Tag Archives: network
Things are heating up in the appliance world. Oracle's CEO Larry Ellison took the lead at the keynote of Oracle OpenWorld to announce the launch of 'Exalogic Elastic Compute Cloud' (EECC), which is a slick new box that contains both a full server and storage hardware.
More Good News: most home routers, like the one you're using right now, are "easily hackable". A researcher named Craig Heffner from the security consultancy company Seismic says about half the existing models of home routers are vulnerable to hackers. This includes most Linksys, Dell, and Verizon FiOS or DSL routers, plus others. The technique […]
You may be familiar with "security through obscurity", a principle in security engineering which attempts to use secrecy of design, implementation, or other factors to provide security. Security through obscurity is a poor design concept in general and is widely derided among professionals. But what about security through ubiquity, "ubiquity" in this case meaning multiple […]
Oracle Toolbox is a collection of PHP scripts that permit you to administer an Oracle database via your Web browser in a single interface. You can find out more about it and get it here: http://www.oracletoolbox.org/ Oracle Toolbox gives you a wealth of information on processes, uptime, stats, and other metrics. It also lets you […]
A report from ThreatPost.com says the Gumblar botnet is shifting tactics in order to evade detection, but also to try and keep botnet researchers from obtaining and analyzing the new versions of Gumblar. Apparently, the newer versions perform a test to see what country a newly-infected machine is located in. This geolocation check happens during […]
Build a botnet, go to jail- that's the way it should be. If all goes well, two botnet builders fromTexas will spend some real time in prison for building and spreading their botnet over the internet. According to court documents, David Anthony Edwards will plead guilty to charges that he and another jerk man, Thomas […]
Security Researchers Find All GSM Phones Open To Hacking & Tracking Yes, it's good news for stalkers and indentity thieves everywhere: Don Bailey from iSec Partners and security researcher Nick DePetrillo have found a vulnerability in all GSM cell phones that can give an attacker the unrestricted ability to locate any GSM handset anywhere in […]