Lockergnome's IT
Professionals ~ December 21,
2004
It's a Video Game Invasion! - Have Joystick, will
travel! For Action and Adventure, Classic and Retro, RPG, Sports,
Strategy and Simulation - we'll provide you with the latest releases,
tips, updates, and advice for the PC and
console gaming world.
It's starting to taste a lot like Christmas!
(Report)
Direct
& Related Links | Send
Link to Friends | Posted by Matt Hartley
Tell me, what do toys, overeating, and sitting around with family
watching the kids tear into wrapping paper like it is going out of
style, have to do with Christmas? The one holiday when gluttony,
commercialism and all the other stuff that gives me warm fuzzies is
accepted without question. Yes folks, Christmas is almost upon us and
I for one hope that everyone gets what they want this year. As for
myself, I am... [Continued]
^TOP^
Strange errors, anoying prompts, what gives?
(Just Ask Matt!)
Direct
& Related Links | Send
Link to Friends | Posted by Matt Hartley
Welcome to Just Ask Matt! - The IT industry's answer to the help
column, only slightly more medicated. Today, Sam writes: I am losing
my mind and I need help. Matt, every time I start my computer, I keep
getting 'checksum error' during the computer's startup. What the heck
does this mean? And why can't they just tell me in plain English? If
you can answer this, I will be forever in your debt. Thanks.... [Continued]
^TOP^
Certification Success - Understanding Network
Monitor Part I (Certification)
Direct
& Related Links | Send
Link to Friends | Posted by Diana Huggins
Performance Monitor will track and monitor several aspects of
hardware and software functionality and processing, including the
status of the network card and how well it is sending and receiving
data packets. Performance monitor will not, however, monitor the state
and welfare of the data once it has been placed on the network cable
or media. Network monitor serves to do this.... [Continued]
^TOP^
Kerberos V5 "libkadm5srv" Buffer Overflow
Vulnerability (Security)
Direct
& Related Links | Send
Link to Friends | Posted by Marc Erickson
MIT krb5 Security Advisory 2004-004 Original release: 2004-12-20
Topic: heap buffer overflow in libkadm5srv Severity: serious The MIT
Kerberos 5 administration library (libkadm5srv) contains a heap buffer
overflow in password history handling code which could be exploited to
execute arbitrary code on a Key Distribution Center (KDC) host. The
overflow occurs during a password change of a principal with a certain
password history state. An administrator must have performed a certain
password policy change in... [Continued]
^TOP^
Securing Apache (Security)
Direct
& Related Links | Send
Link to Friends | Posted by Marc Erickson
At SearchSecurity.com, Mike Chapple, CISSP writes about some basic
steps for securing Apache A recent study conducted by the market
research firm IDC estimates that one-third of the server market will
consist of Linux systems by the year 2008. With the growing trend
toward Linux deployments, we're seeing a corresponding increase in the
number of Web sites running on the Linux-based Apache Web server. If
you're running Apache in your environment or are considering its...
[Continued]
^TOP^
System Monitor Counters - Which Ones Do I Need
To Know? (Certification)
Direct
& Related Links | Send
Link to Friends | Posted by Diana Huggins
In pursuit of an MCSA or MCSE, you will definitely encounter a
question or two (possibly more) about System Monitor counters.
Microsoft expects you to know some of the common counters used to
establish a baseline of performance. You also need to know when the
values for specific counters indicate a bottleneck. The common System
Monitor counters that you need to be familiar with are outlined
below:... [Continued]
^TOP^
An Introduction To Samba For The Windows
Administrator (Tech Toolshed)
Direct
& Related Links | Send
Link to Friends | Posted by TechRepublic
Unless you've been trapped in a time bubble and have recently
emerged from the 1980s, you're no doubt aware that Linux has now
positioned itself as a competitor to Microsoft's desktop domination
and as a replacement for the farms of servers that many large
organizations have. With Samba, Linux hopes to help displace Microsoft
by first embracing Microsoft Windows-based clients and servers by
allowing Linux to use Windows files and printers. This is a page...
[Continued]
^TOP^
Linux Is Great But Some Of The Arguments Are
Weak (Linux)
Direct
& Related Links | Send
Link to Friends | Posted by Rollie Hawk
In an open letter to a digital world, Chris Spencer has laid out
his case for everyone making the switch to Linux. He makes a good
argument for how bad some Microsoft practices are, though we've heard
that one countless times already. Otherwise, he seems to ignore a few
facts that point to a problem besides Windows.... [Continued]
^TOP^
The pitfalls of MAC filtering (Wi-Fi)
Direct
& Related Links | Send
Link to Friends | Posted by Marc Erickson
See how MAC filtering works and learn about some of its pitfalls.
If you�re familiar with 802.11b wireless networking, you�ve no doubt
heard the horror stories about how weak Wired Equivalent Privacy (WEP)
is. In the rush to move away from WEP and its supposed weakness, many
organizations have implemented Media Access Control (MAC) filtering as
their sole wireless access point (WAP) security measure. What they may
not know is that MAC filtering is extremely... [Continued]
^TOP^
Is It Working? (Security)
Direct
& Related Links | Send
Link to Friends | Posted by Marc Erickson
How to verify that Snort is operating Is your new Snort system
running too quietly? Whether you're new to using Snort or you've
deployed it on a new platform -- a low-noise level may have you
worried. It could be a tightly-tuned (or too tightly-tuned) system, or
you may have the IDS residing on a quiet network segment. Fortunately,
several methods exist for testing Snort over the wire to ensure it's
working properly in your... [Continued]
^TOP^
MMMMM - New Tools! (Security)
Direct
& Related Links | Send
Link to Friends | Posted by Marc Erickson
Top 75 Security Tools In May of 2003, I conducted a survey of Nmap
users from the nmap-hackers mailing list to determine their favorite
security tools. Each respondent could list up to eight. This was a
followup to the highly successful June 2000 Top 50 list. An astounding
1854 people responded in '03, and their recommendations were so
impressive that I have expanded the list to 75 tools! Anyone in the
security field would be... [Continued]
^TOP^
Latest White
Papers From TechRepublic
Yahoo! News -
Search Results for it professionals
Desktop Pipeline
kbAlertz - - All Microsoft Products -
Traffic Analyzer - Sawmill 6 is a log analyzer
and traffic statistics tool that runs on every major platform. It's
suited to web server logs, but can process almost any log. Sawmill generates reports
that are attractive and heavily cross-linked for easy navigation.
Complete documentation is built into the program. It's easy to use and
install. Plus it's highly configurable. Get your FREE trial download
today!
Administrivia