Berkeley CSUA MOTD:Entry 30707
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/04/04 [General] UID:1000 Activity:popular
4/4     

2004/6/9-10 [Computer/SW/Security] UID:30707 Activity:high
6/9     Microsoft Security Summit at Moscone Center on June 22. Has anyone
        here actually been to one of these?  Are they worth going to?
        http://csua.org/u/7o6
        \_ Pretty much they say, "We're secure, just patch and reboot a lot,
           those smelly hippies wore the same sock yesterday so who wants to
           use their icky software?"
2025/04/04 [General] UID:1000 Activity:popular
4/4     

You may also be interested in these entries...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
2012/5/8-6/4 [Computer/SW/Unix] UID:54383 Activity:nil
5/8     Hello everyone!  This is Josh Hawn, CSUA Tech VP for Spring 2012.
        About 2 weeks ago, someone brought to my attention that our script
        to periodically merge /etc/motd.public into /etc/motd wasn't
        running.  When I looked into it, the cron daemon was running, but
        there hadn't been any root activity in the log since April 7th.  I
        looked into it for a while, but got lost in other things I was
	...
2012/4/23-6/1 [Computer/SW/WWW/Browsers] UID:54360 Activity:nil
4/19    My Firefox 3.6.28 pops up a Software Update box that reads "Your
        version of Firefox will soon be vulnerable to online attacks."  Are
        they planning to turn off some security feature in my version of
        Firefox?
        \_ Not as such, no, but they're no longer developing this version,
           so if a 3.6.x-targeted hack shows up, you're not going to get
	...
Cache (5149 bytes)
csua.org/u/7o6 -> msevents.microsoft.com/cui/eventdetail.aspx?culture=en-US&eventid=1032243264&x=16&y=9
Whether you're managing an IT infrastructure, writing code, or developing applications, you're serious about security. That's why we're hosting a FREE Microsoft Security Summit in San Francisco. Come connect with Microsoft security experts and your peers. Learn how to better protect your IT infrastructure and applications against security threats, both today and in the future. In addition to our special Panel Discussion, The Security Summit features a special keynote address featuring Rick Devenuti, Corporate Vice President, Chief Information Officer. Choose from three technical tracks of breakout sessions for IT Professionals and Developers. Each breakout session is presented by a security specialist, and is designed to provide information and free tools to help you take immediate action and address your security challenges. The Security Summit Agenda: 7:30-8:30 Registration and Breakfast 8:30-9:30 Keynote Presentation Trustworthy Computing: Progress and Commitment Microsoft executives will kick off this content-packed day with an industry perspective on security. You'll hear about the long-term direction of trustworthy computing as well as find out the Microsoft plan for response to security threats. Keynote and IT Professional Track Level 200 6/22/2004 8:30 AM - 6/22/2004 5:00 PM Description: Presented by IT security specialists, these Level 200 sessions will provide information about how to help lock down servers, workstations, and your network infrastructure, as well as design and deploy a proactive patch management strategy. Breakout Session 1: Essentials of Security Gain knowledge and skills essential for the design and implementation of a more secure computing environment. Learn how to assess your current security status, identify system priorities, and deploy a framework for improved security in the future. Breakout Session 2: Implementing Security Patch Management Learn how to apply security best practices and use available tools and technologies to implement a patch management process and strategy within your organization. Breakout Session 3: Implementing Server Security on Microsoft Windows 2000 and Windows Server(TM) 2003 Discover how to apply detailed host hardening guidance to enhance server security in legacy, enterprise client, and high-security environments. Breakout Session 4: Implementing Client Security on Windows 2000 and Windows XP Professional. Identify best practices for clients in extreme high-security locations by familiarizing yourself with steps to help secure client computers in Windows Server 2003, Windows 2000, and Windows NT 40 server environments. Keynote and IT Professional Track Level 300 6/22/2004 8:30 AM - 6/22/2004 5:00 PM Description: Presented by IT security specialists, these 300-level sessions are designed for IT Professionals looking to build upon their existing knowledge of server, client, network, and Windows security. Breakout Session 1: Implementing Perimeter and Network Security Learn how to apply best practices to implement perimeter and network defenses. Discuss the use of hardware and software firewalls for network and application filtering and how to implement intrusion detection mechanisms. Breakout Session 2: Implementing Application and Data Security Learn how to enhance security for applications and Microsoft Windows Server System(TM) components, including Microsoft SQL Server(TM), Exchange Server, and Windows Small Business Server. Breakout Session 3: Implementing Advanced Server and Client Security Receive advanced prescriptive guidance to help secure servers and clients in high-security environments. Observe demonstrations of the technologies and practices that help enhance security for local and remote clients. Breakout Session 4: Applied Security Strategies Learn practical strategies for implementing security best practices across your environment, including how to troubleshoot problems with existing security configurations. Discuss best practices for enhancing security across heterogeneous environments, including legacy and third-party systems. Keynote and Developer Track Level 200 6/22/2004 8:30 AM - 6/22/2004 5:00 PM Description: Development training sessions will provide you with guidance and free tools that help foster a deeper understanding of security concerns that are relevant to the authors of today's applications, including some critical security issues around unicode, denial of service, and cryptography. Breakout Session 1: Essentials of Application Security Learn why implementing security at every stage of the development process is so vital--plus how to use various technologies to help secure data and communications. Breakout Session 2: Writing Secure Code -- Threat Defense Identify effective strategies and best practices for defending common security threats such as buffer overruns, cross-site scripting, SQL injection, and denial of service attacks. Breakout Session 3: Writing Secure Code -- Best Practices Study established threat modeling methodologies and tools and how they can be applied with other best practices to help minimize vulnerabilities and limit damage from attacks.