http://www.01net.com/editorial/274752/droit/la-justice-interdit-de-proteger-les-dvd-contre-la-copie/ (français) it is the right of every consumer to transfer the copie he bought to another media (vhs for example) or to make a backup for his own use note the same is right for vhs because in my DVD-R i can't copy my old bought VHS to a DVD (so they can't sell me the 'better' dvd version again)
The trendmicro update that wanted to kill all rbots viruses running around (some 9000 versions) with one heuristic code analysis took all the cpu power of the servers, machines and the network afterwards. - http://isc.sans.org/diary.php?date=2005-04-25 - and a Japanse railnetwork had also serious problems - http://www.japantimes.com/cgi-bin/getarticle.pl5?nn20050424a2.htm - firstly, it took more than 4 hours to correct the bug and secondly, did TM do enough testing before releasing the upgrade. Anyone with network knowledge knows that the bigger the mass of information to scan, the bigger your scanning machine should be (as is the case with logs, the more you log, the faster your machine can be clogged by all those logs) and thirdly ( lesson we also learned) place your protection installations seperately so that if their is a problem you can follow the datastreams and see where they pass and where they end (do not set a proxy before an antivirus before an IDS etc....) I know some firms are selling heuristic antimalware appliances, but i think those are only helpful for normal networks to be hired to help clean up a totally infected environment, not to permanently protect a network.
a dns server holds information about which domain has which ip address and to fasten things up they keep a cache which is refreshed every so many minutes, hours or days (Time To Live). It now seems that several ISP's has put that TTL too high to keep their resources under control. The problem is that if a cache is poisioned or there is a domainname hacking (in which someone transfers illegally a domainname ex. apple.com to his own IP Address on which he is hosting a porn, game, phishing or malware server until it is discovered and changed back by the domainname seller) that bad information will stay longer online and can be spreaded through the internet again, as DNS servers refer to each others for updates. this article and discussion is long and technical and a bit chaotic, but quite interestingas anybody having a dns server nowadays should worry about its installations and security - http://ask.slashdot.org/article.pl?sid=05/04/18/198259&tid=95&tid=128&tid=4this is a good report about the media-silence around this kind of dns attacks- http://blogs.washingtonpost.com/securityfix/2005/04/radio_silence_o.html -
if a picture online has explicitly put code that looks like the picture is too great and you are running image-rendering applications on your machine, your machine may crash http://secunia.com/advisories/15064/ the advice is that if you surf, you desactivate all other applicationsand that you limit your rights to 'trusted user'you can also stay away from porn and cracksites and not open mail you don't know
http://www.zdnet.com.au/news/security/0,2000061744,39189489,00.htmIf you believe that it will be soon, you can go to the store and spend some serious money to protect your xml streamsnormal antivirus tools won't detect them or will have to be in too high security and stop everything else
A lack of commitment to testing by the Linux community may ultimately threaten the stability of the operating system, Linux kernel co-maintainer Andrew Morton has warnedhttp://www.zdnet.com.au/news/software/0,2000061733,39189221,00.htmthis isn't different from the bloggers world and it has always been like that on the net, as far as I remembereven for free things, people can't say thanks
You've heard of war driving and phishing but now there's yet another reason to wear a tin-foil hat every time you surf the net. "WiPhishing" (pronounced why phishing) involves covertly setting up a wireless enabled laptop or access point in order to get wireless-enabled laptops to associate with it as a prelude to hacking attacks.An estimated one in five access points use default SSIDs (such as linksys). By guessing the name of a network that target machines are normally configured to connect to a hacker could (at least in theory) gain access to data on a laptop or introduce malicious codehttp://www.theregister.co.uk/2005/04/20/wiphishing/