Everyone knows the default Google queries, you get your URL’s, keywords and the headline of the pages in the result-query. It doesn’t stop there …
Google has some new features to improve the “search experience”. You can view your results on a timeline, map or in context of other information types. Take a look at Alternate views for search results and prepare yourself to spend a couple of hours of “ohwh”s.
Occasionnly you have a process that’s been running for a while and you decide that it’s time to log out. Of course, you’ve forgotten to use screen so when you log out, the process dies. The post by Rusell Coker shows that it is still possible to redirect the output of a running process. The process for doing so involves looking up the file handles used by the process (in /proc/
/fd) and then run gdb. In gdb you call the “close” system call to the current output, then create a new handler.
There is a very interesting post by Adrian Pastor about authentication bypass.
He talks about the well known vulnerability in the Linksys WRT54G router where the page that contains the different settings is password protected but the page that does the actual processing of the data (for the Linksys, a CGI script) was not protected at all.
An interesting post by Jennifer Leggio on Security Twits (Security folks using Twitter).
Dag Wiers provides an excellent repository for Red Hat flavored Linux systems. Adding them to CentOS 5 is easy.
First download the “rpmforge-release”-rpm. For CentOS 5, I choosed rpmforge-release-0.3.6-1.el5.rf.x86_64.rpm. The rpm’s are available at http://dag.wieers.com/rpm/packages/rpmforge-release/. Then install the rpm.
rpm -ivh rpmforge-release-0.3.6-1.el5.rf.x86_64.rpm
Gisteren ‘n pracht van ‘n film gaan zien : Into the Wild , onder regie van Sean Penn. De soundtrack (met ondermeer Eddie Vedder) is om kippevel van te krijgen, de film zelf duwt je dan weer keihard neer in je stoel.
Twee franse jeanetten op YouTube. Een avond kan niet meer stuk.
The Project Honeypot allows for everyone who is hosting a website to create a mini honeypot to trap spammers. I’ve configured mine to run at this site at “coast.php”.
It is a “poor-man” honeypot but can still offer useful results. Watch for my future writeups on how to create honeypots with Bind, Apache and Postfix.
The Windows Live Hotmail’s lead program manager, Omar Shahine, was in for a surprise when he tried to login to his Windows Live mumbojumbo. An attacker managed to change his password, secret question and in the end deleted his life. He’s complaining about it on his weblog.
An update of the story tells us that his gmail account also got compromised.
Two possibilities I guess, either his password isn’t that secure as he thinks it is. Or he has a keylogger installed on his machine. The latter chance being the most likely. If a keylogger is indeed the root cause of the problem then what kind of anti-virus is he running? And how did he manage to be infected by a keylogger in the first place?
Een pint voor wie een spell-checker voor configuratiebestanden kan uitvinden. Liefst met rekening houdend met de “moron”-capaciteiten van de te spellchecken gebruiker. Zucht.