-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Think you've mastered Linux? Prove it, with Suicide Linux
,----[ Quote ]
| Linux gurus who pride themselves on their
| skills with the command line would finally
| have a way to prove it if one guy's wacky idea
| came to fruition. Yes, it's Suicide Linux,
| where any unrecognized command is parsed as
| "rm -rf /" ... that's Linux for "your hard
| drive's content go boom."
`----
http://www.downloadsquad.com/2010/02/19/think-youve-mastered-linux-prove-it-with-suicide-linux/
Related:
Germany seeks malware 'specialists' to bug terrorists
,----[ Quote ]
| The German government has reportedly started hiring coders to develop "white
| hat" malware capable of covertly hacking into terrorists' PCs.
`----
http://www.theregister.co.uk/2007/11/21/germany_vxer_hire_plan/
In zombies we trust
,----[ Quote ]
| A little over a year ago, I wrote an editorial where in back-of-the-envelope
| style (.pdf) I estimated that perhaps 15-30% of all privately owned computers
| were no longer under the sole control of their owner. In the intervening
| months, I received a certain amount of hate mail but in those intervening
| months Vint Cert guessed 20-40%, Microsoft said 2/3rds, and IDC suggested
| 3/4ths. It is thus a conservative risk position to assume that any random
| counterparty stands a fair chance of being already compromised.
`----
http://blogs.zdnet.com/security/?p=661
Over 50% of corporate desktops infected with malware: IronPort
,----[ Quote ]
| The report also reveals that more than 50% of corporate desktops
| worldwide are infected with some type of spyware with the rate of
| infection as high as 70% in the United States. Trojans or malicious
| system monitors represented over 7% of the infections. Rootkits and
| trick loaders, which reinstall spyware and other obfuscation techniques,
| make remediation very difficult thus prevention is the key to stopping
| these threats.
`----
http://www.crn-india.com/breakingnews/stories/66870.html
Botnet 'pandemic' threatens to strangle the net
,----[ Quote ]
| Cerf estimated that between 100 million and 150 million of the
| 600 million PCs on the internet are under the control of hackers,
| the BBC reports.
`----
http://www.theregister.co.uk/2007/01/26/botnet_threat/
Did NSA Put a Secret Backdoor in New Encryption Standard?
,----[ Quote ]
| Which is why you should worry about a new random-number standard that
| includes an algorithm that is slow, badly designed and just might contain a
| backdoor for the National Security Agency.
`----
http://www.wired.com/politics/security/commentary/securitymatters/2007/11/securitymatters_1115
,----[ Quote ]
| "Is this a good idea or not? For the first time, the giant software maker
| is acknowledging the help of the secretive agency, better known for
| eavesdropping on foreign officials and, more recently, U.S. citizens as
| part of the Bush..."
`----
http://www.schneier.com/blog/archives/2007/01/nsa_helps_micro_1.html
Microsoft could be teaching police to hack Vista
,----[ Quote ]
| Microsoft may begin training the police in ways to break the
| encryption built into its forthcoming Vista operating system.
`----
http://www.vnunet.com/vnunet/news/2150555/microsoft-teaching-police-hack
UK holds Microsoft security talks
,----[ Quote ]
| "UK officials are talking to Microsoft over fears the new version of
| Windows could make it harder for police to read suspects' computer files."
`----
http://news.bbc.co.uk/1/hi/uk_politics/4713018.stm
For Windows Vista Security, Microsoft Called in Pros
,----[ Quote ]
| The NSA also declined to be specific but said it used two groups â a âred
| teamâ and a âblue teamâ â to test Vistaâs security. The red team, for
| instance, posed as âthe determined, technically competent adversaryâ to
| disrupt, corrupt or steal information. âThey pretend to be bad guys,â Sager
| said. The blue team helped Defense Department system administrators with
| Vistaâs configuration .
|
| Microsoft said this is not the first time it has sought help from the NSA.
| For about four years, Microsoft has tapped the spy agency for security
| expertise in reviewing its operating systems, including the Windows XP
| consumer version and the Windows Server 2003 for corporate customers.
`----
http://www.manpreet.co.in/tech-stuff/microsoft-vista-developed-with-help-from-us-national-security-agency/
Microsoft patents the mother of all adware systems
,----[ Quote ]
| The adware framework would leave almost no data untouched in its quest to
| sell you stuff. It would inspect "user document files, user e-mail files,
| user music files, downloaded podcasts, computer settings, computer status
| messages (e.g., a low memory status or low printer ink)," and more. How could
| we have been so blind as to not see the marketing value in computer status
| messages?
`----
http://arstechnica.com/news.ars/post/20070717-microsoft-patents-the-mother-of-all-adware-systems.html
Why proprietary code is bad for security
,----[ Quote ]
| Tho Skype is using an encrypted protocol, itâs still their own, non-disclosed
| code and property. So we donât know what it contains.
|
| [...]
|
| Itâs time to stop accepting that we are the bad guys, and to stop consuming
| things we just donât understand (and cannot, because they are proprietary,
| closed-source systems).
|
| Say no to companies, or even governments who treat you like this. Start using
| open sourced products and protocols wherever you can. Even if you could
| still never understand the code used in these systems, there are still lots
| of people who can, and who will examine it. The magic word here is âpeer
| reviewâ - your friend or buddy or neighbour may be able to understand all
| that, and to help. No, not with Skype or Windows or any black box from Cisco.
`----
http://wolfgang.lonien.de/?p=394
U.S. panel urges vigilance on China spying, cyberwar
,----[ Quote ]
| Chinese espionage poses "the single greatest risk" to U.S. technology, a
| congressional advisory panel said Thursday. The panel also called for efforts
| to protect industrial secrets and computer networks.
`----
http://news.zdnet.com/2100-1009_22-6218791.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkuB8cYACgkQU4xAY3RXLo5ocgCfWWRCap0Qh3FK0645zPyMo/6c
rIUAn12F31huucm1XChq8O+Z/KJHvEsr
=mJIS
-----END PGP SIGNATURE-----
|
|