Wednesday, December 22, 2010

Awesome blog posting : Hosting backdoors in hardware

http://blog.ksplice.com/2010/10/hosting-backdoors-in-hardware/

Saturday, December 18, 2010

Butter rum recipe

Ingredients:
Mug of hot water
tab of butter
clove (whole cloves preffered)
table spoon (to taste) brown sugar
optional vanilla extract
meyer's dark rum

place butter, clove, sugar, vanilla & rum into mug.
bring the water to near boil then pour into mug and stir.
Enjoy!

Why not store VMware vm data in DNS?

Why add yet another layer of database management to the IT work place?  Store information that supports VM's in DNS ...

Mac stuff

To install MAC OS X you need the install DVD.
Place the DVD into the system.
Reboot the system and hold down the 'c' key.
The system should boot from the DVD.
Next follow on screen instructions.

Thursday, December 09, 2010

How to see constraints in oracle database

red@red_dev> desc all_constraints;                                                                                                                           

Name              Null?    Type       
----------------- -------- ------------
OWNER             NOT NULL VARCHAR2(30)
CONSTRAINT_NAME   NOT NULL VARCHAR2(30)
CONSTRAINT_TYPE   NULL     VARCHAR2(1)
TABLE_NAME        NOT NULL VARCHAR2(30)
SEARCH_CONDITION  NULL     LONG       
R_OWNER           NULL     VARCHAR2(30)
R_CONSTRAINT_NAME NULL     VARCHAR2(30)
DELETE_RULE       NULL     VARCHAR2(9)
STATUS            NULL     VARCHAR2(8)
DEFERRABLE        NULL     VARCHAR2(14)
DEFERRED          NULL     VARCHAR2(9)
VALIDATED         NULL     VARCHAR2(13)
GENERATED         NULL     VARCHAR2(14)
BAD               NULL     VARCHAR2(3)
RELY              NULL     VARCHAR2(4)
LAST_CHANGE       NULL     DATE       
INDEX_OWNER       NULL     VARCHAR2(30)
INDEX_NAME        NULL     VARCHAR2(30)
INVALID           NULL     VARCHAR2(7)
VIEW_RELATED      NULL     VARCHAR2(14)

Monday, December 06, 2010

[ProFTPD-announce] ProFTPD ftp.proftpd.org compromise

http://marc.info/?l=proftpd-announce&m=129124765606322



ProFTPD Compromise Report

On Sunday, the 28th of November 2010 around 20:00 UTC the main
distribution server of the ProFTPD project was compromised.  The
attackers most likely used an unpatched security issue in the FTP daemon
to gain access to the server and used their privileges to replace the
source files for ProFTPD 1.3.3c with a version which contained a backdoor.
The unauthorized modification of the source code was noticed by
Daniel Austin and relayed to the ProFTPD project by Jeroen Geilman on
Wednesday, December 1 and fixed shortly afterwards.

The fact that the server acted as the main FTP site for the ProFTPD
project (ftp.proftpd.org) as well as the rsync distribution server
(rsync.proftpd.org) for all ProFTPD mirror servers means that anyone who
downloaded ProFTPD 1.3.3c from one of the official mirrors from 2010-11-28
to 2010-12-02 will most likely be affected by the problem.

The backdoor introduced by the attackers allows unauthenticated users
remote root access to systems which run the maliciously modified version
of the ProFTPD daemon.

Users are strongly advised to check systems running the affected code for
security compromises and compile/run a known good version of the code.
To verify the integrity of the source files, use the GPG signatures
available on the FTP servers as well on the ProFTPD homepage at:

  http://www.proftpd.org/md5_pgp.html.