We Know The Source (since 1999)
[PHCN] Linux News » KDE 3.5 (almost) finished
[PHCN] Linux News

KDE 3.5 (almost) finished
25.11.2005 • 00:34 [PHCN]Fisch

KDE 3.5 is actually already finished, but nowhere available yet.
The release date was set for the 23rd of November.

Binary Pakets will be temporary only available for Suse and Kubuntu.

As soon it is available it can be downloaded from these sites:

"Klax" KDE 3.5 RC 1 Live-CD with the new KDE version can be downloaded here:

The new Features that will be integrated in KDE 3.5 are listed here:
- extended tooltips
- 3 different styles for the Taskbar
- easier to add applets
- a selection of choices when a disc or usb disc is inserted
- a popup-blocker in konqueror
- an enhanced search plugin for konqueror
- the file manager and the webbrowser are better seperated
- 2 new included programs (KGeography and blinKen)
- a video conference feature for Kopete
- a better importfilter for KMail

Source: http://www.golem.de/0511/41589.html
no comments recommending news printable version
[PHCN] Security News » Teamspeak UDP Buffer Overflow Remote Exploit
[PHCN] Security News

Teamspeak UDP Buffer Overflow Remote Exploit
01.04.2005 • 04:13 [PHCN]

Teamspeak is a quality, scalable application which enables people to speak with one another over the Internet. Teamspeak consists of both client and server software. The Teamspeak server acts as a host to multiple client connections, capable of handling literally thousands of simultaneous users.

Several vulnerabilities in Teamspeak server allow remote users to exploit a buffer overflows vulnerability in order to crash the Teamspeak server or execute arbitrary commands on the host the server is running on.

Vulnerable Systems:
Teamspeak Server



4 Comments recommending news printable version
[PHCN] Mircosoft » Microsoft "Fight Spyware" Information Center
[PHCN] Mircosoft

Microsoft "Fight Spyware" Information Center
01.04.2005 • 04:13

Microsoft launched a spyware awareness center with information on spyware. The main target is home end users, and can be also useful to increase awareness in corporate environment.

Spyware is software that collects personal information without your knowledge or permission. You might be the target of spyware or other unwanted software if you download music from file-sharing programs, free games from sites you don't trust, or other software from an unknown source. Learn more about the symptoms of spyware and other unwanted software and how you can help to protect your computer.

What is spyware?
If your computer suddenly begins to display hundreds of pop-up ads, you may be the victim of spyware or other unwanted software. Learn more about these pesky programs.

Additional Information:
For more information see: http://www.microsoft.com/athome/security/spyware/default.mspx
recommending news printable version
[PHCN] Developer » Winny developer busted
[PHCN] Developer

Winny developer busted
01.04.2005 • 04:13

A Tokyo University assistant researcher who developed the controversial Winny shareware program has been arrested for breaking copyright laws, police said.

The 33-year-old academic, Isamu Kaneko, was arrested Monday for abetting the violation of the Copyright Law by the creation of the software.

Kaneko, one of the world's first developers of file-sharing software to be arrested, admits to the allegations.

"Basically, what I did clashes with the law, so it was almost inevitable that I was going to be arrested," Kaneko told the police.

Police said that Kaneko succeeded in developing Winny, a software program promising greater anonymity for users than the WinMX shareware that had generally been used to swap files until then.

Kaneko used Ni Chaneru, Japan's biggest online bulletin board, to announce in April 2002 that he had developed shareware that gave users a thicker veil of secrecy, then set up a website the following month where people could download Winny for free.

Police said Kaneko was arrested because Winny allowed a 41-year-old man from Takasaki and 19-year-old youth from Matsuyama to download games and movies from the Internet in violation of the Copyright Law. The youth has since been convicted.

Kaneko has used Ni Chaneru to argue for trading of digital information on the Internet."I want to come up with new business models through copyright law violations," he said on an Internet site.

Winny has already stirred up considerable controversy within Japan this year. In March, a virus swept through the program, picking up investigation records from a Kyoto Prefectural Police officer's computer and whisking them around cyberspace. Other police documents and Self-Defense Force materials have also been spread across the Internet through Winny.
recommending news printable version
[PHCN] Security » Chrooting Unix Services
[PHCN] Security

Chrooting Unix Services
01.04.2005 • 04:13

The below linked documentation is a UNIX chrooting guide for Solaris and Linux. The guide describe HOWTO jail Apache, Tomcat and MySQL and offers template chrooting scripts.

This guide introduces appropriate steps when chrooting a UNIX service in its jail. Chrooting is one of the armoring tasks of the UNIX hardening procedure. It creates additional borders in case of zero day threats, where working hacking exploits could compromise the vulnerable system. Unfortunately, the initial steps of chrooting a specific service could lead into time-consuming procedure. This guide shall help understanding the chroot concept and giving motivation in really applying the chroot tasks for your public available services, such as Apache Web server.

The guide assumes the reader is using self-compiled versions of their running Internet services, instead of using prepared rpms' or UNIX packages.

It is advised creating an adequate chroot'ing script during the initial setup and engineering phase. This will speed up the time when UNIX administrators are patching and jailing new versions of their services. We expect UNIX administrators not chrooting services after a patching night, if this is not easy applicable. This paper offers template chrooting scripts for Linux and Solaris operating systems. Please use the provided template scripts with care and really read through the different section.

Source: http://www.csnc.ch/static/download/guide_chroot.html
recommending news printable version
Site(3): << back 1 2 (3) Newsarchive

Copyright 1999-2018 [PHCN] All rights reserved.
Terms of Use
CCBot/2.0 (http://commoncrawl.org/faq/) | ec2-54-158-194-80.compute-1.amazonaws.com