Windows NT Magazene security update - December 15, 1999. Contains You Have the Right to Surf Anonymously, SQL Server 7.0 SA Password, NT Subject to Denial of Service, NT Help File Attack, News: Most Cybercrime Goes Unpunished, News: Microsoft Releases Smart Card Toolkit, Practical Recommendations for Post-Y2K, Enterprise Firewall with Security-Compliant VPN, and Monitor Data Before It Reaches the OS. NTsecurity homepage here.
ff2a51b4aa6c31bd1316ffd02d7ca35e600d78e844b7b78b74b17c42d2a92ee4
Linux IDS Patch - Version 0.6.1 - Dec 15, 1999. Lids is an intrusion detection system in the Linux kernel. This patch (Version 0.6.1) is for the Linux kernel 2.2.13. LIDS 0.6 has a brand new design. When LIDS is in effect, no one (including root) can change the protected files or directories and their sub-directories, and the protected append-only files can only be appended. It can also protect the hard disk's MBR, and can also disallow sniffing while the NIC is in promiscuous mode.
8f3d6c23cf974e691bb4acd3e6b9334065f2817f6d687e7890389e174fcb2992
A security hole was found in wvdial which can allow regular users access to dialup passwords. SuSE security website here.
6691e23fba7b944f3c30ec907d9f37340be3a0d009a6325713258f1fe960d70d
Hackers Information Report #10. Contains Defcon 7 in a nutshell, Flying Below The Radar: Avoiding IDS Systems, BeOS Revealed, RISC, CISC and The concept of the Power-PC, and Hacker News.
459b158b9f77b46da2f7d1e38a0f4641acadf6ff0ec6b6c27e325bdc8828808f
Redir is a port redirector. Its functionality basically consists of the ability to listen for TCP connections on a given port, and, when it recieves a connection, to then connect to a given destination address/port, and pass data between them. It finds most of its applications in traversing firewalls, but, of course, there are other uses. It can run under inetd or stand alone (in which case it handles multiple connections).
92949cf1a5287eecd3e62720d93e1001301c2619ee74df07ba72119b66e20340
SunOS 5.4-5.5 statd remote exploit - in perl.
bd7ebae8ad5e5928d82da9b192e8e4a352c9277ff460e4561511c0ae7b227593
Some testing code I put together to try on a friend's old machine, it essentially tries to overflow the DISPLAY variable in X-based programs.
7613d5b29ec47d7d33a9be662b0d6ff29d63ff54026a3473136af5f95fc5b577
logsurfer is a log checking/auditing tool similar to swatch and logcheck but with the capability of handling multi-line messages and dynamically adapting the ruleset. It is written in portable C, well documented, fast, and flexible. It works on any textfile or stdin, can be run at intervals or continuously, and has timeouts and resource limits.
21fea4e03efe6f7b0246e5cbaf9b643e3c5d2c9a8e3c0eab39498b35004142a8
Encrypted Magic Folders (EMF) gives you automated & transparent encryption! Select folders whose files you want encrypted and EMF not only makes those folders and files completely invisible to others but decrypts and encrypts the files automatically and transparently as you use them. You won't even know you're using encrypted files as EMF does all the work behind the scenes.
458824b2a2162ff6b87ac0ac9c6ba0aa3e1f456231db0bef619b4ae0f2339f15
SPIRO-Bastille is an adaption of the original Bastille-Linux product. This version checks the SPIRO-Linux website for security updates, and hardens the system from various attacks. It fixes permissions, ftpd, inetd, console security, and remote access, among other issues.
3079cff865e45a2caa315bb50c162f95c9a5f0f2f253732a97d8a71cecc48982