A Solaris worm which attacks IIS web servers

CERT has a new advisory on a Solaris worm which systematically attacks and defaces web servers running certain unpatched versions of IIS.

CERT has a new advisory on a Solaris worm which systematically attacks and defaces web servers running certain unpatched versions of IIS.

Shared Source

Florian Weimer pointed to Microsoft’s Remarks on “Shared Source” on FITUG’s debate mailing list.

Florian Weimer pointed to Microsoft’s Remarks on “Shared Source” on FITUG’s debate mailing list.

AOL vs. Microsoft: Windows XP

As Heise and betanews.com report, AOL doesn’t like Windows XP too much, and ponders to torpedo the new Windows version.

As Heise and betanews.com report, AOL doesn’t like Windows XP too much, and ponders to torpedo the new Windows version.

BerliOS: Germany’s SourceForge clone.

I learned today that Germany has a Sourceforge clone: Have a look at http://www.berlios.de for details.

I learned today that Germany has a Sourceforge clone: Have a look at www.berlios.de for details.

EU: Workshop on safer use of new interactive technologies.

From Richard Swetenham’s Quicklinks list: The European Commission is organising a workshop on safer use of new interactive technologies in Luxembourg on 11 and 12 June. […] The objective of the workshop is to produce a report which analyses new …

From Richard Swetenham’s Quicklinks list: The European Commission is organising a workshop on safer use of new interactive technologies in Luxembourg on 11 and 12 June. […] The objective of the workshop is to produce a report which analyses new means of content delivery from the angle of illegal and harmful content/contact. The report should contain requirements and options for future EU action.

Scan of the Month: May 2001.

The Honeynet Project has an easy forensic challenge as May’s Scan of the Month: Identify and recover a deleted rootkit from a compromised Linux system. Nice exercise for starters! (If you are looking for a more sophisticated exercise in incident h…

The Honeynet Project has an easy forensic challenge as May’s Scan of the Month: Identify and recover a deleted rootkit from a compromised Linux system. Nice exercise for starters! (If you are looking for a more sophisticated exercise in incident handling, look at their Forensic Challenge. The solutions have been posted, but you can still just try to solve it, before reading what others have done.)

No such Weblog.

This web log does, of course, not exist. It’s, just like most of its colleagues, intended to serve as a repository for random notes and links I find interesting. I’ll try to update this right column semi-regularly. Enjoy. Thomas Roessler

This web log does, of course, not exist.

It’s, just like most of its colleagues, intended to serve as a repository for random notes and links I find interesting. I’ll try to update this right column semi-regularly.

Enjoy.

Thomas Roessler <roessler@does-not-exist.org>