Sunday, March 23, 2008

UBUNTU 8.04 is out

The Ubuntu developers are moving very quickly to bring you the absolute latest and greatest software the open source community has to offer. This is the Ubuntu 8.04 beta release, which brings a host of excellent new features. Ubuntu is about to release the final version of 8.04 next month April 2008, so if you want to try out the beta you can install this version and test it but dont go ahead and install it on your production system yet.

Some updates from 7.10 are :

Xorg 7.3
Linux Kernel 2.6.24
Gnome 2.22
PolicyKit
PulseAudio - On by Default
Firefox 3 Beta 4 - You get more memory for other programs
Transmission Bittorrent support by default
A completely new CD/DVD burning Application
Active Directory Integration
Wubi - Install ubuntu on windows

Go grab the copy...now

Concepts Every IT Security Professional Must Understand in 2008

The list goes from 5 to 1,



5. Shift from a threat focused approach to a risk management focus: FUD spreading is dead. As much fun as it is to scare your peers with stories of AV bypassing rootkits, spawned by cave-dwelling jihadist bent on total destruction through the systematic infection of mobile phones, toasters, and digital picture frames, the reality is FUD isn’t working to free the budget dollars like it used to. Learn to quantify risk, understand the implications to the business and ensure that accepted risk can be mitigated and contained once it becomes a reality.

4. Understand the business: Security professionals tend to look externally at threats as opposed to internally at assets and their function. Assets are more than the sum of their vulnerabilities and the threats against them, they exist to provide a function to the business. This function is variable, as is the importance of the assets themselves. The machine used by Bob in HR - the one he spends his lunch hour surfing between Eva Longoria fansites, ESPN, and this blog - has far less impact on the business than the web application front-end for the customer portal and the systems that support it. Understand the business, critical functions that sustain and enable the business, and how to support the business unit owners themselves - which means you may have to actually talk to someone who isn’t wearing a”hackers do it %6e%61%6b%65%64″ t-shirt, can’t tell the time in binary format, and has no idea who Robert Morris is.

3. For the executives, the board and the bottom line, the A in CIA is more important than the C and I: Yes, I know information centricity, and data security, and an orgy of disclosure with billions of supposed dollars of loss, has led us to believe that confidentiality and integrity of data is the most important thing to the business, but it is availability. Did you know that TJ Maxx (TJX) and Choicepoint (CPS) stock are both at their 5-year high of $33.36/share and $48.14/share respectively and climbing?

2. How much the company funds security efforts is directly proportional to your ability/inability to provide adequate security metrics and proven ROI: You don’t know what metrics to provide and no way to provide them, you have no idea if your security spend has been effective, or if your security program is efficient. No wonder the CIO doesn’t take you seriously. Security has no ROI you say, no way to validate that what you spend is justified - and yet, you stand slack-jawed and shocked when the CFO says no to a budget request for $.5 - 1million to implement the latest NAC/DLP/White-listing/lose weight now ask me how, hyped technology. The reality is that the business is motivated to increase profitability, it’s part of that whole free-market, capitalist society thing. With an impending recession, and the inevitable budget constraints that will follow, you need to recognize that security funding is in jeopardy. Before you leap headlong into an exercise in economic gymnastics and begin a quest to find ROI models that don’t exist, look for opportunities to implement better security controls while addressing the bottom line. As a start I laid out some projects that will make the CFO smile and have some impact on security as well.


1. And finally, realize that you probably won’t have the same job in 2012: So all you firewall jockeys and IDS/IPS admins who spent a career learning the ins and outs of ingress/egress traffic flows may want to take a college course on nursing, a field which will explode as all of the baby boomers inch their way towards the golden years.

-Abhiz

UBUNTU 8.04 is out

The Ubuntu developers are moving very quickly to bring you the absolute latest and greatest software the open source community has to offer. This is the Ubuntu 8.04 beta release, which brings a host of excellent new features. Ubuntu is about to release the final version of 8.04 next month April 2008, so if you want to try out the beta you can install this version and test it but dont go ahead and install it on your production system yet.

Some updates from 7.10 are :

Xorg 7.3
Linux Kernel 2.6.24
Gnome 2.22
PolicyKit
PulseAudio - On by Default
Firefox 3 Beta 4 - You get more memory for other programs
Transmission Bittorrent support by default
A completely new CD/DVD burning Application
Active Directory Integration
Wubi - Install ubuntu on windows

Go grab the copy...now

Concepts Every IT Security Professional Must Understand in 2008

The list goes from 5 to 1,



5. Shift from a threat focused approach to a risk management focus: FUD spreading is dead. As much fun as it is to scare your peers with stories of AV bypassing rootkits, spawned by cave-dwelling jihadist bent on total destruction through the systematic infection of mobile phones, toasters, and digital picture frames, the reality is FUD isn’t working to free the budget dollars like it used to. Learn to quantify risk, understand the implications to the business and ensure that accepted risk can be mitigated and contained once it becomes a reality.

4. Understand the business: Security professionals tend to look externally at threats as opposed to internally at assets and their function. Assets are more than the sum of their vulnerabilities and the threats against them, they exist to provide a function to the business. This function is variable, as is the importance of the assets themselves. The machine used by Bob in HR - the one he spends his lunch hour surfing between Eva Longoria fansites, ESPN, and this blog - has far less impact on the business than the web application front-end for the customer portal and the systems that support it. Understand the business, critical functions that sustain and enable the business, and how to support the business unit owners themselves - which means you may have to actually talk to someone who isn’t wearing a”hackers do it %6e%61%6b%65%64″ t-shirt, can’t tell the time in binary format, and has no idea who Robert Morris is.

3. For the executives, the board and the bottom line, the A in CIA is more important than the C and I: Yes, I know information centricity, and data security, and an orgy of disclosure with billions of supposed dollars of loss, has led us to believe that confidentiality and integrity of data is the most important thing to the business, but it is availability. Did you know that TJ Maxx (TJX) and Choicepoint (CPS) stock are both at their 5-year high of $33.36/share and $48.14/share respectively and climbing?

2. How much the company funds security efforts is directly proportional to your ability/inability to provide adequate security metrics and proven ROI: You don’t know what metrics to provide and no way to provide them, you have no idea if your security spend has been effective, or if your security program is efficient. No wonder the CIO doesn’t take you seriously. Security has no ROI you say, no way to validate that what you spend is justified - and yet, you stand slack-jawed and shocked when the CFO says no to a budget request for $.5 - 1million to implement the latest NAC/DLP/White-listing/lose weight now ask me how, hyped technology. The reality is that the business is motivated to increase profitability, it’s part of that whole free-market, capitalist society thing. With an impending recession, and the inevitable budget constraints that will follow, you need to recognize that security funding is in jeopardy. Before you leap headlong into an exercise in economic gymnastics and begin a quest to find ROI models that don’t exist, look for opportunities to implement better security controls while addressing the bottom line. As a start I laid out some projects that will make the CFO smile and have some impact on security as well.


1. And finally, realize that you probably won’t have the same job in 2012: So all you firewall jockeys and IDS/IPS admins who spent a career learning the ins and outs of ingress/egress traffic flows may want to take a college course on nursing, a field which will explode as all of the baby boomers inch their way towards the golden years.

-Abhiz

UBUNTU 8.04 is out

The Ubuntu developers are moving very quickly to bring you the absolute latest and greatest software the open source community has to offer. This is the Ubuntu 8.04 beta release, which brings a host of excellent new features. Ubuntu is about to release the final version of 8.04 next month April 2008, so if you want to try out the beta you can install this version and test it but dont go ahead and install it on your production system yet.

Some updates from 7.10 are :

Xorg 7.3
Linux Kernel 2.6.24
Gnome 2.22
PolicyKit
PulseAudio - On by Default
Firefox 3 Beta 4 - You get more memory for other programs
Transmission Bittorrent support by default
A completely new CD/DVD burning Application
Active Directory Integration
Wubi - Install ubuntu on windows

Go grab the copy...now

Concepts Every IT Security Professional Must Understand in 2008

The list goes from 5 to 1,



5. Shift from a threat focused approach to a risk management focus: FUD spreading is dead. As much fun as it is to scare your peers with stories of AV bypassing rootkits, spawned by cave-dwelling jihadist bent on total destruction through the systematic infection of mobile phones, toasters, and digital picture frames, the reality is FUD isn’t working to free the budget dollars like it used to. Learn to quantify risk, understand the implications to the business and ensure that accepted risk can be mitigated and contained once it becomes a reality.

4. Understand the business: Security professionals tend to look externally at threats as opposed to internally at assets and their function. Assets are more than the sum of their vulnerabilities and the threats against them, they exist to provide a function to the business. This function is variable, as is the importance of the assets themselves. The machine used by Bob in HR - the one he spends his lunch hour surfing between Eva Longoria fansites, ESPN, and this blog - has far less impact on the business than the web application front-end for the customer portal and the systems that support it. Understand the business, critical functions that sustain and enable the business, and how to support the business unit owners themselves - which means you may have to actually talk to someone who isn’t wearing a”hackers do it %6e%61%6b%65%64″ t-shirt, can’t tell the time in binary format, and has no idea who Robert Morris is.

3. For the executives, the board and the bottom line, the A in CIA is more important than the C and I: Yes, I know information centricity, and data security, and an orgy of disclosure with billions of supposed dollars of loss, has led us to believe that confidentiality and integrity of data is the most important thing to the business, but it is availability. Did you know that TJ Maxx (TJX) and Choicepoint (CPS) stock are both at their 5-year high of $33.36/share and $48.14/share respectively and climbing?

2. How much the company funds security efforts is directly proportional to your ability/inability to provide adequate security metrics and proven ROI: You don’t know what metrics to provide and no way to provide them, you have no idea if your security spend has been effective, or if your security program is efficient. No wonder the CIO doesn’t take you seriously. Security has no ROI you say, no way to validate that what you spend is justified - and yet, you stand slack-jawed and shocked when the CFO says no to a budget request for $.5 - 1million to implement the latest NAC/DLP/White-listing/lose weight now ask me how, hyped technology. The reality is that the business is motivated to increase profitability, it’s part of that whole free-market, capitalist society thing. With an impending recession, and the inevitable budget constraints that will follow, you need to recognize that security funding is in jeopardy. Before you leap headlong into an exercise in economic gymnastics and begin a quest to find ROI models that don’t exist, look for opportunities to implement better security controls while addressing the bottom line. As a start I laid out some projects that will make the CFO smile and have some impact on security as well.


1. And finally, realize that you probably won’t have the same job in 2012: So all you firewall jockeys and IDS/IPS admins who spent a career learning the ins and outs of ingress/egress traffic flows may want to take a college course on nursing, a field which will explode as all of the baby boomers inch their way towards the golden years.

-Abhiz

UBUNTU 8.04 is out

The Ubuntu developers are moving very quickly to bring you the absolute latest and greatest software the open source community has to offer. This is the Ubuntu 8.04 beta release, which brings a host of excellent new features. Ubuntu is about to release the final version of 8.04 next month April 2008, so if you want to try out the beta you can install this version and test it but dont go ahead and install it on your production system yet.

Some updates from 7.10 are :

Xorg 7.3
Linux Kernel 2.6.24
Gnome 2.22
PolicyKit
PulseAudio - On by Default
Firefox 3 Beta 4 - You get more memory for other programs
Transmission Bittorrent support by default
A completely new CD/DVD burning Application
Active Directory Integration
Wubi - Install ubuntu on windows

Go grab the copy...now

Concepts Every IT Security Professional Must Understand in 2008

The list goes from 5 to 1,



5. Shift from a threat focused approach to a risk management focus: FUD spreading is dead. As much fun as it is to scare your peers with stories of AV bypassing rootkits, spawned by cave-dwelling jihadist bent on total destruction through the systematic infection of mobile phones, toasters, and digital picture frames, the reality is FUD isn’t working to free the budget dollars like it used to. Learn to quantify risk, understand the implications to the business and ensure that accepted risk can be mitigated and contained once it becomes a reality.

4. Understand the business: Security professionals tend to look externally at threats as opposed to internally at assets and their function. Assets are more than the sum of their vulnerabilities and the threats against them, they exist to provide a function to the business. This function is variable, as is the importance of the assets themselves. The machine used by Bob in HR - the one he spends his lunch hour surfing between Eva Longoria fansites, ESPN, and this blog - has far less impact on the business than the web application front-end for the customer portal and the systems that support it. Understand the business, critical functions that sustain and enable the business, and how to support the business unit owners themselves - which means you may have to actually talk to someone who isn’t wearing a”hackers do it %6e%61%6b%65%64″ t-shirt, can’t tell the time in binary format, and has no idea who Robert Morris is.

3. For the executives, the board and the bottom line, the A in CIA is more important than the C and I: Yes, I know information centricity, and data security, and an orgy of disclosure with billions of supposed dollars of loss, has led us to believe that confidentiality and integrity of data is the most important thing to the business, but it is availability. Did you know that TJ Maxx (TJX) and Choicepoint (CPS) stock are both at their 5-year high of $33.36/share and $48.14/share respectively and climbing?

2. How much the company funds security efforts is directly proportional to your ability/inability to provide adequate security metrics and proven ROI: You don’t know what metrics to provide and no way to provide them, you have no idea if your security spend has been effective, or if your security program is efficient. No wonder the CIO doesn’t take you seriously. Security has no ROI you say, no way to validate that what you spend is justified - and yet, you stand slack-jawed and shocked when the CFO says no to a budget request for $.5 - 1million to implement the latest NAC/DLP/White-listing/lose weight now ask me how, hyped technology. The reality is that the business is motivated to increase profitability, it’s part of that whole free-market, capitalist society thing. With an impending recession, and the inevitable budget constraints that will follow, you need to recognize that security funding is in jeopardy. Before you leap headlong into an exercise in economic gymnastics and begin a quest to find ROI models that don’t exist, look for opportunities to implement better security controls while addressing the bottom line. As a start I laid out some projects that will make the CFO smile and have some impact on security as well.


1. And finally, realize that you probably won’t have the same job in 2012: So all you firewall jockeys and IDS/IPS admins who spent a career learning the ins and outs of ingress/egress traffic flows may want to take a college course on nursing, a field which will explode as all of the baby boomers inch their way towards the golden years.

-Abhiz

UBUNTU 8.04 is out

The Ubuntu developers are moving very quickly to bring you the absolute latest and greatest software the open source community has to offer. This is the Ubuntu 8.04 beta release, which brings a host of excellent new features. Ubuntu is about to release the final version of 8.04 next month April 2008, so if you want to try out the beta you can install this version and test it but dont go ahead and install it on your production system yet.

Some updates from 7.10 are :

Xorg 7.3
Linux Kernel 2.6.24
Gnome 2.22
PolicyKit
PulseAudio - On by Default
Firefox 3 Beta 4 - You get more memory for other programs
Transmission Bittorrent support by default
A completely new CD/DVD burning Application
Active Directory Integration
Wubi - Install ubuntu on windows

Go grab the copy...now

Concepts Every IT Security Professional Must Understand in 2008

The list goes from 5 to 1,



5. Shift from a threat focused approach to a risk management focus: FUD spreading is dead. As much fun as it is to scare your peers with stories of AV bypassing rootkits, spawned by cave-dwelling jihadist bent on total destruction through the systematic infection of mobile phones, toasters, and digital picture frames, the reality is FUD isn’t working to free the budget dollars like it used to. Learn to quantify risk, understand the implications to the business and ensure that accepted risk can be mitigated and contained once it becomes a reality.

4. Understand the business: Security professionals tend to look externally at threats as opposed to internally at assets and their function. Assets are more than the sum of their vulnerabilities and the threats against them, they exist to provide a function to the business. This function is variable, as is the importance of the assets themselves. The machine used by Bob in HR - the one he spends his lunch hour surfing between Eva Longoria fansites, ESPN, and this blog - has far less impact on the business than the web application front-end for the customer portal and the systems that support it. Understand the business, critical functions that sustain and enable the business, and how to support the business unit owners themselves - which means you may have to actually talk to someone who isn’t wearing a”hackers do it %6e%61%6b%65%64″ t-shirt, can’t tell the time in binary format, and has no idea who Robert Morris is.

3. For the executives, the board and the bottom line, the A in CIA is more important than the C and I: Yes, I know information centricity, and data security, and an orgy of disclosure with billions of supposed dollars of loss, has led us to believe that confidentiality and integrity of data is the most important thing to the business, but it is availability. Did you know that TJ Maxx (TJX) and Choicepoint (CPS) stock are both at their 5-year high of $33.36/share and $48.14/share respectively and climbing?

2. How much the company funds security efforts is directly proportional to your ability/inability to provide adequate security metrics and proven ROI: You don’t know what metrics to provide and no way to provide them, you have no idea if your security spend has been effective, or if your security program is efficient. No wonder the CIO doesn’t take you seriously. Security has no ROI you say, no way to validate that what you spend is justified - and yet, you stand slack-jawed and shocked when the CFO says no to a budget request for $.5 - 1million to implement the latest NAC/DLP/White-listing/lose weight now ask me how, hyped technology. The reality is that the business is motivated to increase profitability, it’s part of that whole free-market, capitalist society thing. With an impending recession, and the inevitable budget constraints that will follow, you need to recognize that security funding is in jeopardy. Before you leap headlong into an exercise in economic gymnastics and begin a quest to find ROI models that don’t exist, look for opportunities to implement better security controls while addressing the bottom line. As a start I laid out some projects that will make the CFO smile and have some impact on security as well.


1. And finally, realize that you probably won’t have the same job in 2012: So all you firewall jockeys and IDS/IPS admins who spent a career learning the ins and outs of ingress/egress traffic flows may want to take a college course on nursing, a field which will explode as all of the baby boomers inch their way towards the golden years.

-Abhiz

UBUNTU 8.04 is out

The Ubuntu developers are moving very quickly to bring you the absolute latest and greatest software the open source community has to offer. This is the Ubuntu 8.04 beta release, which brings a host of excellent new features. Ubuntu is about to release the final version of 8.04 next month April 2008, so if you want to try out the beta you can install this version and test it but dont go ahead and install it on your production system yet.

Some updates from 7.10 are :

Xorg 7.3
Linux Kernel 2.6.24
Gnome 2.22
PolicyKit
PulseAudio - On by Default
Firefox 3 Beta 4 - You get more memory for other programs
Transmission Bittorrent support by default
A completely new CD/DVD burning Application
Active Directory Integration
Wubi - Install ubuntu on windows

Go grab the copy...now

Concepts Every IT Security Professional Must Understand in 2008

The list goes from 5 to 1,



5. Shift from a threat focused approach to a risk management focus: FUD spreading is dead. As much fun as it is to scare your peers with stories of AV bypassing rootkits, spawned by cave-dwelling jihadist bent on total destruction through the systematic infection of mobile phones, toasters, and digital picture frames, the reality is FUD isn’t working to free the budget dollars like it used to. Learn to quantify risk, understand the implications to the business and ensure that accepted risk can be mitigated and contained once it becomes a reality.

4. Understand the business: Security professionals tend to look externally at threats as opposed to internally at assets and their function. Assets are more than the sum of their vulnerabilities and the threats against them, they exist to provide a function to the business. This function is variable, as is the importance of the assets themselves. The machine used by Bob in HR - the one he spends his lunch hour surfing between Eva Longoria fansites, ESPN, and this blog - has far less impact on the business than the web application front-end for the customer portal and the systems that support it. Understand the business, critical functions that sustain and enable the business, and how to support the business unit owners themselves - which means you may have to actually talk to someone who isn’t wearing a”hackers do it %6e%61%6b%65%64″ t-shirt, can’t tell the time in binary format, and has no idea who Robert Morris is.

3. For the executives, the board and the bottom line, the A in CIA is more important than the C and I: Yes, I know information centricity, and data security, and an orgy of disclosure with billions of supposed dollars of loss, has led us to believe that confidentiality and integrity of data is the most important thing to the business, but it is availability. Did you know that TJ Maxx (TJX) and Choicepoint (CPS) stock are both at their 5-year high of $33.36/share and $48.14/share respectively and climbing?

2. How much the company funds security efforts is directly proportional to your ability/inability to provide adequate security metrics and proven ROI: You don’t know what metrics to provide and no way to provide them, you have no idea if your security spend has been effective, or if your security program is efficient. No wonder the CIO doesn’t take you seriously. Security has no ROI you say, no way to validate that what you spend is justified - and yet, you stand slack-jawed and shocked when the CFO says no to a budget request for $.5 - 1million to implement the latest NAC/DLP/White-listing/lose weight now ask me how, hyped technology. The reality is that the business is motivated to increase profitability, it’s part of that whole free-market, capitalist society thing. With an impending recession, and the inevitable budget constraints that will follow, you need to recognize that security funding is in jeopardy. Before you leap headlong into an exercise in economic gymnastics and begin a quest to find ROI models that don’t exist, look for opportunities to implement better security controls while addressing the bottom line. As a start I laid out some projects that will make the CFO smile and have some impact on security as well.


1. And finally, realize that you probably won’t have the same job in 2012: So all you firewall jockeys and IDS/IPS admins who spent a career learning the ins and outs of ingress/egress traffic flows may want to take a college course on nursing, a field which will explode as all of the baby boomers inch their way towards the golden years.

-Abhiz

UBUNTU 8.04 is out

The Ubuntu developers are moving very quickly to bring you the absolute latest and greatest software the open source community has to offer. This is the Ubuntu 8.04 beta release, which brings a host of excellent new features. Ubuntu is about to release the final version of 8.04 next month April 2008, so if you want to try out the beta you can install this version and test it but dont go ahead and install it on your production system yet.

Some updates from 7.10 are :

Xorg 7.3
Linux Kernel 2.6.24
Gnome 2.22
PolicyKit
PulseAudio - On by Default
Firefox 3 Beta 4 - You get more memory for other programs
Transmission Bittorrent support by default
A completely new CD/DVD burning Application
Active Directory Integration
Wubi - Install ubuntu on windows

Go grab the copy...now

Concepts Every IT Security Professional Must Understand in 2008

The list goes from 5 to 1,



5. Shift from a threat focused approach to a risk management focus: FUD spreading is dead. As much fun as it is to scare your peers with stories of AV bypassing rootkits, spawned by cave-dwelling jihadist bent on total destruction through the systematic infection of mobile phones, toasters, and digital picture frames, the reality is FUD isn’t working to free the budget dollars like it used to. Learn to quantify risk, understand the implications to the business and ensure that accepted risk can be mitigated and contained once it becomes a reality.

4. Understand the business: Security professionals tend to look externally at threats as opposed to internally at assets and their function. Assets are more than the sum of their vulnerabilities and the threats against them, they exist to provide a function to the business. This function is variable, as is the importance of the assets themselves. The machine used by Bob in HR - the one he spends his lunch hour surfing between Eva Longoria fansites, ESPN, and this blog - has far less impact on the business than the web application front-end for the customer portal and the systems that support it. Understand the business, critical functions that sustain and enable the business, and how to support the business unit owners themselves - which means you may have to actually talk to someone who isn’t wearing a”hackers do it %6e%61%6b%65%64″ t-shirt, can’t tell the time in binary format, and has no idea who Robert Morris is.

3. For the executives, the board and the bottom line, the A in CIA is more important than the C and I: Yes, I know information centricity, and data security, and an orgy of disclosure with billions of supposed dollars of loss, has led us to believe that confidentiality and integrity of data is the most important thing to the business, but it is availability. Did you know that TJ Maxx (TJX) and Choicepoint (CPS) stock are both at their 5-year high of $33.36/share and $48.14/share respectively and climbing?

2. How much the company funds security efforts is directly proportional to your ability/inability to provide adequate security metrics and proven ROI: You don’t know what metrics to provide and no way to provide them, you have no idea if your security spend has been effective, or if your security program is efficient. No wonder the CIO doesn’t take you seriously. Security has no ROI you say, no way to validate that what you spend is justified - and yet, you stand slack-jawed and shocked when the CFO says no to a budget request for $.5 - 1million to implement the latest NAC/DLP/White-listing/lose weight now ask me how, hyped technology. The reality is that the business is motivated to increase profitability, it’s part of that whole free-market, capitalist society thing. With an impending recession, and the inevitable budget constraints that will follow, you need to recognize that security funding is in jeopardy. Before you leap headlong into an exercise in economic gymnastics and begin a quest to find ROI models that don’t exist, look for opportunities to implement better security controls while addressing the bottom line. As a start I laid out some projects that will make the CFO smile and have some impact on security as well.


1. And finally, realize that you probably won’t have the same job in 2012: So all you firewall jockeys and IDS/IPS admins who spent a career learning the ins and outs of ingress/egress traffic flows may want to take a college course on nursing, a field which will explode as all of the baby boomers inch their way towards the golden years.

-Abhiz

UBUNTU 8.04 is out

The Ubuntu developers are moving very quickly to bring you the absolute latest and greatest software the open source community has to offer. This is the Ubuntu 8.04 beta release, which brings a host of excellent new features. Ubuntu is about to release the final version of 8.04 next month April 2008, so if you want to try out the beta you can install this version and test it but dont go ahead and install it on your production system yet.

Some updates from 7.10 are :

Xorg 7.3
Linux Kernel 2.6.24
Gnome 2.22
PolicyKit
PulseAudio - On by Default
Firefox 3 Beta 4 - You get more memory for other programs
Transmission Bittorrent support by default
A completely new CD/DVD burning Application
Active Directory Integration
Wubi - Install ubuntu on windows

Go grab the copy...now

Concepts Every IT Security Professional Must Understand in 2008

The list goes from 5 to 1,



5. Shift from a threat focused approach to a risk management focus: FUD spreading is dead. As much fun as it is to scare your peers with stories of AV bypassing rootkits, spawned by cave-dwelling jihadist bent on total destruction through the systematic infection of mobile phones, toasters, and digital picture frames, the reality is FUD isn’t working to free the budget dollars like it used to. Learn to quantify risk, understand the implications to the business and ensure that accepted risk can be mitigated and contained once it becomes a reality.

4. Understand the business: Security professionals tend to look externally at threats as opposed to internally at assets and their function. Assets are more than the sum of their vulnerabilities and the threats against them, they exist to provide a function to the business. This function is variable, as is the importance of the assets themselves. The machine used by Bob in HR - the one he spends his lunch hour surfing between Eva Longoria fansites, ESPN, and this blog - has far less impact on the business than the web application front-end for the customer portal and the systems that support it. Understand the business, critical functions that sustain and enable the business, and how to support the business unit owners themselves - which means you may have to actually talk to someone who isn’t wearing a”hackers do it %6e%61%6b%65%64″ t-shirt, can’t tell the time in binary format, and has no idea who Robert Morris is.

3. For the executives, the board and the bottom line, the A in CIA is more important than the C and I: Yes, I know information centricity, and data security, and an orgy of disclosure with billions of supposed dollars of loss, has led us to believe that confidentiality and integrity of data is the most important thing to the business, but it is availability. Did you know that TJ Maxx (TJX) and Choicepoint (CPS) stock are both at their 5-year high of $33.36/share and $48.14/share respectively and climbing?

2. How much the company funds security efforts is directly proportional to your ability/inability to provide adequate security metrics and proven ROI: You don’t know what metrics to provide and no way to provide them, you have no idea if your security spend has been effective, or if your security program is efficient. No wonder the CIO doesn’t take you seriously. Security has no ROI you say, no way to validate that what you spend is justified - and yet, you stand slack-jawed and shocked when the CFO says no to a budget request for $.5 - 1million to implement the latest NAC/DLP/White-listing/lose weight now ask me how, hyped technology. The reality is that the business is motivated to increase profitability, it’s part of that whole free-market, capitalist society thing. With an impending recession, and the inevitable budget constraints that will follow, you need to recognize that security funding is in jeopardy. Before you leap headlong into an exercise in economic gymnastics and begin a quest to find ROI models that don’t exist, look for opportunities to implement better security controls while addressing the bottom line. As a start I laid out some projects that will make the CFO smile and have some impact on security as well.


1. And finally, realize that you probably won’t have the same job in 2012: So all you firewall jockeys and IDS/IPS admins who spent a career learning the ins and outs of ingress/egress traffic flows may want to take a college course on nursing, a field which will explode as all of the baby boomers inch their way towards the golden years.

-Abhiz

UBUNTU 8.04 is out

The Ubuntu developers are moving very quickly to bring you the absolute latest and greatest software the open source community has to offer. This is the Ubuntu 8.04 beta release, which brings a host of excellent new features. Ubuntu is about to release the final version of 8.04 next month April 2008, so if you want to try out the beta you can install this version and test it but dont go ahead and install it on your production system yet.

Some updates from 7.10 are :

Xorg 7.3
Linux Kernel 2.6.24
Gnome 2.22
PolicyKit
PulseAudio - On by Default
Firefox 3 Beta 4 - You get more memory for other programs
Transmission Bittorrent support by default
A completely new CD/DVD burning Application
Active Directory Integration
Wubi - Install ubuntu on windows

Go grab the copy...now

Concepts Every IT Security Professional Must Understand in 2008

The list goes from 5 to 1,



5. Shift from a threat focused approach to a risk management focus: FUD spreading is dead. As much fun as it is to scare your peers with stories of AV bypassing rootkits, spawned by cave-dwelling jihadist bent on total destruction through the systematic infection of mobile phones, toasters, and digital picture frames, the reality is FUD isn’t working to free the budget dollars like it used to. Learn to quantify risk, understand the implications to the business and ensure that accepted risk can be mitigated and contained once it becomes a reality.

4. Understand the business: Security professionals tend to look externally at threats as opposed to internally at assets and their function. Assets are more than the sum of their vulnerabilities and the threats against them, they exist to provide a function to the business. This function is variable, as is the importance of the assets themselves. The machine used by Bob in HR - the one he spends his lunch hour surfing between Eva Longoria fansites, ESPN, and this blog - has far less impact on the business than the web application front-end for the customer portal and the systems that support it. Understand the business, critical functions that sustain and enable the business, and how to support the business unit owners themselves - which means you may have to actually talk to someone who isn’t wearing a”hackers do it %6e%61%6b%65%64″ t-shirt, can’t tell the time in binary format, and has no idea who Robert Morris is.

3. For the executives, the board and the bottom line, the A in CIA is more important than the C and I: Yes, I know information centricity, and data security, and an orgy of disclosure with billions of supposed dollars of loss, has led us to believe that confidentiality and integrity of data is the most important thing to the business, but it is availability. Did you know that TJ Maxx (TJX) and Choicepoint (CPS) stock are both at their 5-year high of $33.36/share and $48.14/share respectively and climbing?

2. How much the company funds security efforts is directly proportional to your ability/inability to provide adequate security metrics and proven ROI: You don’t know what metrics to provide and no way to provide them, you have no idea if your security spend has been effective, or if your security program is efficient. No wonder the CIO doesn’t take you seriously. Security has no ROI you say, no way to validate that what you spend is justified - and yet, you stand slack-jawed and shocked when the CFO says no to a budget request for $.5 - 1million to implement the latest NAC/DLP/White-listing/lose weight now ask me how, hyped technology. The reality is that the business is motivated to increase profitability, it’s part of that whole free-market, capitalist society thing. With an impending recession, and the inevitable budget constraints that will follow, you need to recognize that security funding is in jeopardy. Before you leap headlong into an exercise in economic gymnastics and begin a quest to find ROI models that don’t exist, look for opportunities to implement better security controls while addressing the bottom line. As a start I laid out some projects that will make the CFO smile and have some impact on security as well.


1. And finally, realize that you probably won’t have the same job in 2012: So all you firewall jockeys and IDS/IPS admins who spent a career learning the ins and outs of ingress/egress traffic flows may want to take a college course on nursing, a field which will explode as all of the baby boomers inch their way towards the golden years.

-Abhiz

UBUNTU 8.04 is out

The Ubuntu developers are moving very quickly to bring you the absolute latest and greatest software the open source community has to offer. This is the Ubuntu 8.04 beta release, which brings a host of excellent new features. Ubuntu is about to release the final version of 8.04 next month April 2008, so if you want to try out the beta you can install this version and test it but dont go ahead and install it on your production system yet.

Some updates from 7.10 are :

Xorg 7.3
Linux Kernel 2.6.24
Gnome 2.22
PolicyKit
PulseAudio - On by Default
Firefox 3 Beta 4 - You get more memory for other programs
Transmission Bittorrent support by default
A completely new CD/DVD burning Application
Active Directory Integration
Wubi - Install ubuntu on windows

Go grab the copy...now

Concepts Every IT Security Professional Must Understand in 2008

The list goes from 5 to 1,



5. Shift from a threat focused approach to a risk management focus: FUD spreading is dead. As much fun as it is to scare your peers with stories of AV bypassing rootkits, spawned by cave-dwelling jihadist bent on total destruction through the systematic infection of mobile phones, toasters, and digital picture frames, the reality is FUD isn’t working to free the budget dollars like it used to. Learn to quantify risk, understand the implications to the business and ensure that accepted risk can be mitigated and contained once it becomes a reality.

4. Understand the business: Security professionals tend to look externally at threats as opposed to internally at assets and their function. Assets are more than the sum of their vulnerabilities and the threats against them, they exist to provide a function to the business. This function is variable, as is the importance of the assets themselves. The machine used by Bob in HR - the one he spends his lunch hour surfing between Eva Longoria fansites, ESPN, and this blog - has far less impact on the business than the web application front-end for the customer portal and the systems that support it. Understand the business, critical functions that sustain and enable the business, and how to support the business unit owners themselves - which means you may have to actually talk to someone who isn’t wearing a”hackers do it %6e%61%6b%65%64″ t-shirt, can’t tell the time in binary format, and has no idea who Robert Morris is.

3. For the executives, the board and the bottom line, the A in CIA is more important than the C and I: Yes, I know information centricity, and data security, and an orgy of disclosure with billions of supposed dollars of loss, has led us to believe that confidentiality and integrity of data is the most important thing to the business, but it is availability. Did you know that TJ Maxx (TJX) and Choicepoint (CPS) stock are both at their 5-year high of $33.36/share and $48.14/share respectively and climbing?

2. How much the company funds security efforts is directly proportional to your ability/inability to provide adequate security metrics and proven ROI: You don’t know what metrics to provide and no way to provide them, you have no idea if your security spend has been effective, or if your security program is efficient. No wonder the CIO doesn’t take you seriously. Security has no ROI you say, no way to validate that what you spend is justified - and yet, you stand slack-jawed and shocked when the CFO says no to a budget request for $.5 - 1million to implement the latest NAC/DLP/White-listing/lose weight now ask me how, hyped technology. The reality is that the business is motivated to increase profitability, it’s part of that whole free-market, capitalist society thing. With an impending recession, and the inevitable budget constraints that will follow, you need to recognize that security funding is in jeopardy. Before you leap headlong into an exercise in economic gymnastics and begin a quest to find ROI models that don’t exist, look for opportunities to implement better security controls while addressing the bottom line. As a start I laid out some projects that will make the CFO smile and have some impact on security as well.


1. And finally, realize that you probably won’t have the same job in 2012: So all you firewall jockeys and IDS/IPS admins who spent a career learning the ins and outs of ingress/egress traffic flows may want to take a college course on nursing, a field which will explode as all of the baby boomers inch their way towards the golden years.

-Abhiz

Microsoft's Hyper-V support for linux not a disaster yet

Windows 2008 Hyper-V is th next generation based server virtualization technology that makes the best use of your high end hardware by adding multiple server roles as separate virtual machine or in simple terms you will be running multiple operating systems in parallel on the same hardware, one of the biggest player in virtualization technology is VMWare followed by XEN.

At this point of time only SuSE Enterprise is officially supported by Hyper-V, but that does not mean Redhat, Fedora etc wont work, it is just a matter of time that the support for other operating systems is added because there are surely kernel enhancements that have to be done to run multiple VM's with the Hyper-V technology and Microsoft's pet Linux company is SuSE gives them a heads up for the Hyper-V support. There is supposed to be done a lot of emulation to the hardware interrupts which is will take more time to support other operating systems and with the recent

Microsoft said Hyper-V beta for Windows Server 2008 is feature complete. Included in the list of operating systems supported are Windows Server 2003 SP2, Novell SUSE Linux Enterprise Server 10 SP1, Windows Vista SP1 (x86), and Windows XP SP3 (x86).

So Microsoft's Hyper-V technology is not yet a disaster that companies cannot lookup to using and the support for other Linux operating systems is surely on the way.

Microsoft's Hyper-V support for linux not a disaster yet

Windows 2008 Hyper-V is th next generation based server virtualization technology that makes the best use of your high end hardware by adding multiple server roles as separate virtual machine or in simple terms you will be running multiple operating systems in parallel on the same hardware, one of the biggest player in virtualization technology is VMWare followed by XEN.

At this point of time only SuSE Enterprise is officially supported by Hyper-V, but that does not mean Redhat, Fedora etc wont work, it is just a matter of time that the support for other operating systems is added because there are surely kernel enhancements that have to be done to run multiple VM's with the Hyper-V technology and Microsoft's pet Linux company is SuSE gives them a heads up for the Hyper-V support. There is supposed to be done a lot of emulation to the hardware interrupts which is will take more time to support other operating systems and with the recent

Microsoft said Hyper-V beta for Windows Server 2008 is feature complete. Included in the list of operating systems supported are Windows Server 2003 SP2, Novell SUSE Linux Enterprise Server 10 SP1, Windows Vista SP1 (x86), and Windows XP SP3 (x86).

So Microsoft's Hyper-V technology is not yet a disaster that companies cannot lookup to using and the support for other Linux operating systems is surely on the way.

Microsoft's Hyper-V support for linux not a disaster yet

Windows 2008 Hyper-V is th next generation based server virtualization technology that makes the best use of your high end hardware by adding multiple server roles as separate virtual machine or in simple terms you will be running multiple operating systems in parallel on the same hardware, one of the biggest player in virtualization technology is VMWare followed by XEN.

At this point of time only SuSE Enterprise is officially supported by Hyper-V, but that does not mean Redhat, Fedora etc wont work, it is just a matter of time that the support for other operating systems is added because there are surely kernel enhancements that have to be done to run multiple VM's with the Hyper-V technology and Microsoft's pet Linux company is SuSE gives them a heads up for the Hyper-V support. There is supposed to be done a lot of emulation to the hardware interrupts which is will take more time to support other operating systems and with the recent

Microsoft said Hyper-V beta for Windows Server 2008 is feature complete. Included in the list of operating systems supported are Windows Server 2003 SP2, Novell SUSE Linux Enterprise Server 10 SP1, Windows Vista SP1 (x86), and Windows XP SP3 (x86).

So Microsoft's Hyper-V technology is not yet a disaster that companies cannot lookup to using and the support for other Linux operating systems is surely on the way.

Microsoft's Hyper-V support for linux not a disaster yet

Windows 2008 Hyper-V is th next generation based server virtualization technology that makes the best use of your high end hardware by adding multiple server roles as separate virtual machine or in simple terms you will be running multiple operating systems in parallel on the same hardware, one of the biggest player in virtualization technology is VMWare followed by XEN.

At this point of time only SuSE Enterprise is officially supported by Hyper-V, but that does not mean Redhat, Fedora etc wont work, it is just a matter of time that the support for other operating systems is added because there are surely kernel enhancements that have to be done to run multiple VM's with the Hyper-V technology and Microsoft's pet Linux company is SuSE gives them a heads up for the Hyper-V support. There is supposed to be done a lot of emulation to the hardware interrupts which is will take more time to support other operating systems and with the recent

Microsoft said Hyper-V beta for Windows Server 2008 is feature complete. Included in the list of operating systems supported are Windows Server 2003 SP2, Novell SUSE Linux Enterprise Server 10 SP1, Windows Vista SP1 (x86), and Windows XP SP3 (x86).

So Microsoft's Hyper-V technology is not yet a disaster that companies cannot lookup to using and the support for other Linux operating systems is surely on the way.

Microsoft's Hyper-V support for linux not a disaster yet

Windows 2008 Hyper-V is th next generation based server virtualization technology that makes the best use of your high end hardware by adding multiple server roles as separate virtual machine or in simple terms you will be running multiple operating systems in parallel on the same hardware, one of the biggest player in virtualization technology is VMWare followed by XEN.

At this point of time only SuSE Enterprise is officially supported by Hyper-V, but that does not mean Redhat, Fedora etc wont work, it is just a matter of time that the support for other operating systems is added because there are surely kernel enhancements that have to be done to run multiple VM's with the Hyper-V technology and Microsoft's pet Linux company is SuSE gives them a heads up for the Hyper-V support. There is supposed to be done a lot of emulation to the hardware interrupts which is will take more time to support other operating systems and with the recent

Microsoft said Hyper-V beta for Windows Server 2008 is feature complete. Included in the list of operating systems supported are Windows Server 2003 SP2, Novell SUSE Linux Enterprise Server 10 SP1, Windows Vista SP1 (x86), and Windows XP SP3 (x86).

So Microsoft's Hyper-V technology is not yet a disaster that companies cannot lookup to using and the support for other Linux operating systems is surely on the way.

Microsoft's Hyper-V support for linux not a disaster yet

Windows 2008 Hyper-V is th next generation based server virtualization technology that makes the best use of your high end hardware by adding multiple server roles as separate virtual machine or in simple terms you will be running multiple operating systems in parallel on the same hardware, one of the biggest player in virtualization technology is VMWare followed by XEN.

At this point of time only SuSE Enterprise is officially supported by Hyper-V, but that does not mean Redhat, Fedora etc wont work, it is just a matter of time that the support for other operating systems is added because there are surely kernel enhancements that have to be done to run multiple VM's with the Hyper-V technology and Microsoft's pet Linux company is SuSE gives them a heads up for the Hyper-V support. There is supposed to be done a lot of emulation to the hardware interrupts which is will take more time to support other operating systems and with the recent

Microsoft said Hyper-V beta for Windows Server 2008 is feature complete. Included in the list of operating systems supported are Windows Server 2003 SP2, Novell SUSE Linux Enterprise Server 10 SP1, Windows Vista SP1 (x86), and Windows XP SP3 (x86).

So Microsoft's Hyper-V technology is not yet a disaster that companies cannot lookup to using and the support for other Linux operating systems is surely on the way.

Microsoft's Hyper-V support for linux not a disaster yet

Windows 2008 Hyper-V is th next generation based server virtualization technology that makes the best use of your high end hardware by adding multiple server roles as separate virtual machine or in simple terms you will be running multiple operating systems in parallel on the same hardware, one of the biggest player in virtualization technology is VMWare followed by XEN.

At this point of time only SuSE Enterprise is officially supported by Hyper-V, but that does not mean Redhat, Fedora etc wont work, it is just a matter of time that the support for other operating systems is added because there are surely kernel enhancements that have to be done to run multiple VM's with the Hyper-V technology and Microsoft's pet Linux company is SuSE gives them a heads up for the Hyper-V support. There is supposed to be done a lot of emulation to the hardware interrupts which is will take more time to support other operating systems and with the recent

Microsoft said Hyper-V beta for Windows Server 2008 is feature complete. Included in the list of operating systems supported are Windows Server 2003 SP2, Novell SUSE Linux Enterprise Server 10 SP1, Windows Vista SP1 (x86), and Windows XP SP3 (x86).

So Microsoft's Hyper-V technology is not yet a disaster that companies cannot lookup to using and the support for other Linux operating systems is surely on the way.

Microsoft's Hyper-V support for linux not a disaster yet

Windows 2008 Hyper-V is th next generation based server virtualization technology that makes the best use of your high end hardware by adding multiple server roles as separate virtual machine or in simple terms you will be running multiple operating systems in parallel on the same hardware, one of the biggest player in virtualization technology is VMWare followed by XEN.

At this point of time only SuSE Enterprise is officially supported by Hyper-V, but that does not mean Redhat, Fedora etc wont work, it is just a matter of time that the support for other operating systems is added because there are surely kernel enhancements that have to be done to run multiple VM's with the Hyper-V technology and Microsoft's pet Linux company is SuSE gives them a heads up for the Hyper-V support. There is supposed to be done a lot of emulation to the hardware interrupts which is will take more time to support other operating systems and with the recent

Microsoft said Hyper-V beta for Windows Server 2008 is feature complete. Included in the list of operating systems supported are Windows Server 2003 SP2, Novell SUSE Linux Enterprise Server 10 SP1, Windows Vista SP1 (x86), and Windows XP SP3 (x86).

So Microsoft's Hyper-V technology is not yet a disaster that companies cannot lookup to using and the support for other Linux operating systems is surely on the way.

Microsoft's Hyper-V support for linux not a disaster yet

Windows 2008 Hyper-V is th next generation based server virtualization technology that makes the best use of your high end hardware by adding multiple server roles as separate virtual machine or in simple terms you will be running multiple operating systems in parallel on the same hardware, one of the biggest player in virtualization technology is VMWare followed by XEN.

At this point of time only SuSE Enterprise is officially supported by Hyper-V, but that does not mean Redhat, Fedora etc wont work, it is just a matter of time that the support for other operating systems is added because there are surely kernel enhancements that have to be done to run multiple VM's with the Hyper-V technology and Microsoft's pet Linux company is SuSE gives them a heads up for the Hyper-V support. There is supposed to be done a lot of emulation to the hardware interrupts which is will take more time to support other operating systems and with the recent

Microsoft said Hyper-V beta for Windows Server 2008 is feature complete. Included in the list of operating systems supported are Windows Server 2003 SP2, Novell SUSE Linux Enterprise Server 10 SP1, Windows Vista SP1 (x86), and Windows XP SP3 (x86).

So Microsoft's Hyper-V technology is not yet a disaster that companies cannot lookup to using and the support for other Linux operating systems is surely on the way.

Microsoft's Hyper-V support for linux not a disaster yet

Windows 2008 Hyper-V is th next generation based server virtualization technology that makes the best use of your high end hardware by adding multiple server roles as separate virtual machine or in simple terms you will be running multiple operating systems in parallel on the same hardware, one of the biggest player in virtualization technology is VMWare followed by XEN.

At this point of time only SuSE Enterprise is officially supported by Hyper-V, but that does not mean Redhat, Fedora etc wont work, it is just a matter of time that the support for other operating systems is added because there are surely kernel enhancements that have to be done to run multiple VM's with the Hyper-V technology and Microsoft's pet Linux company is SuSE gives them a heads up for the Hyper-V support. There is supposed to be done a lot of emulation to the hardware interrupts which is will take more time to support other operating systems and with the recent

Microsoft said Hyper-V beta for Windows Server 2008 is feature complete. Included in the list of operating systems supported are Windows Server 2003 SP2, Novell SUSE Linux Enterprise Server 10 SP1, Windows Vista SP1 (x86), and Windows XP SP3 (x86).

So Microsoft's Hyper-V technology is not yet a disaster that companies cannot lookup to using and the support for other Linux operating systems is surely on the way.

Javascript Malware

The web is not a safe place and we all know it, Malware, Rootkits, Trojans dominate the internet, The recent attack on more than 10,000 website with javascript malware was in news for all the wrong reasons. The source code for the JavaScript is now availiable publicly and you can the Javascript Malware here.



The Code is not much of use because it looks just like a wrapper around the real thing, Lets keep an eye to get the real thing. This code can still give good insights on how things were done



-Abhiz

Javascript Malware

The web is not a safe place and we all know it, Malware, Rootkits, Trojans dominate the internet, The recent attack on more than 10,000 website with javascript malware was in news for all the wrong reasons. The source code for the JavaScript is now availiable publicly and you can the Javascript Malware here.



The Code is not much of use because it looks just like a wrapper around the real thing, Lets keep an eye to get the real thing. This code can still give good insights on how things were done



-Abhiz

Javascript Malware

The web is not a safe place and we all know it, Malware, Rootkits, Trojans dominate the internet, The recent attack on more than 10,000 website with javascript malware was in news for all the wrong reasons. The source code for the JavaScript is now availiable publicly and you can the Javascript Malware here.



The Code is not much of use because it looks just like a wrapper around the real thing, Lets keep an eye to get the real thing. This code can still give good insights on how things were done



-Abhiz

Javascript Malware

The web is not a safe place and we all know it, Malware, Rootkits, Trojans dominate the internet, The recent attack on more than 10,000 website with javascript malware was in news for all the wrong reasons. The source code for the JavaScript is now availiable publicly and you can the Javascript Malware here.



The Code is not much of use because it looks just like a wrapper around the real thing, Lets keep an eye to get the real thing. This code can still give good insights on how things were done



-Abhiz

Javascript Malware

The web is not a safe place and we all know it, Malware, Rootkits, Trojans dominate the internet, The recent attack on more than 10,000 website with javascript malware was in news for all the wrong reasons. The source code for the JavaScript is now availiable publicly and you can the Javascript Malware here.



The Code is not much of use because it looks just like a wrapper around the real thing, Lets keep an eye to get the real thing. This code can still give good insights on how things were done



-Abhiz

Javascript Malware

The web is not a safe place and we all know it, Malware, Rootkits, Trojans dominate the internet, The recent attack on more than 10,000 website with javascript malware was in news for all the wrong reasons. The source code for the JavaScript is now availiable publicly and you can the Javascript Malware here.



The Code is not much of use because it looks just like a wrapper around the real thing, Lets keep an eye to get the real thing. This code can still give good insights on how things were done



-Abhiz

Javascript Malware

The web is not a safe place and we all know it, Malware, Rootkits, Trojans dominate the internet, The recent attack on more than 10,000 website with javascript malware was in news for all the wrong reasons. The source code for the JavaScript is now availiable publicly and you can the Javascript Malware here.



The Code is not much of use because it looks just like a wrapper around the real thing, Lets keep an eye to get the real thing. This code can still give good insights on how things were done



-Abhiz

Javascript Malware

The web is not a safe place and we all know it, Malware, Rootkits, Trojans dominate the internet, The recent attack on more than 10,000 website with javascript malware was in news for all the wrong reasons. The source code for the JavaScript is now availiable publicly and you can the Javascript Malware here.



The Code is not much of use because it looks just like a wrapper around the real thing, Lets keep an eye to get the real thing. This code can still give good insights on how things were done



-Abhiz

Javascript Malware

The web is not a safe place and we all know it, Malware, Rootkits, Trojans dominate the internet, The recent attack on more than 10,000 website with javascript malware was in news for all the wrong reasons. The source code for the JavaScript is now availiable publicly and you can the Javascript Malware here.



The Code is not much of use because it looks just like a wrapper around the real thing, Lets keep an eye to get the real thing. This code can still give good insights on how things were done



-Abhiz

Javascript Malware

The web is not a safe place and we all know it, Malware, Rootkits, Trojans dominate the internet, The recent attack on more than 10,000 website with javascript malware was in news for all the wrong reasons. The source code for the JavaScript is now availiable publicly and you can the Javascript Malware here.



The Code is not much of use because it looks just like a wrapper around the real thing, Lets keep an eye to get the real thing. This code can still give good insights on how things were done



-Abhiz

Monitor file changes on shares and folders - Alert File Change

File Alert Monitor is a cool windows application, used to generate alerts about the creation, update or deletion of files in specified folder. File Alert Monitor monitor's specified directories on a local or networked PC (shared drive) and will display a pop-up Window or optionally play an audio alert, whenever action is taken on files in the specified folders.

I had written a PowerShell script to make alert me of file changes being done on some sensitive folders, but this application makes things easier for everyone.

Download

-Abhiz

Monitor file changes on shares and folders - Alert File Change

File Alert Monitor is a cool windows application, used to generate alerts about the creation, update or deletion of files in specified folder. File Alert Monitor monitor's specified directories on a local or networked PC (shared drive) and will display a pop-up Window or optionally play an audio alert, whenever action is taken on files in the specified folders.

I had written a PowerShell script to make alert me of file changes being done on some sensitive folders, but this application makes things easier for everyone.

Download

-Abhiz

Monitor file changes on shares and folders - Alert File Change

File Alert Monitor is a cool windows application, used to generate alerts about the creation, update or deletion of files in specified folder. File Alert Monitor monitor's specified directories on a local or networked PC (shared drive) and will display a pop-up Window or optionally play an audio alert, whenever action is taken on files in the specified folders.

I had written a PowerShell script to make alert me of file changes being done on some sensitive folders, but this application makes things easier for everyone.

Download

-Abhiz

Monitor file changes on shares and folders - Alert File Change

File Alert Monitor is a cool windows application, used to generate alerts about the creation, update or deletion of files in specified folder. File Alert Monitor monitor's specified directories on a local or networked PC (shared drive) and will display a pop-up Window or optionally play an audio alert, whenever action is taken on files in the specified folders.

I had written a PowerShell script to make alert me of file changes being done on some sensitive folders, but this application makes things easier for everyone.

Download

-Abhiz

Monitor file changes on shares and folders - Alert File Change

File Alert Monitor is a cool windows application, used to generate alerts about the creation, update or deletion of files in specified folder. File Alert Monitor monitor's specified directories on a local or networked PC (shared drive) and will display a pop-up Window or optionally play an audio alert, whenever action is taken on files in the specified folders.

I had written a PowerShell script to make alert me of file changes being done on some sensitive folders, but this application makes things easier for everyone.

Download

-Abhiz

Monitor file changes on shares and folders - Alert File Change

File Alert Monitor is a cool windows application, used to generate alerts about the creation, update or deletion of files in specified folder. File Alert Monitor monitor's specified directories on a local or networked PC (shared drive) and will display a pop-up Window or optionally play an audio alert, whenever action is taken on files in the specified folders.

I had written a PowerShell script to make alert me of file changes being done on some sensitive folders, but this application makes things easier for everyone.

Download

-Abhiz

Monitor file changes on shares and folders - Alert File Change

File Alert Monitor is a cool windows application, used to generate alerts about the creation, update or deletion of files in specified folder. File Alert Monitor monitor's specified directories on a local or networked PC (shared drive) and will display a pop-up Window or optionally play an audio alert, whenever action is taken on files in the specified folders.

I had written a PowerShell script to make alert me of file changes being done on some sensitive folders, but this application makes things easier for everyone.

Download

-Abhiz

Monitor file changes on shares and folders - Alert File Change

File Alert Monitor is a cool windows application, used to generate alerts about the creation, update or deletion of files in specified folder. File Alert Monitor monitor's specified directories on a local or networked PC (shared drive) and will display a pop-up Window or optionally play an audio alert, whenever action is taken on files in the specified folders.

I had written a PowerShell script to make alert me of file changes being done on some sensitive folders, but this application makes things easier for everyone.

Download

-Abhiz

Monitor file changes on shares and folders - Alert File Change

File Alert Monitor is a cool windows application, used to generate alerts about the creation, update or deletion of files in specified folder. File Alert Monitor monitor's specified directories on a local or networked PC (shared drive) and will display a pop-up Window or optionally play an audio alert, whenever action is taken on files in the specified folders.

I had written a PowerShell script to make alert me of file changes being done on some sensitive folders, but this application makes things easier for everyone.

Download

-Abhiz

Monitor file changes on shares and folders - Alert File Change

File Alert Monitor is a cool windows application, used to generate alerts about the creation, update or deletion of files in specified folder. File Alert Monitor monitor's specified directories on a local or networked PC (shared drive) and will display a pop-up Window or optionally play an audio alert, whenever action is taken on files in the specified folders.

I had written a PowerShell script to make alert me of file changes being done on some sensitive folders, but this application makes things easier for everyone.

Download

-Abhiz

Monitor file changes on shares and folders - Alert File Change

File Alert Monitor is a cool windows application, used to generate alerts about the creation, update or deletion of files in specified folder. File Alert Monitor monitor's specified directories on a local or networked PC (shared drive) and will display a pop-up Window or optionally play an audio alert, whenever action is taken on files in the specified folders.

I had written a PowerShell script to make alert me of file changes being done on some sensitive folders, but this application makes things easier for everyone.

Download

-Abhiz

Monitor file changes on shares and folders - Alert File Change

File Alert Monitor is a cool windows application, used to generate alerts about the creation, update or deletion of files in specified folder. File Alert Monitor monitor's specified directories on a local or networked PC (shared drive) and will display a pop-up Window or optionally play an audio alert, whenever action is taken on files in the specified folders.

I had written a PowerShell script to make alert me of file changes being done on some sensitive folders, but this application makes things easier for everyone.

Download

-Abhiz

Monitor file changes on shares and folders - Alert File Change

File Alert Monitor is a cool windows application, used to generate alerts about the creation, update or deletion of files in specified folder. File Alert Monitor monitor's specified directories on a local or networked PC (shared drive) and will display a pop-up Window or optionally play an audio alert, whenever action is taken on files in the specified folders.

I had written a PowerShell script to make alert me of file changes being done on some sensitive folders, but this application makes things easier for everyone.

Download

-Abhiz

Monitor file changes on shares and folders - Alert File Change

File Alert Monitor is a cool windows application, used to generate alerts about the creation, update or deletion of files in specified folder. File Alert Monitor monitor's specified directories on a local or networked PC (shared drive) and will display a pop-up Window or optionally play an audio alert, whenever action is taken on files in the specified folders.

I had written a PowerShell script to make alert me of file changes being done on some sensitive folders, but this application makes things easier for everyone.

Download

-Abhiz

Monitor file changes on shares and folders - Alert File Change

File Alert Monitor is a cool windows application, used to generate alerts about the creation, update or deletion of files in specified folder. File Alert Monitor monitor's specified directories on a local or networked PC (shared drive) and will display a pop-up Window or optionally play an audio alert, whenever action is taken on files in the specified folders.

I had written a PowerShell script to make alert me of file changes being done on some sensitive folders, but this application makes things easier for everyone.

Download

-Abhiz

Monitor file changes on shares and folders - Alert File Change

File Alert Monitor is a cool windows application, used to generate alerts about the creation, update or deletion of files in specified folder. File Alert Monitor monitor's specified directories on a local or networked PC (shared drive) and will display a pop-up Window or optionally play an audio alert, whenever action is taken on files in the specified folders.

I had written a PowerShell script to make alert me of file changes being done on some sensitive folders, but this application makes things easier for everyone.

Download

-Abhiz

Monitor file changes on shares and folders - Alert File Change

File Alert Monitor is a cool windows application, used to generate alerts about the creation, update or deletion of files in specified folder. File Alert Monitor monitor's specified directories on a local or networked PC (shared drive) and will display a pop-up Window or optionally play an audio alert, whenever action is taken on files in the specified folders.

I had written a PowerShell script to make alert me of file changes being done on some sensitive folders, but this application makes things easier for everyone.

Download

-Abhiz

Monitor file changes on shares and folders - Alert File Change

File Alert Monitor is a cool windows application, used to generate alerts about the creation, update or deletion of files in specified folder. File Alert Monitor monitor's specified directories on a local or networked PC (shared drive) and will display a pop-up Window or optionally play an audio alert, whenever action is taken on files in the specified folders.

I had written a PowerShell script to make alert me of file changes being done on some sensitive folders, but this application makes things easier for everyone.

Download

-Abhiz

Monitor file changes on shares and folders - Alert File Change

File Alert Monitor is a cool windows application, used to generate alerts about the creation, update or deletion of files in specified folder. File Alert Monitor monitor's specified directories on a local or networked PC (shared drive) and will display a pop-up Window or optionally play an audio alert, whenever action is taken on files in the specified folders.

I had written a PowerShell script to make alert me of file changes being done on some sensitive folders, but this application makes things easier for everyone.

Download

-Abhiz

Monitor file changes on shares and folders - Alert File Change

File Alert Monitor is a cool windows application, used to generate alerts about the creation, update or deletion of files in specified folder. File Alert Monitor monitor's specified directories on a local or networked PC (shared drive) and will display a pop-up Window or optionally play an audio alert, whenever action is taken on files in the specified folders.

I had written a PowerShell script to make alert me of file changes being done on some sensitive folders, but this application makes things easier for everyone.

Download

-Abhiz

Google Apps GMail - SPF setup Godaddy and eNOM

Google Apps email is one of the best thing to happen for the web, I myself use it and am quite happy but just as nothing is perfect there are technical glitches with google apps which are important for companies but not so urgent for google to implement, Like SPF, Sender ID, Domain Keys and DKIM.

Lets now setup SPF for your Google Apps hosted Email, According to Google Help, you are supposed to add this line into your text record "v=spf1 include:aspmx.googlemail.com ~all" but when you login to your registrar like GoDaddy it is so much confusing that you are not even able to go ahead and do something about it, I mean to say it just does not work.

So the best solution is to Follow these setups to setup SPF for your domain:

1. Login, and go to the “Total DNS Control Panel”
2. Under the TXT section, click “Add SPF Record”
3. Select “An ISP or other mail provider” and click OK
4. Select the “Outsourced” tab, and enter aspmx.googlemail.com as the outsourced domain
5. Click OK
6. GoDaddy will display a confirmation with the correct SPF record listed.
7. Click OK

GoDaddy will now check if your SPF entry is correct or not, once everything is tested it will show the new entry and it should like this "v=spf1 include:aspmx.googlemail.com ~all"

Once it is done select Ok and wait for a few hours for your DNS entry to get propagated, now test your SPF record by sending an email to the email address generated by http://senderid.espcoalition.org

If everything worked well your report will show a tick mark for SPF

Setup of Sender ID, Domain Keys and DKIM will soon follow


-Abhiz

Google Apps GMail - SPF setup Godaddy and eNOM

Google Apps email is one of the best thing to happen for the web, I myself use it and am quite happy but just as nothing is perfect there are technical glitches with google apps which are important for companies but not so urgent for google to implement, Like SPF, Sender ID, Domain Keys and DKIM.

Lets now setup SPF for your Google Apps hosted Email, According to Google Help, you are supposed to add this line into your text record "v=spf1 include:aspmx.googlemail.com ~all" but when you login to your registrar like GoDaddy it is so much confusing that you are not even able to go ahead and do something about it, I mean to say it just does not work.

So the best solution is to Follow these setups to setup SPF for your domain:

1. Login, and go to the “Total DNS Control Panel”
2. Under the TXT section, click “Add SPF Record”
3. Select “An ISP or other mail provider” and click OK
4. Select the “Outsourced” tab, and enter aspmx.googlemail.com as the outsourced domain
5. Click OK
6. GoDaddy will display a confirmation with the correct SPF record listed.
7. Click OK

GoDaddy will now check if your SPF entry is correct or not, once everything is tested it will show the new entry and it should like this "v=spf1 include:aspmx.googlemail.com ~all"

Once it is done select Ok and wait for a few hours for your DNS entry to get propagated, now test your SPF record by sending an email to the email address generated by http://senderid.espcoalition.org

If everything worked well your report will show a tick mark for SPF

Setup of Sender ID, Domain Keys and DKIM will soon follow


-Abhiz

Google Apps GMail - SPF setup Godaddy and eNOM

Google Apps email is one of the best thing to happen for the web, I myself use it and am quite happy but just as nothing is perfect there are technical glitches with google apps which are important for companies but not so urgent for google to implement, Like SPF, Sender ID, Domain Keys and DKIM.

Lets now setup SPF for your Google Apps hosted Email, According to Google Help, you are supposed to add this line into your text record "v=spf1 include:aspmx.googlemail.com ~all" but when you login to your registrar like GoDaddy it is so much confusing that you are not even able to go ahead and do something about it, I mean to say it just does not work.

So the best solution is to Follow these setups to setup SPF for your domain:

1. Login, and go to the “Total DNS Control Panel”
2. Under the TXT section, click “Add SPF Record”
3. Select “An ISP or other mail provider” and click OK
4. Select the “Outsourced” tab, and enter aspmx.googlemail.com as the outsourced domain
5. Click OK
6. GoDaddy will display a confirmation with the correct SPF record listed.
7. Click OK

GoDaddy will now check if your SPF entry is correct or not, once everything is tested it will show the new entry and it should like this "v=spf1 include:aspmx.googlemail.com ~all"

Once it is done select Ok and wait for a few hours for your DNS entry to get propagated, now test your SPF record by sending an email to the email address generated by http://senderid.espcoalition.org

If everything worked well your report will show a tick mark for SPF

Setup of Sender ID, Domain Keys and DKIM will soon follow


-Abhiz

Google Apps GMail - SPF setup Godaddy and eNOM

Google Apps email is one of the best thing to happen for the web, I myself use it and am quite happy but just as nothing is perfect there are technical glitches with google apps which are important for companies but not so urgent for google to implement, Like SPF, Sender ID, Domain Keys and DKIM.

Lets now setup SPF for your Google Apps hosted Email, According to Google Help, you are supposed to add this line into your text record "v=spf1 include:aspmx.googlemail.com ~all" but when you login to your registrar like GoDaddy it is so much confusing that you are not even able to go ahead and do something about it, I mean to say it just does not work.

So the best solution is to Follow these setups to setup SPF for your domain:

1. Login, and go to the “Total DNS Control Panel”
2. Under the TXT section, click “Add SPF Record”
3. Select “An ISP or other mail provider” and click OK
4. Select the “Outsourced” tab, and enter aspmx.googlemail.com as the outsourced domain
5. Click OK
6. GoDaddy will display a confirmation with the correct SPF record listed.
7. Click OK

GoDaddy will now check if your SPF entry is correct or not, once everything is tested it will show the new entry and it should like this "v=spf1 include:aspmx.googlemail.com ~all"

Once it is done select Ok and wait for a few hours for your DNS entry to get propagated, now test your SPF record by sending an email to the email address generated by http://senderid.espcoalition.org

If everything worked well your report will show a tick mark for SPF

Setup of Sender ID, Domain Keys and DKIM will soon follow


-Abhiz

Google Apps GMail - SPF setup Godaddy and eNOM

Google Apps email is one of the best thing to happen for the web, I myself use it and am quite happy but just as nothing is perfect there are technical glitches with google apps which are important for companies but not so urgent for google to implement, Like SPF, Sender ID, Domain Keys and DKIM.

Lets now setup SPF for your Google Apps hosted Email, According to Google Help, you are supposed to add this line into your text record "v=spf1 include:aspmx.googlemail.com ~all" but when you login to your registrar like GoDaddy it is so much confusing that you are not even able to go ahead and do something about it, I mean to say it just does not work.

So the best solution is to Follow these setups to setup SPF for your domain:

1. Login, and go to the “Total DNS Control Panel”
2. Under the TXT section, click “Add SPF Record”
3. Select “An ISP or other mail provider” and click OK
4. Select the “Outsourced” tab, and enter aspmx.googlemail.com as the outsourced domain
5. Click OK
6. GoDaddy will display a confirmation with the correct SPF record listed.
7. Click OK

GoDaddy will now check if your SPF entry is correct or not, once everything is tested it will show the new entry and it should like this "v=spf1 include:aspmx.googlemail.com ~all"

Once it is done select Ok and wait for a few hours for your DNS entry to get propagated, now test your SPF record by sending an email to the email address generated by http://senderid.espcoalition.org

If everything worked well your report will show a tick mark for SPF

Setup of Sender ID, Domain Keys and DKIM will soon follow


-Abhiz

Google Apps GMail - SPF setup Godaddy and eNOM

Google Apps email is one of the best thing to happen for the web, I myself use it and am quite happy but just as nothing is perfect there are technical glitches with google apps which are important for companies but not so urgent for google to implement, Like SPF, Sender ID, Domain Keys and DKIM.

Lets now setup SPF for your Google Apps hosted Email, According to Google Help, you are supposed to add this line into your text record "v=spf1 include:aspmx.googlemail.com ~all" but when you login to your registrar like GoDaddy it is so much confusing that you are not even able to go ahead and do something about it, I mean to say it just does not work.

So the best solution is to Follow these setups to setup SPF for your domain:

1. Login, and go to the “Total DNS Control Panel”
2. Under the TXT section, click “Add SPF Record”
3. Select “An ISP or other mail provider” and click OK
4. Select the “Outsourced” tab, and enter aspmx.googlemail.com as the outsourced domain
5. Click OK
6. GoDaddy will display a confirmation with the correct SPF record listed.
7. Click OK

GoDaddy will now check if your SPF entry is correct or not, once everything is tested it will show the new entry and it should like this "v=spf1 include:aspmx.googlemail.com ~all"

Once it is done select Ok and wait for a few hours for your DNS entry to get propagated, now test your SPF record by sending an email to the email address generated by http://senderid.espcoalition.org

If everything worked well your report will show a tick mark for SPF

Setup of Sender ID, Domain Keys and DKIM will soon follow


-Abhiz

Google Apps GMail - SPF setup Godaddy and eNOM

Google Apps email is one of the best thing to happen for the web, I myself use it and am quite happy but just as nothing is perfect there are technical glitches with google apps which are important for companies but not so urgent for google to implement, Like SPF, Sender ID, Domain Keys and DKIM.

Lets now setup SPF for your Google Apps hosted Email, According to Google Help, you are supposed to add this line into your text record "v=spf1 include:aspmx.googlemail.com ~all" but when you login to your registrar like GoDaddy it is so much confusing that you are not even able to go ahead and do something about it, I mean to say it just does not work.

So the best solution is to Follow these setups to setup SPF for your domain:

1. Login, and go to the “Total DNS Control Panel”
2. Under the TXT section, click “Add SPF Record”
3. Select “An ISP or other mail provider” and click OK
4. Select the “Outsourced” tab, and enter aspmx.googlemail.com as the outsourced domain
5. Click OK
6. GoDaddy will display a confirmation with the correct SPF record listed.
7. Click OK

GoDaddy will now check if your SPF entry is correct or not, once everything is tested it will show the new entry and it should like this "v=spf1 include:aspmx.googlemail.com ~all"

Once it is done select Ok and wait for a few hours for your DNS entry to get propagated, now test your SPF record by sending an email to the email address generated by http://senderid.espcoalition.org

If everything worked well your report will show a tick mark for SPF

Setup of Sender ID, Domain Keys and DKIM will soon follow


-Abhiz

Google Apps GMail - SPF setup Godaddy and eNOM

Google Apps email is one of the best thing to happen for the web, I myself use it and am quite happy but just as nothing is perfect there are technical glitches with google apps which are important for companies but not so urgent for google to implement, Like SPF, Sender ID, Domain Keys and DKIM.

Lets now setup SPF for your Google Apps hosted Email, According to Google Help, you are supposed to add this line into your text record "v=spf1 include:aspmx.googlemail.com ~all" but when you login to your registrar like GoDaddy it is so much confusing that you are not even able to go ahead and do something about it, I mean to say it just does not work.

So the best solution is to Follow these setups to setup SPF for your domain:

1. Login, and go to the “Total DNS Control Panel”
2. Under the TXT section, click “Add SPF Record”
3. Select “An ISP or other mail provider” and click OK
4. Select the “Outsourced” tab, and enter aspmx.googlemail.com as the outsourced domain
5. Click OK
6. GoDaddy will display a confirmation with the correct SPF record listed.
7. Click OK

GoDaddy will now check if your SPF entry is correct or not, once everything is tested it will show the new entry and it should like this "v=spf1 include:aspmx.googlemail.com ~all"

Once it is done select Ok and wait for a few hours for your DNS entry to get propagated, now test your SPF record by sending an email to the email address generated by http://senderid.espcoalition.org

If everything worked well your report will show a tick mark for SPF

Setup of Sender ID, Domain Keys and DKIM will soon follow


-Abhiz

Google Apps GMail - SPF setup Godaddy and eNOM

Google Apps email is one of the best thing to happen for the web, I myself use it and am quite happy but just as nothing is perfect there are technical glitches with google apps which are important for companies but not so urgent for google to implement, Like SPF, Sender ID, Domain Keys and DKIM.

Lets now setup SPF for your Google Apps hosted Email, According to Google Help, you are supposed to add this line into your text record "v=spf1 include:aspmx.googlemail.com ~all" but when you login to your registrar like GoDaddy it is so much confusing that you are not even able to go ahead and do something about it, I mean to say it just does not work.

So the best solution is to Follow these setups to setup SPF for your domain:

1. Login, and go to the “Total DNS Control Panel”
2. Under the TXT section, click “Add SPF Record”
3. Select “An ISP or other mail provider” and click OK
4. Select the “Outsourced” tab, and enter aspmx.googlemail.com as the outsourced domain
5. Click OK
6. GoDaddy will display a confirmation with the correct SPF record listed.
7. Click OK

GoDaddy will now check if your SPF entry is correct or not, once everything is tested it will show the new entry and it should like this "v=spf1 include:aspmx.googlemail.com ~all"

Once it is done select Ok and wait for a few hours for your DNS entry to get propagated, now test your SPF record by sending an email to the email address generated by http://senderid.espcoalition.org

If everything worked well your report will show a tick mark for SPF

Setup of Sender ID, Domain Keys and DKIM will soon follow


-Abhiz

Google Apps GMail - SPF setup Godaddy and eNOM

Google Apps email is one of the best thing to happen for the web, I myself use it and am quite happy but just as nothing is perfect there are technical glitches with google apps which are important for companies but not so urgent for google to implement, Like SPF, Sender ID, Domain Keys and DKIM.

Lets now setup SPF for your Google Apps hosted Email, According to Google Help, you are supposed to add this line into your text record "v=spf1 include:aspmx.googlemail.com ~all" but when you login to your registrar like GoDaddy it is so much confusing that you are not even able to go ahead and do something about it, I mean to say it just does not work.

So the best solution is to Follow these setups to setup SPF for your domain:

1. Login, and go to the “Total DNS Control Panel”
2. Under the TXT section, click “Add SPF Record”
3. Select “An ISP or other mail provider” and click OK
4. Select the “Outsourced” tab, and enter aspmx.googlemail.com as the outsourced domain
5. Click OK
6. GoDaddy will display a confirmation with the correct SPF record listed.
7. Click OK

GoDaddy will now check if your SPF entry is correct or not, once everything is tested it will show the new entry and it should like this "v=spf1 include:aspmx.googlemail.com ~all"

Once it is done select Ok and wait for a few hours for your DNS entry to get propagated, now test your SPF record by sending an email to the email address generated by http://senderid.espcoalition.org

If everything worked well your report will show a tick mark for SPF

Setup of Sender ID, Domain Keys and DKIM will soon follow


-Abhiz

Tuesday, March 18, 2008

My Proverb

"There is no match for natural stupidity"

-Abhiz

My Proverb

"There is no match for natural stupidity"

-Abhiz

My Proverb

"There is no match for natural stupidity"

-Abhiz

My Proverb

"There is no match for natural stupidity"

-Abhiz

My Proverb

"There is no match for natural stupidity"

-Abhiz

My Proverb

"There is no match for natural stupidity"

-Abhiz

My Proverb

"There is no match for natural stupidity"

-Abhiz

My Proverb

"There is no match for natural stupidity"

-Abhiz

My Proverb

"There is no match for natural stupidity"

-Abhiz

My Proverb

"There is no match for natural stupidity"

-Abhiz
Tenable Network Security is proud to announce the availability of Nessus 3.2.0, as well as NessusClient 3.2.0. Nessus 3.2.0 is a major release, containing several changes from Nessus 3.0.x :

New Features

Support for IPv6 targets (for the Linux, FreeBSD, Solaris and Mac OS X flavors)
Support for limiting the number of active TCP sessions in parallel (per host, per scan, per scanner)
A new nessuscmd tool that lets one run quick scans from the command-line
A new nessus-update tool that lets one update the Nessus engine from the command-line (on select platforms)
The Nessus daemon can now detect hosts which are being turned off during the scan and stop scanning them
The Nessus daemon can now detect when the network is congested and change the TCP settings appropriately
Nessus user account access control rules are now more granular and can be used to prevent the scanner from connecting to certain ports or to use certain plugins
The nessus command-line tool can read and write to and from a .nessus file
Improved WMI support (see http://cgi.tenablesecurity.com/tenable/WMI.html)

Nessus 3.2.0 can be obtained at http://www.nessus.org

Documentation http://www.nessus.org/documentation


-Abhiz
Tenable Network Security is proud to announce the availability of Nessus 3.2.0, as well as NessusClient 3.2.0. Nessus 3.2.0 is a major release, containing several changes from Nessus 3.0.x :

New Features

Support for IPv6 targets (for the Linux, FreeBSD, Solaris and Mac OS X flavors)
Support for limiting the number of active TCP sessions in parallel (per host, per scan, per scanner)
A new nessuscmd tool that lets one run quick scans from the command-line
A new nessus-update tool that lets one update the Nessus engine from the command-line (on select platforms)
The Nessus daemon can now detect hosts which are being turned off during the scan and stop scanning them
The Nessus daemon can now detect when the network is congested and change the TCP settings appropriately
Nessus user account access control rules are now more granular and can be used to prevent the scanner from connecting to certain ports or to use certain plugins
The nessus command-line tool can read and write to and from a .nessus file
Improved WMI support (see http://cgi.tenablesecurity.com/tenable/WMI.html)

Nessus 3.2.0 can be obtained at http://www.nessus.org

Documentation http://www.nessus.org/documentation


-Abhiz
Tenable Network Security is proud to announce the availability of Nessus 3.2.0, as well as NessusClient 3.2.0. Nessus 3.2.0 is a major release, containing several changes from Nessus 3.0.x :

New Features

Support for IPv6 targets (for the Linux, FreeBSD, Solaris and Mac OS X flavors)
Support for limiting the number of active TCP sessions in parallel (per host, per scan, per scanner)
A new nessuscmd tool that lets one run quick scans from the command-line
A new nessus-update tool that lets one update the Nessus engine from the command-line (on select platforms)
The Nessus daemon can now detect hosts which are being turned off during the scan and stop scanning them
The Nessus daemon can now detect when the network is congested and change the TCP settings appropriately
Nessus user account access control rules are now more granular and can be used to prevent the scanner from connecting to certain ports or to use certain plugins
The nessus command-line tool can read and write to and from a .nessus file
Improved WMI support (see http://cgi.tenablesecurity.com/tenable/WMI.html)

Nessus 3.2.0 can be obtained at http://www.nessus.org

Documentation http://www.nessus.org/documentation


-Abhiz