Category: Gnus

News stuff.

  • Don’t call me!

    The National Do Not Call Registry has opened up and is totally hammered. We trust the same government to run our country that can’t keep a Web site online.

  • Coincidence?

    Looks like somebody got Steved over the recent G5 image leak.

  • New Apple G5 specifications “accidentally” leaked.

    The specifications for the new G5 were “accidentally” leaked this morning on the front page of Apple.com. Screenscrapes are available of the full Web page as well as a closeup of the specs, an introducing teaser and a two page spread of the G5 with Cinema Display.

    Plenty of news sources have officially picked up the story. Hrm…now my brand spanking new Dual 1.42GHz PowerPC G4 doesn’t seem so hot.

  • Big Brother is Watching You!

    Big Brother is really watching you. New RFID tags the size of a speck of dust will be embedded in everything from paper currency to ballpoint pens. Don’t you just love living in the age of information?

    More information, as always, available on Slashdot.

  • Dangers of trusting your service providers…

    It appears that OnlineNIC, a discount bulk domain registrar that caters to domain squatters, has been attacked and their Web servers are unavailable. We had to deal with them about a year ago to transfer a domain name away from a squatter in Korea and found their customer support extremely lacking. On top of that, even after successfully transferring the domain name away from them, they seem to think that we’re still a customer so we keep receiving promotional and maintenance emails from them.

    I received the following maintenance email from them this morning informing me that their servers are under attack. It is unclear whether the attack is simply a denial of service attack or if their Web servers were actually compromised. Regardless, the request that OnlineNIC has made in the following email is absolutely outrageous. After informing me that their Web servers are under attack (I didn’t trust them before and I sure don’t trust them now that I know they may have been compromised), they want me to change my proxies to one of theirs.
    (more…)

  • Faq-O-Matic LDAP Authentication

    I’ve created a quick and dirty hack that allows LDAP authentication from within Faq-O-Matic. The hack is quite simple uses UIDs from an LDAP directory to authenticate instead of Faq-O-Matic specific email addresses.

  • Cablemodems: They’re fast, but are they safe?

    I originally wrote this article in October, 1996 and it was published in issue 14.2 of 2600 Magazine: The Hacker Quarterly. Due to the incredible amount of email I’ve received regarding this article, let me state that I realize that the risks outlined within are basic network-related problems, but I’m just trying to open the eyes of end users and ISPs still using outdated cablemodem equipment. If you want, you can jump right to the sniffer information.
    (more…)

  • My own private ISP

    Setting up your own Internet service provider can sometimes be the only way to get satisfactory Internet access options. In case you should want to give it a try, here’s a case study: my own experience.
    (more…)

  • Network revamp: Linux with Windows

    More and more corporations and small businesses are taking the Linux plunge these days, and for good reason. The low cost of Linux combined with an abundance of geeks who eat, sleep, and breathe UNIX has created a win-win situation for IT managers and geeks alike. Since it’s usually a younger junior systems administrator or “that kid from the design group who knows a lot about computers” who introduces Linux into the workplace, there’s already someone in-house to move into a full-time systems administration position with no training required.
    (more…)

  • Symlink Vulnerability in TIN

    Improper handling of /tmp symlinks.
    (more…)