU Free Documentation License

With the varying and different versions of *Nuke derivatives/forks existing, it might be critical for a modules developer make their module aware of differences in the various *Nuke distributions.

In order to facilitate this task, the PostNuke development team has added additional identification variables to PostNuke’s config.php file, namely, in the case of PostNuke 0.6 (mutant):


$Version_Num = “0.6”;
$Version_ID = “PostNuke”;
$Version_Sub = “Mutant”;

Of these three, $Version_Num is a direct take-over from the original PHPNuke variable (which always contained the regular version number), while $Version_ID and $Version_Sub were added. These variables serve to provide additional information ‘slices’ to developers.

While these variables, and this method can be used to recognize version number, ID, and sub-release IDs of PostNuke, we would like to open the use of these variables up to the wider *Nuke community of forks, derivatives, and, of course, the original PHP-Nuke.

We invite all such projects to adopt and integrate this variable and versioning structure, in order to make life easier on those developing add-ons for the ever growing family of *Nuke-based weblogs. Even if you are part of a project that no longer includes a config.php file, create one, containing just those three variables.

Widespread adoption of this will hopefully aid and assist our friends in the burgeoning modules and add-on developer community, as well as help make modules and add-ons available and accessible to the widest range of systems, and their users.

Category:

  • Open Source

IMP 2.2.6 fixes security issues

Author: JT Smith

Posted at LWN.net: “The Horde team announces the availability of IMP 2.2.6, which fixes three
potential security issues. We strongly recommend that all sites running
IMP 2.2.x upgrade to this version.”

Category:

  • Linux

N.Y. rally to free Sklyarov

Author: JT Smith

Noon Monday, 23 July 2001, at 41st Street and Fifth Avenue, before the
New York Public Library, on the Island of Manhattan, there will be a
rally
to free Dmitry Sklyarov.

Note that this is not an LXNY event, but rather a special rally, whose
Lead Organizer is Leonid Gorkin
lgorkin@excite.com or lgorkin1@nyc.rr.com

A press release will be issued shortly.

There will be rallies in about twenty cities. http://www.boycottadobe.com/pages/rallies.html.

To download a flyer in jpg form go to: http://zork.net/~sexpot.

From: Jay Sulzberger
Corresponding Secretary LXNY
LXNY is New York’s Free Computing Organization.
http://www.lxny.org.

Also, check outMr. Bad’s note at http://www.kuro5hin.org/story/2001/7/20/34741/3199.

Subversives ready for budding career as ‘ethical hackers’

Author: JT Smith

smh.com.au:
” It claims to be the “largest underground Internet security gathering on the planet”, but the subversive element at the ninth “Def Con” hacker conference in Las Vegas this week was apparently swamped by the rapidly growing ranks of salaried IT security auditors. They are glamorously referred to as ethical hackers.”

Category:

  • Linux

Remote root exploit in SSH Secure Shell 3.0.0

Author: JT Smith

NetSecurity:
” A potential remote root exploit has been discovered in SSH Secure Shell 3.0.0, for Unix only, concerning accounts with password fields consisting of two or fewer characters. Unauthorized users could potentially log in to these accounts using any password, including an empty password.”

Category:

  • Linux

Slackware Linux 8.0 reviewed

Author: JT Smith

Slackware 8, officially released on the 28th of June, has a few reviews mentioned in a story on Slashdot.

Category:

  • Linux

Computer bug poised to do more damage

Author: JT Smith

The coverage of “Code Red” continues, with this piece by The Dallas Morning News claiming that it came “within minutes of crippling the White House Web site” (despite the IP change which averted any disaster).

Category:

  • Linux