The specifications for the new G5 were “accidentally” leaked this morning on the front page of Apple.com. Screenscrapes are available of the full Web page as well as a closeup of the specs, an introducing teaser and a two page spread of the G5 with Cinema Display.
Big Brother is really watching you. New RFID tags the size of a speck of dust will be embedded in everything from paper currency to ballpoint pens. Don’t you just love living in the age of information?
More information, as always, available on Slashdot.
It appears that OnlineNIC, a discount bulk domain registrar that caters to domain squatters, has been attacked and their Web servers are unavailable. We had to deal with them about a year ago to transfer a domain name away from a squatter in Korea and found their customer support extremely lacking. On top of that, even after successfully transferring the domain name away from them, they seem to think that we’re still a customer so we keep receiving promotional and maintenance emails from them.
I received the following maintenance email from them this morning informing me that their servers are under attack. It is unclear whether the attack is simply a denial of service attack or if their Web servers were actually compromised. Regardless, the request that OnlineNIC has made in the following email is absolutely outrageous. After informing me that their Web servers are under attack (I didn’t trust them before and I sure don’t trust them now that I know they may have been compromised), they want me to change my proxies to one of theirs.
Continue reading Dangers of trusting your service providers…
I originally wrote this article in October, 1996 and it was published in issue 14.2 of 2600 Magazine: The Hacker Quarterly. Due to the incredible amount of email I’ve received regarding this article, let me state that I realize that the risks outlined within are basic network-related problems, but I’m just trying to open the eyes of end users and ISPs still using outdated cablemodem equipment. If you want, you can jump right to the sniffer information.
Continue reading Cablemodems: They’re fast, but are they safe?
Setting up your own Internet service provider can sometimes be the only way to get satisfactory Internet access options. In case you should want to give it a try, here’s a case study: my own experience.
Continue reading My own private ISP
More and more corporations and small businesses are taking the Linux plunge these days, and for good reason. The low cost of Linux combined with an abundance of geeks who eat, sleep, and breathe UNIX has created a win-win situation for IT managers and geeks alike. Since it’s usually a younger junior systems administrator or “that kid from the design group who knows a lot about computers” who introduces Linux into the workplace, there’s already someone in-house to move into a full-time systems administration position with no training required.
Continue reading Network revamp: Linux with Windows
Improper handling of /tmp symlinks.
Continue reading Symlink Vulnerability in TIN
The concept for configuring PINE for use with PGP is simple. Newer versions of PINE allow external scripts, or filters, to be called when viewing or sending messages. By taking advantage of this, filters can be installed to automatically sign, encrypt, decrypt and check the signatures of both outgoing and incoming PGP-enhanced messages with minimal user interaction.
Continue reading How to configure UNIX PINE for use with PGP