L33tdawg: Much thanks to com-x for the heads up on this.
There is a remotely exploitable vulnerability in a general buffer management function in versions of OpenSSH prior to 3.7. This may allow a remote attacker to corrupt heap memory which could cause a denial-of-service condition. It may also be possible for an attacker to execute arbitrary code.
For the past eight months we have been discussing what honeypots are, their value, their different types, and how they can be used and deployed. Today we will do something a little different. Instead of discussing what honeypots can do and how they work, we will take a look into the crystal ball and see what honeypots should do, how they could work. If I had a dream honeypot, this is what I would like to see in the future: the dynamic honeypot.
Hundreds of government laptops with potentially sensitive information are being lost or stolen, a study shows.
One in 17 key public sector workers, like government or defence officials, say they have either lost theirs or had them stolen, said security firm Thales.
Those who do hold on to them admit they do not use any kind of encryption to protect sensitive information.
Most rely on passwords to prevent access to files and a surprising number write their passwords down.
I'm not responsible for what you will do with the information that this tutorial contains. This is for educational purposes only. I don't
care if you do something stupid like DoSing someone's computer. Almost forgot i don't care about typos just made a cheap spelling and
grammar check so please don't complain.
Darwin John had established himself as a bit of a miracle worker before being asked to lead an information- systems renaissance at the Federal Bureau of Investigation.
But John, former director of information and communications systems for the Church of Jesus Christ of Latter-day Saints, needed divine intervention to help him navigate the politics, pressure and organizational malaise that he found upon his arrival in Washington. In May, John resigned as the FBI's chief information officer after less than a year on the job.