Title: Lockergnome's IT Professionals ~ December 21, 2004
Lockergnome
Lockergnome's IT Professionals ~ December 21, 2004   




Google Lockergnome

Click here to make a donation and get your name & link listed here!

Feedback  |  Contribute  |  Archives  |  Send to Friends  |  Subscription Options

It's a Video Game Invasion! - Have Joystick, will travel! For Action and Adventure, Classic and Retro, RPG, Sports, Strategy and Simulation - we'll provide you with the latest releases, tips, updates, and advice for the PC and console gaming world.

It's starting to taste a lot like Christmas! (Report)

Direct & Related Links  |  Send Link to Friends  |  Posted by Matt Hartley

Tell me, what do toys, overeating, and sitting around with family watching the kids tear into wrapping paper like it is going out of style, have to do with Christmas? The one holiday when gluttony, commercialism and all the other stuff that gives me warm fuzzies is accepted without question. Yes folks, Christmas is almost upon us and I for one hope that everyone gets what they want this year. As for myself, I am... [Continued]

^TOP^

Strange errors, anoying prompts, what gives? (Just Ask Matt!)

Direct & Related Links  |  Send Link to Friends  |  Posted by Matt Hartley

Welcome to Just Ask Matt! - The IT industry's answer to the help column, only slightly more medicated. Today, Sam writes: I am losing my mind and I need help. Matt, every time I start my computer, I keep getting 'checksum error' during the computer's startup. What the heck does this mean? And why can't they just tell me in plain English? If you can answer this, I will be forever in your debt. Thanks.... [Continued]

^TOP^

Certification Success - Understanding Network Monitor Part I (Certification)

Direct & Related Links  |  Send Link to Friends  |  Posted by Diana Huggins

Performance Monitor will track and monitor several aspects of hardware and software functionality and processing, including the status of the network card and how well it is sending and receiving data packets. Performance monitor will not, however, monitor the state and welfare of the data once it has been placed on the network cable or media. Network monitor serves to do this.... [Continued]

^TOP^

Kerberos V5 "libkadm5srv" Buffer Overflow Vulnerability (Security)

Direct & Related Links  |  Send Link to Friends  |  Posted by Marc Erickson

MIT krb5 Security Advisory 2004-004 Original release: 2004-12-20 Topic: heap buffer overflow in libkadm5srv Severity: serious The MIT Kerberos 5 administration library (libkadm5srv) contains a heap buffer overflow in password history handling code which could be exploited to execute arbitrary code on a Key Distribution Center (KDC) host. The overflow occurs during a password change of a principal with a certain password history state. An administrator must have performed a certain password policy change in... [Continued]

^TOP^

Securing Apache (Security)

Direct & Related Links  |  Send Link to Friends  |  Posted by Marc Erickson

At SearchSecurity.com, Mike Chapple, CISSP writes about some basic steps for securing Apache A recent study conducted by the market research firm IDC estimates that one-third of the server market will consist of Linux systems by the year 2008. With the growing trend toward Linux deployments, we're seeing a corresponding increase in the number of Web sites running on the Linux-based Apache Web server. If you're running Apache in your environment or are considering its... [Continued]

^TOP^

System Monitor Counters - Which Ones Do I Need To Know? (Certification)

Direct & Related Links  |  Send Link to Friends  |  Posted by Diana Huggins

In pursuit of an MCSA or MCSE, you will definitely encounter a question or two (possibly more) about System Monitor counters. Microsoft expects you to know some of the common counters used to establish a baseline of performance. You also need to know when the values for specific counters indicate a bottleneck. The common System Monitor counters that you need to be familiar with are outlined below:... [Continued]

^TOP^

An Introduction To Samba For The Windows Administrator (Tech Toolshed)

Direct & Related Links  |  Send Link to Friends  |  Posted by TechRepublic

Unless you've been trapped in a time bubble and have recently emerged from the 1980s, you're no doubt aware that Linux has now positioned itself as a competitor to Microsoft's desktop domination and as a replacement for the farms of servers that many large organizations have. With Samba, Linux hopes to help displace Microsoft by first embracing Microsoft Windows-based clients and servers by allowing Linux to use Windows files and printers. This is a page... [Continued]

^TOP^

Linux Is Great But Some Of The Arguments Are Weak (Linux)

Direct & Related Links  |  Send Link to Friends  |  Posted by Rollie Hawk

In an open letter to a digital world, Chris Spencer has laid out his case for everyone making the switch to Linux. He makes a good argument for how bad some Microsoft practices are, though we've heard that one countless times already. Otherwise, he seems to ignore a few facts that point to a problem besides Windows.... [Continued]

^TOP^

The pitfalls of MAC filtering (Wi-Fi)

Direct & Related Links  |  Send Link to Friends  |  Posted by Marc Erickson

See how MAC filtering works and learn about some of its pitfalls. If you�re familiar with 802.11b wireless networking, you�ve no doubt heard the horror stories about how weak Wired Equivalent Privacy (WEP) is. In the rush to move away from WEP and its supposed weakness, many organizations have implemented Media Access Control (MAC) filtering as their sole wireless access point (WAP) security measure. What they may not know is that MAC filtering is extremely... [Continued]

^TOP^

Is It Working? (Security)

Direct & Related Links  |  Send Link to Friends  |  Posted by Marc Erickson

How to verify that Snort is operating Is your new Snort system running too quietly? Whether you're new to using Snort or you've deployed it on a new platform -- a low-noise level may have you worried. It could be a tightly-tuned (or too tightly-tuned) system, or you may have the IDS residing on a quiet network segment. Fortunately, several methods exist for testing Snort over the wire to ensure it's working properly in your... [Continued]

^TOP^

MMMMM - New Tools! (Security)

Direct & Related Links  |  Send Link to Friends  |  Posted by Marc Erickson

Top 75 Security Tools In May of 2003, I conducted a survey of Nmap users from the nmap-hackers mailing list to determine their favorite security tools. Each respondent could list up to eight. This was a followup to the highly successful June 2000 Top 50 list. An astounding 1854 people responded in '03, and their recommendations were so impressive that I have expanded the list to 75 tools! Anyone in the security field would be... [Continued]

^TOP^

Latest White Papers From TechRepublic

Yahoo! News - Search Results for it professionals

Desktop Pipeline

kbAlertz - - All Microsoft Products -

Traffic Analyzer - Sawmill 6 is a log analyzer and traffic statistics tool that runs on every major platform. It's suited to web server logs, but can process almost any log. Sawmill generates reports that are attractive and heavily cross-linked for easy navigation. Complete documentation is built into the program. It's easy to use and install. Plus it's highly configurable. Get your FREE trial download today!

Administrivia

Windows Fanatics
Linux Fanatics
OS X Fanatics
IT Professionals
Web Developers
Problem Solvers
Tech News Watch
RSS & Atom Tips
Hot Downloads
Exclusive Focus
Bargain Hunter
DVD Deal Center
Technobabble
Game Invasion
Hardware Help
Media Center
Mobile Lifestyle
Net Connections
Search Engineer
Political Geeks


Click Here for a Larger View!


» Losing My Dogs, My Mind
» It's starting to taste a lot like Christmas!
» Weblog Design
» RSS for Mom and Dad
» Can I use my Palm Desktop address book data in shell scripts?
» A Kommander crash course
» How to Get Attention
» Nvidia's PureVideo promises home theater video quality for the PC
» Service Management Software Helps Get the Job Done
» Convert PAL DVD to NTSC
» Telling Time with .NET: Build your own Internet time component
» HIARCS, High-powered Chess Coming to OS X
» May I See Your Mobile Porn License, Please?
» OMIM - Online Mendelian Inheritance in Man
» Spam, Spim, Spit�Achtooey!
» Do your devices have the touch of the bunny?


EcoBall
Feeding Frenzy
3D Runaway Sleigh
Cute Reminder v2.1
Christmas 3D Screensaver

Laptops
System Components
Hard Drives
PDAs
Flash Cards
UPSs
WebCams
Printers
Scanners
Cables / Adapters
Video Capture
Training
Computer Books
Printer Paper
Flat Panels / LCD
Ink & Toner
Wireless Stuff
USB / FireWire
Computer Memory
Video Memory
Video Cards
Soundcards
DVD / DVD-RW
Speakers
CDR / CD-RW


Reply via email to