Showing posts with label security. Show all posts

Beware Of Comment Spam  

Posted by ajay karthick in , , , ,

It’s true that some folks still do not see spam as all that big of a threat. After all, it’s not really hurting anything, right? Wrong. The damage from comment spam is something that can if left unchecked, could even effect your site’s revenue and ranking.
 
According to this piece, comment spam not dealt with could actually affect your website’s ranking. Why is it such a big deal? Because you could be seen as allowing other sites to use yours to create problems with black hat SEO. It’s certainly not a good thing.

Luckily dealing with this problem is not really that big of a chore. Any decent CMS provides tools for stamping it out. The single best approach is to NEVER allow posting to your blog

without approval. Comments, posts, whatever. Unless it is a tightly knit community, you are just asking for trouble.

Original Post

CorreLog Windows Syslog Agent 3.1.0  

Posted by vinoth in , ,

The CorreLog Windows Agent comes with various services, programs and utilities installed via a standard Windows dialog on Windows workstation or server platforms, they are:

*Syslog Message Service. This is a compact but powerful Windows service, which listens for new events in the event log, and then converts these events to Syslog messages. The process uses minimal CPU and memory, and runs as a normal Windows service on XP, Vista, and 200X servers.
*Logfile Monitor Service. This is a compact but powerful utility program (actually incorporated in the CorreLog Syslog Message Service above, but separately enabled), which allows arbitrary log files to be instrumented with match patterns. When specific match patterns are detected in streaming log files, Syslog messages of the appropriate severity and facility are sent to the Syslog server program.
*Remote Management Utility. This utility provides encryption services, and remote configuration capabilities that allow large numbers of managed devices to be remotely configured from a central management console. This greatly assists in the periodic maintenance of encryption keys, or when performing group reconfigurations of correlation and filtering rules.
*Sendlog API. This is a simple API and command line utility that can be used by programs, or within Batch files, needed to send Syslog messages to CorreLog or another Syslog server host.


AdminDeviceLan 1.6  

Posted by vinoth in ,

Block operation of devices Flash, CD-ROM,FDD ... drives on network remote computers, thereby interferes thefts of the information from computers, unapproved installation of programs, to penetration of viruses from removable mass storages. Handle of probably any quantity of computers, but it is possible and on one. There is a batch mode which allows to set and carry out the job for several computers one click, possibility of saving of the job in a file or the menu command. Time synchronisation, inclusion and reboot of remote computers and others has additional functions. Possibility of concealment of the program from the user, the access prohibition to handle and customisations under the password. Intuitively clear interface, simplicity of operation


Microsoft's Security Freeware  

Posted by ajay karthick in , , ,

Microsoft says it's targeting unprotected computers with its free Security Essentials software, set for beta release next week and full launch this fall. Vendors who offer subscriptions to security services are bristling at Microsoft's characterization of its new offering. It's just another lightweight entry to the crowded security freeware field, said a Symantec official.

New Attack For Mac  

Posted by ajay karthick in , , , ,


Security experts have discovered two new attacks targeting Mac users, a new version of a worm and a Trojan hidden inside a porn site.

Sophos on Wednesday discovered a new version of the Mac OS X Tored worm, according to a Sophos blog post.

On Tuesday, Paretologic warned about a porn site that was downloading malware that targets both the PC and the Mac. Mac users get redirected to the pagemac.php page, which downloads a QuickTime.dmg file, the blog post says.

Sophos explained in blog post on Thursday that visitors to the malicious porn site are told they have to download an ActiveX component to view the videos. Instead, a Trojan, dubbed OSX/Jahlavc, gets downloaded.

Microsoft Security Advisory (971492)  

Posted by ajay karthick in ,


Vulnerability in Internet Information Services Could Allow Elevation of Privilege

Microsoft is investigating new public reports of a possible vulnerability in Microsoft Internet Information Services (IIS). An elevation of privilege vulnerability exists in the way that the WebDAV extension for IIS handles HTTP requests. An attacker could exploit this vulnerability by creating a specially crafted anonymous HTTP request to gain access to a location that typically requires authentication.

Microsoft Security Advisory (971778)  

Posted by ajay karthick in ,

Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution



Microsoft is investigating new public reports of a new vulnerability in Microsoft DirectX. The vulnerability could allow remote code execution if user opened a specially crafted QuickTime media file. Microsoft is aware of limited, active attacks that use this exploit code. While our investigation is ongoing, our investigation so far has shown that Windows 2000 Service Pack 4, Windows XP, and Windows Server 2003 are vulnerable; all versions of Windows Vista and Windows Server 2008 are not vulnerable. Microsoft has activated its Software Security Incident Response Process (SSIRP) and is continuing to investigate this issue.

read more on :