Berkeley CSUA MOTD:Entry 21936
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/07/08 [General] UID:1000 Activity:popular
7/8     

2001/7/24 [Computer/SW/Security] UID:21936 Activity:nil
7/24    Its probably a good thing we are running OpenSSH instead
        of that commerical version:
        http://www.ssh.com/products/ssh/exploit.cfm
        \_ There was a hole in openssh a month ago.  Get a clue.  -tom
           \_ But the whole was not in the *default* config, this
              is a hole in the standard config.
        \_ My read of this "hole" is that it takes a password of two or
           fewer characters to open it up.  Somehow, that doesn't have me
           quaking in my boots.  Still, thanks for pointing it out. --PeterM
           \_ Some of the daemon accounts on *nix systems have NP as
              the password in /etc/shadow.
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/07/08 [General] UID:1000 Activity:popular
7/8     

You may also be interested in these entries...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
2012/4/23-6/1 [Computer/SW/WWW/Browsers] UID:54360 Activity:nil
4/19    My Firefox 3.6.28 pops up a Software Update box that reads "Your
        version of Firefox will soon be vulnerable to online attacks."  Are
        they planning to turn off some security feature in my version of
        Firefox?
        \_ Not as such, no, but they're no longer developing this version,
           so if a 3.6.x-targeted hack shows up, you're not going to get
	...
2011/11/8-30 [Computer/SW/Security, Computer/SW/OS/Windows] UID:54218 Activity:nil
11/8    ObM$Sucks
        http://technet.microsoft.com/en-us/security/bulletin/ms11-083
        \_ How is this different from the hundreds of other M$ security
           vulnerabilities that people have been finding?
           \_ "The vulnerability could allow remote code execution if an
               attacker sends a continuous flow of specially crafted UDP
	...
2011/11/11-30 [Computer/SW/Security] UID:54224 Activity:nil
11/11   MacOSX's Sandbox security hole:
        http://preview.tinyurl.com/7ph2wtg [arstechnica]
	...
Cache (1732 bytes)
www.ssh.com/products/ssh/exploit.cfm -> www.ssh.com/products/tectia/
Company 10 Products 11 Services 12 Solutions 13 Support 14 Partners 15 Investors 16 SSH Tectia Solution 17 Product Material 18 SSH Tectia Solution 19 SSH Tectia Connector 20 SSH Tectia Client 21 SSH Tectia Server 22 SSH Tectia Certifier 23 SSH Tectia Manager SSH Tectia Solution Managed Security Middleware SSH Tectia is a unique managed security middleware solution from SSH Communications Security designed to cost-effectively deploy and centrally manage secure end-to-end communication within the corporate networks of financial institutions, governmental organizations, and large enterprises. SSH Tectia Web Tutorial will guide you through the world of managed security middleware and SSH Tectia solution. SSH Tectia Products SSH Tectia solution has a modular structure and it includes the following product components: 25 SSH Tectia Connector SSH Tectia Connector is a transparent, corporate end-user desktop client software that provides dynamic tunneling of client/server connections without the need to re-configure the applications. With multi-platform support, SSH Tectia Server can be installed in a wide variety of operating systems thus facilitating the adaptability of SSH Tectia into a heterogeneous IT infrastructure. This module also consists of SSH Accession and SSH Token Master components. It is designed to scale and reduce the operating costs of large and dynamic deployments of SSH Tectia client/server solution. Related Documents 30 > SSH Tectia Brochure 31 > SSH Tectia Solution Overview 32 > SSH Tectia Technical Solution Description 33 > FIPS 140-2 certification awarded Solutions for Specific Industries 34 Need assistance? Use the extensive online information for product support on SSH Tectia solution.