Berkeley CSUA MOTD:Entry 17664
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/24 [General] UID:1000 Activity:popular
5/24    

2000/3/1-2 [Computer/SW/OS/Windows, Computer/SW/Security] UID:17664 Activity:nil
2/29    does an ssh client for windows 3.11 exist?  thanks.
        \_ USE WINDOWS MAN.  LINUX SUX.  WINDOWS REWLZ.  ANYONE WHO'S
           ANYONE USES WINDOWS.  LINUX USERS ARE FREAKS MAN.
        \_ Win32 programs have been known to run on 3.11 systems.
           Try TeraTerm ssh (free) or F-Secure (maybe free if you're on
           campus).
                \_ There was an article in the merc this week saying that
                   SSH Communications & SANS were giving away free SSH to
                   .edu's but I can't find anything on http://ssh.com or http://sans.org.
                   Anyone know anything about it?
2025/05/24 [General] UID:1000 Activity:popular
5/24    

You may also be interested in these entries...
2010/4/28-5/10 [Computer/SW/OS/Windows] UID:53807 Activity:nil
4/28    Win 3.1 was more widely adopted than Win 3.0.  Win XP (5.1) was more
        widely adopted than Win 2k (5.0).  Now it looks like Win 7 (6.1) is
        going to be more widely adopted than Vista (6.0).  Is this a trend on
        Microsoft x.0 versions being bad?
        \_ duh.
        \_ "more widely adopted" ... well... what are you basing these numbers
	...
2010/2/18-3/9 [Computer/SW/WWW/Browsers] UID:53713 Activity:nil
2/18    Why is there now Firefox 3.5.8 when there was already 3.6 a month ago?
        \_ Why is there Windows XP SP3 when there was already Vista?
           Generally companies manage patches for at least two levels of
           product.  -tom
           \_ I see.  So Fx 3.6 is more like a new version than an update to
              3.5.x.  --- OP
	...
2009/8/4-13 [Computer/SW/OS/Windows] UID:53239 Activity:kinda low
8/3     VMWare + Windows XP + Validation question. I need to test stuff with
        Service Pack 3 installed. I have a valid key that I own (yeah yeah I
        actually *bought* a copy, please don't flame me for supporting evil
        M$). Is it possible to register the key once, and then duplicate it
        for testing purposes?  Will Windows or Microsoft detect copies and
        disable the rest the copies?
	...
2009/6/1-3 [Computer/HW/CPU] UID:53068 Activity:high
5/31    History of winners and losers by *popularity*:
        VHS > Beta Max
        USB2 > Firewire
        x86 > PowerPC > Everything Else > DEC Alpha > Itanium
        BlueRay > HDDvd
        \_ It's too early to tell RE: "Blue"Ray. They may both turn out to be
	...
2009/2/20-25 [Computer/SW/OS/Windows] UID:52610 Activity:nil
2/20    I'm using Cygwin/X on XP.  All the X indows (xterm, emacs)
        seem to have a keyboard repeat rate and a repeat delay that's different
        than the one XP uses for other Windows apps.  When I do "mode con
        rate=xx delay=yy", it only changes Windows apps but not the X apps.
        How do I change the keyboard repeat rate and delay for X?  Thanks.
        \_ man xset
	...
2008/11/29-12/6 [Computer/SW/OS/FreeBSD, Computer/SW/OS/VM] UID:52129 Activity:moderate
11/29   I'm experimenting with virtualization, and as a poor college student
        I'm wondering what the best alternatives for virtualization are, and
        how best to cut my teeth on messing with non-linux platforms (or I
        guess interesting stuff on Linux would work too). Right now I've got
        FreeBSD7 running on KVM on my home computer (on a Core 2 Quad), and am
        somewhat at a loss as to how to use it. (More details: bridged
	...
2008/11/15-26 [Computer/SW/OS/Windows] UID:51993 Activity:nil
11/14   I have a bunch of pictures and I find that thumbs.db on
        Windows XP to be very useful, especially when you're on NAS
        and the network is slow. Having that said, my Win XP has
        stopped generating thumbs.db even though I've set it to generate
        thumbs.db (Properties->View->Uncheck "Do not cache thumbnails.").
        How do I force Windows to generate Thumbs.db? Googling seems
	...
2008/10/12 [Computer/SW/OS/Windows] UID:51487 Activity:nil
10/12   When XP boots up on my PC, the screen reads "Microsoft (R) Windows (R)
        5.01. 2600 Service Pack 3 Multiprocessor Free."  What does "Free" mean?
        Thx.
	...
2008/9/22-29 [Computer/SW/OS/OsX] UID:51261 Activity:nil
9/21    So I did it and got myself a Macbook Pro. Any suggestions for the best
        PC->Mac transition?  After finding out that Outlook is not supported
        under Mac; I bought parallels and am installing XP to grab my outlook
        mail archive (~1GB) from the original PC disk (the pc itself is
        basically dead). Any suggestions on a relatively painless import to
        entourage? The Mac Genius guy also reccomended an upgrade to 4GB and
	...
2008/9/18-19 [Computer/HW/Laptop] UID:51217 Activity:low
9/18    My  7 year old Dell laptop is slowly  decending into its death throws.
        I am seriously considering an Mac laptop; but am having a hard time deaa\
        ling with the price. Curious to find out  if people really think that
        the extra $$ upfront was a good investment. a 2K macbook pro with
        standard config can buy a high end dell laptop
        \_ I have both a MacBook Pro (and before that a PowerBook) and a
	...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
2012/5/8-6/4 [Computer/SW/Unix] UID:54383 Activity:nil
5/8     Hello everyone!  This is Josh Hawn, CSUA Tech VP for Spring 2012.
        About 2 weeks ago, someone brought to my attention that our script
        to periodically merge /etc/motd.public into /etc/motd wasn't
        running.  When I looked into it, the cron daemon was running, but
        there hadn't been any root activity in the log since April 7th.  I
        looked into it for a while, but got lost in other things I was
	...
2012/4/23-6/1 [Computer/SW/WWW/Browsers] UID:54360 Activity:nil
4/19    My Firefox 3.6.28 pops up a Software Update box that reads "Your
        version of Firefox will soon be vulnerable to online attacks."  Are
        they planning to turn off some security feature in my version of
        Firefox?
        \_ Not as such, no, but they're no longer developing this version,
           so if a 3.6.x-targeted hack shows up, you're not going to get
	...
Cache (389 bytes)
ssh.com
NetSec 2004 SF, USA, June 14-16 The new version of SSH Tectia introduces seamless integration with enterprise identity management and enhanced PKI compatibility reducing the total costs of managed security middleware. FIPS 140-2 Certification The encryption module used in SSH Tectia Client/Server 40 has been awarded Level 1 FIPS 140-2 certification for Windows, UNIX and Linux platforms.
Cache (8192 bytes)
sans.org
US Training Special Offering Special offerings are courses/tracks ouside of our normal track structure. Securing Windows 2000 - Gold Standard SANS Security Essentials Flight School Revese Engineeringing Malware CCNA +S MCNS +S Wireless Networks Building a syslog Infrastructure And many others. Track 1: SANS Security Essentials Bootcamp and the CISSP 10 Domains Maximize your training time and turbo-charge your career in security by learning both the CISSP 10 Domains needed to pass the CISSP exam and the full SANS Security Essentials curriculum needed to qualify for the GSEC certification. In this track, you will learn the language and underlying theory of computer security; This course meets both of the key promises SANS makes to our students: You will gain up-to-the-minute knowledge you can put into practice immediately upon returning to work and SANS identifies the best security instructors to teach their courses, by choosing from those who have ranked highest in a nine-year competition among potential security faculty. This program offers great teaching along with the ability to master the material needed for the two most popular certifications in information security: CISSP and GSEC. Track 2: Firewalls, Perimeter Protection and VPNs Remember the good old days when you could install "a firewall" and deem your perimeter to be secure? Well, today's attackers are creating and launching attacks specifically designed to circumvent firewalls; Commercial networking companies are even releasing "helpful" software that lets users tunnel all sorts of non-company-sanctioned applications right through firewalls via the http port. Gone are the days when a single security solution can lock down a network perimeter. In this course, students will learn about all the pieces required to really secure a network and keep it secure in today's incredibly hostile environment. Decoding IP packets, firewalls, intrusion detection, centralized logging and alerting, VPNs, auditing, and network design are all covered in depth, using real-world examples to illustrate the practical knowledge. Track 3: Intrusion Detection In-Depth This hands-on track offers a practical working knowledge in intrusion detection and traffic analysis, taught by top practitioners/authors in the field. This is the most advanced program in network intrusion detection that has ever been taught. All of the courses are either new or just updated to reflect the latest attack patterns. This series is jam-packed with network traces and analysis tips. The emphasis of this track is to familiarize students with TCP/IP, general network traffic analysis, and one specific network intrusion detection system - Snort. This track is not a comparison or demonstration of multiple NIDS. It is expected that with the knowledge acquired from this track, students will be better able to understand the qualities of a sound NIDS to make a wise selection for their site's particular needs. Track 4: Hacker Techniques, Exploits and Incident Handling Let's face it. If your organization is connected to the Internet or has any disgruntled employees, your computer systems will get attacked. From the five, ten, or even one hundred daily probes against your Internet infrastructure to the malicious insider slowly creeping through your most vital information assets, attackers are targeting your systems with increasing viciousness and stealth. By helping you understand attackers' tactics and strategies in detail, giving you hands-on experience in discovering vulnerabilities, and equipping you with a comprehensive incident handling plan, the in-depth information in this course helps you turn the tables on computer attackers. This course addresses the latest cutting-edge insidious attack vectors and the oldie-but-goodie attacks that are still so prevalent, and everything in between. Instead of merely teaching a few hack attack tricks, this course includes a time-tested, step-by-step process for responding to computer incidents, a detailed description of how attackers undermine systems so you can prepare, detect, and respond to them, and a hands-on workshop for discovering holes before the bad guys do. Additionally, the course explores the legal issues associated with responding to computer attacks, including employee monitoring, working with law enforcement, and handling evidence. This challenging course is particularly well suited to individuals who lead or are a part of an incident handling team. Furthermore, general security practitioners, system administrators, and security architects will benefit by understanding how to design, build, and operate their systems to prevent, detect, and respond to attacks. This track can be used to prepare for the GIAC Certified Incident Handler (GCIH) certification. Track 5: Securing Windows The Securing Windows track is a comprehensive curriculum for securing Windows 2000 and Windows XP networks. This program brings the confusing complexity of Windows 2000/XP security into clear focus by starting with foundational security services, such as Active Directory and Group Policy, and advancing in a logical progression to particular products or features which rely on these foundations, such as IIS and IPSec. This track provides best practices for security, hands-on exercises, extensive documentation/screenshots in the book-like manuals, a CD-ROM of security/scripts and an objective account of Windows security (neither bashing Microsoft nor towing the party line). You cannot claim to be a Windows 2000/XP security expert without mastering the information and skills presented in Track 5 This track can be used to prepare for the GIAC Certified Windows Security Administrator (GCWN) certification. Track 6: Securing Unix The distributed denial of service attacks that incapacitated Yahoo and other high profile internet sites in February 2000 were all launched from improperly configured Unix systems. Hundreds of scripts are continuously searching the internet for vulnerable Unix systems. SANS is pleased to offer a Unix security certification track. This track can be used to prepare for the GIAC Certified Unix Security Administrator (GCUX) certification. The track provides in-depth coverage of Unix-specific security issues. We will look at how the Unix semantics for file storage, program execution, and memory layout help - or hinder! We will also look at the specific configuration choices needed to secure the most commonly used Unix servers: Apache, Sendmail, and more. You will see the exact steps necessary to secure the two most common Unix flavors: Solaris and Linux. All through the course, you will learn how to use freely available tools to handle security issues. We will cover the installation, basic use, and advanced options so that you can start using these tools as soon as you return to work. We will put these tools to use in the special section on Unix Forensics. We will also include a detailed section on the installation, configuration, basic use, and advanced operation of SSH, as it is so crucial for Unix system management. Track 7: Auditing Networks, Perimeters and Systems The recently expanded Auditing Track is the end product of the efforts of over one hundred skilled system, network and security administrators working with one common goal: to improve the state of information security. This track, like all SANS courses, is based on known and validated threats and vulnerabilities. These threats and vulnerabilities are explained based on validated information from real world situations that can be used to raise awareness within an organization and build an understanding of why auditing is important. From these threats and vulnerabilities, we build the countermeasures and defenses including instrumentation, metrics and auditing. The course begins with a high level introduction on methods and audit programs. It then takes you through all of the particulars of how you actually audit devices and IT systems ranging from firewalls and routers, all the way down to the underlying operating systems. You'll be able to use what you learn the day you get home. Four days out of the six days in the track wil...