2011/10/26

2011/10/21

New Metasploit

A community version was announce by Rapid7. THi sversion is going to be a bridge between the open source version and the full Pro edition.

announcement here

2011/10/20

Ubuntu 11.10 articles

Well 11.10 has just been released, and How To Forge is already on top of the tutorials for the perfect Desktop or Server. Choose your lesson of choice from the ones I have found so far......

Perfect Desktop #1
ISP Config
Upgrade
Kubuntu Desktop
LAMP Server

Dig in and get that perfect configuration running on your hardware now!

2011/10/14

Thank you Dennis Ritchie

Another truly great and innovative mind has left us for the great computer lab in the sky. Dennis Ritchie you will be missed and your contributions to computing will never be forgotten. Thank you from all of us!

Message from Rob Pike

2011/10/03

Learning articles for the month

So here is the October round of articles and tutorials to check out for the next month. Again, these are just the ones that peak my interest, so by all means please go to the original site and look through all of the great articles they have.

Strategies for Monitoring Failover Clusters
Advanced Group Policy Management (Part 4)
Single Item Recovery (Part 2)
Deploying Lync Server 2010 (Part 3)
Monitoring Exchange 2007 / 2010 with Powershell (Part 3
Enabling Forms-based Authentication for OWA published using Forefront TMG 2010 (Part 3)
Configuring Web Proxy Automatic Discovery in Forefront Threat Management Gateway 2010
Windows Security Tools
Eight Things You Can Do Today to Improve Security on Your Microsoft Network
Data Leakage Prevention
Troubleshooting Event Log Entries
Back to basics
Getting Started with ESXi 5



Holy Crap...... Android Exploits.......

So I received the link to this article from a guy i work with, and this scared the living *&^% out of me. Basically any app that asks for "Internet permissions" on your HTC phone, can basically grab whatever it wants from the logging application that HTC included in their android phones.

immediately right after this, a co-worker responds with this link about Trojan'ed QR codes.Then someone added this link tot he email thread started, and .......

mobile security is still in its infancy, but Google and the Mobile device manufacturers do not need to take us back to the security levels of pre-2000.

A lock screen timing out, and you can circumvent the password? That is just a little short of ridiculous.