Wednesday, February 05, 2003

Slashdot | Remotely Counting Machines Behind A NAT Box
Remotely Counting Machines Behind A NAT Box
The InternetPosted by timothy on Wednesday February 05, @04:40PM
from the you-knew-this-was-coming dept.
Overtone writes "Steve Bellovin of AT&T Labs Research has published a paper showing how to remotely count the number of machines hiding behind a NAT box (in IMW 2002, the Second Internet Measurement Workshop). Your friendly DSL or cable broadband provider could implement this technique to enforce their single-machine license clause. Bellovin explains how to change the NAT software to defeat the measurement scheme, but the fix is complicated and unlikely to appear in commercial home gateways anytime soon."
5:14:44 PM    

Download our posters to raise awareness about IS security - Companies usually assume that end users will operate corporate computers in a safe manner, avoiding damage to the computers and theft of the company’s information assets. Even if you write and publish formal policies about appropriate use of company computers, many users will still have a relaxed attitude about computer security.
So what can you do to raise awareness of IS security issues in your shop? One way is to remind your users on a regular basis that information systems security is the responsibility of every employee. The raw materials you need to launch a security awareness campaign are available right here: Download our tech support posters and customize them for your company's needs. Tech Republic

11:42:52 AM    

Red Hat Certification Program For Education

Red Hat Certification Program For Education
Red Hat SoftwarePosted by Hemos on Tuesday February 04, @05:59PM
from the certify-rectify dept.
Frank Caviggia writes "The Inquirer has a story up about Red Hat providing educational institutions with the ability to certify students as Red Hat Certified Technicians (RHCT) and Red Hat Certified Engineers (RCHE) how this will relate to Microsoft's MSCE program. You can find the story here. Red Hat has more information on the program here."

[Slashdot]


10:31:21 AM    

Feds pull suspicious .gov site. In a move that raises questions about the security of governmental domains, a .gov Web site has been yanked pending an investigation into the group that controlled it. By Declan McCullagh, Staff Writer, CNET News.com. [CNET News.com]
10:29:10 AM    

Microsoft Won't Ship Java--Yet - Microsoft Corp. will not have to include Sun Microsystems Inc.'s latest Java Runtime Environment (JRE) in Windows and Internet Explorer until the 4th U.S. Circuit Court of Appeals has reviewed the case.
The U.S. Appeals Court on Monday granted Microsoft a stay of the Jan. 21preliminary injunction by Judge J. Frederick Motz of the U.S. District Court in Baltimore, which ordered Microsoft to include Sun's JRE with Windows and Internet Explorer going forward, and enjoined Microsoft from certain separate or stand-alone distributions of its own Java virtual machine (JVM).
10:05:38 AM    

InformationWeek > Software > Microsoft Warns Of Open-Source Pricing Threat > February 4, 2003 - Microsoft warned in a recent Securities and Exchange Commission filing that it may be forced to drop the price of its software because of the threat of open-source software.
"The popularization of the open-source movement continues to pose a significant challenge to the company's business model, including recent efforts by proponents of the open-source model to convince governments worldwide to mandate the use of open-source software in their purchase and development of software products," Microsoft said in a 10-Q report for the quarter ending Jan. 31.


10:01:09 AM    

Microsoft pulls patch that crashes NT 4.0 - Computerworld - Microsoft Corp. has pulled a security patch for Windows NT 4.0 because installing it can cause the operating system to crash, the software maker said yesterday.
The patch, released on Dec. 11, was designed to fix a privilege elevation vulnerability deemed "important" by Microsoft. A malicious user could gain administrative privileges on a system by exploiting a flaw in the WM_TIMER Windows function, Microsoft said in security bulletin MS02-071.

9:57:57 AM