-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Linux Contractor Fired for Using Firefox/Linux
,----[ Quote ]
| The irony? The "compentency test" was a
| Security & Privacy test from the four
| letter credit card company that HAD to be
| taken on MS Windows with IE?
|
| I'll let you be the ones to point out the
| obvious...the fact that this large
| computer/server company with three letters
| in their name is reportedly a "friend to
| Linux". I'll let you talk about how a Linux
| Professional who uses Linux as their
| desktop environment was denied access to
| employment. Employment that was based on
| his knowledge of Linux. Yeah, the server
| side...but still...
|
| Now let's brag about how much ground Linux
| has made...
|
| And a Linux Project Manager for said
| company asking the question:
|
| "What's this Foxfire thing?"
`----
http://linuxlock.blogspot.com/2009/11/linux-contractor-fired-for-using.html
Windows zombies run rampant....
Name servers are DDOS targets
,----[ Quote ]
| THE NUMBER OF external name servers that
| allow open access to recursion has rocketed
| over the last few years, increasing the
| risk of distributed denial of service
| attacks, according to network management
| firm Infoblox.
`----
http://www.theinquirer.net/inquirer/news/1562212/name-servers-ddos-targets
Related:
Bots rule in cyberspace
,----[ Quote ]
| USA TODAY REPORTS that on an average day, 40 per cent of the 800 million
| computers connected to the Internet are bots used to send out spam, viruses
| and to mine for sensitive personal data.
`----
http://www.theinquirer.net/gb/inquirer/news/2008/03/17/bots-rule-cyberspace
http://www.usatoday.com/tech/news/computersecurity/2008-03-16-computer-botnets_N.htm
New Zealand teenager convicted over international cyber crime ring
,----[ Quote ]
| Owen Thor Walker, 18, known by his online name "AKILL," was involved in a
| network accused of infiltrating 1.3 million computers and skimming millions
| of dollars from victims' bank accounts.
`----
http://news.smh.com.au/new-zealand-teenager-convicted-over-international-cyber-crime-ring/20080301-1vzs.html
No April Fools'--Storm worm is back
,----[ Quote ]
| The compromised computer will then install the downloaded file as C:
| \WINDOWS\aromis.exe. Nazario reports that the botnet file opens the firewall
| using the netsh firewall set command, makes a lot of outbound connections,
| then listens on a random UDP port.
`----
http://www.news.com/8301-10789_3-9906880-57.html?part=rss&subj=news&tag=2547-1_3-0-20
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAksB81cACgkQU4xAY3RXLo6BIwCgqWVlWUD5G9+iDcP9SHX7f6U/
B58An1oIkpvVoOKOcchrd52P7sUzLna4
=8Vwl
-----END PGP SIGNATURE-----
|
|