Originally to: All

SecurityFocus Linux Newsletter #122
-----------------------------------

I. FRONT AND CENTER
     1. Cryptographic Filesystems: Design and Implementation
     2. Windows Forensics - A Case Study: Part Two
     3. An Analysis of Simile
     4. Spam Wars Make Strange Bedfellows
     5. SecurityFocus DPP Program
     6. InfoSec World Conference and Expo/2003(March10-12,2003,Orlando,FL)
II. LINUX VULNERABILITY SUMMARY
     1. Web-ERP Configuration File Remote Access Vulnerability
     2. GTCatalog Remote File Include Vulnerability
     3. File Local Stack Overflow Code Execution Vulnerability
     4. PY-Livredor index.php HTML Injection Vulnerability
     5. TCPDump Malformed ISAKMP Packet Denial Of Service Vulnerability
     6. File Utility Local Memory Allocation Vulnerability
     7. iPlanet 6.0 Log Viewing Utility Concealed Log Entry Vulnerability
     8. Sn ort RPC Preprocessor Fragment Reassembly Buffer Overflow...
     9. Typo3 Showpic.PHP File Enumeration Vulnerability
     10. Apple QuickTime/Darwin Streaming Server parse_xml.cgi File...
     11. Sendmail Header Processing Buffer Overflow Vulnerability
     12. iPlanet Log Analyzer Logfile HTML Injection Vulnerability
     13. Hypermail CGI Mail Open Relay Vulnerability
     14. Typo3 Log HTML Injection Vulnerability
     15. Typo3 Translations.PHP Remote File Include Vulnerability
     16. Typo3 Translations.PHP File Disclosure Vulnerability
     19. Hypermail Local Temporary File Race Condition Vulnerability
     20. Ecartis Hidden Form Field Password Modification Vulnerability
     22. Typo3 Runtime Error Page Information Disclosure Vulnerability
III. LINUX FOCUS LIST SUMMARY
     1. Port 113 security (Thread)
     2. Red Hat Network updates (Thread)
     3. Reviewed the rhn code ..  Red Hat Network updates (Thread)
     4. Availability of Sendmail fix (Thread)
     5. chroot, scp and security on RedHat 8.0 (Thread)
     6. What Is hosts2-ns (Thread)
     7. Article Announcement: Secure MySQL Database Design (Thread)
IV. NEW PRODUCTS FOR LINUX PLATFORM
     1. N2H2 Sentian
     2. iomart NetIntelligence
     3. PureSight
V. NEW TOOLS FOR LINUX PLATFORMS
     1. DiskZapper v1.0
     2. pmacct v0.2.3
     3. GPassGuard v0.01alpha


I. FRONT AND CENTER
-------------------
1. Cryptographic Filesystems: Design and Implementation By Ido Dubrawsky

Cryptographic filesystems have recently come to the forefront of security. This 
article will discuss some of the background and technology of cryptographic 
filesystems and will then cover some example implementations of these 
filesystems including Microsoft's Encrypting File System for Windows 2000, the 
Linux CryptoAPI, and the Secure File System.

http://www.securityfocus.com/infocus/1673

2. Windows Forensics - A Case Study: Part Two By Stephen Barish

This article is the second in a two-part series that will offer a case study of 
forensics in a Windows environment. This article deals with determining the 
scope of the compromise, and understanding what the attacker is trying to 
accomplish at the network level. Along the way, we'll be discussing some tools 
and techniques that are useful in this type of detective work.

http://www.securityfocus.com/infocus/1672

3.  An Analysis of Simile
by Adrian Marinescu

Virus writers have always tried to develop new methods to make malware detection 
more difficult. For instance, encryption was a natural step in virus evolution 
when scanners started to use databases with scan strings for detection. When 
scanners started to handle encryption patterns generically, first oligomorphism 
(a limited form of polymorphism - the polymorphic decryptor can have a strictly 
limited, relatively small number of shapes) and then polymorphism were 
introduced.

http://www.securityfocus.com/infocus/1671

4. Spam Wars Make Strange Bedfellows By Jon Lasser

The open-source community is closer than ever to curing the spam problem, but 
they'll have to hold their noses and help out Windows users to get there.

http://www.securityfocus.com/columnists/146

5. SecurityFocus DPP Program

Attention Universities!! Sign-up now for preferred pricing on the only global 
early-warning system for cyber attacks - SecurityFocus DeepSight Threat 
Management System.

Click here for more information:
http://www.securityfocus.com/corporate/products/dpsection.shtml

6. InfoSec World Conference and Expo/2003 (March 10-12, 2003, Orlando, FL)

Optional Workshops March 8, 9, 12, 13, & 14 Vendor Expo March 10 & 11

Solutions to today’s security concerns; hands-on experts; blockbuster vendor 
expo; the CISO Executive Summit; invaluable networking opportunities.  InfoSec 
World has it all!

Go to: http://www.misti.com/10/os03nl37inf.html


II. BUGTRAQ SUMMARY
-------------------
1. Web-ERP Configuration File Remote Access Vulnerability BugTraq ID: 6996
Remote: Yes
Date Published: Mar 01 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/6996
Summary:

Web-ERP is a freely available, open source internationalized Enterprise Resource 
Planning package.  It is available for the Unix and Linux operating systems.

A problem may make it possible for remote users to gain unauthorized access to 
Web-ERP information.

It has been reported that Web-ERP does not sufficiently restrict access to it's 
configuration information.  Because of this, an attacker may be able to remotely 
access Web-ERP information, and potentially gain access to information that is 
sensitive in nature.

The problem is in the storage of the Web-ERP configuration file.  By default, 
configuration information is stored in the /logicworks.ini file. This file is by 
default accessible to any user that has access to the web server on which 
Web-ERP is hosted.  An attacker could gain information such as the MySQL 
username and password from this file.

2. GTCatalog Remote File Include Vulnerability BugTraq ID: 6998
Remote: Yes
Date Published: Mar 03 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/6998
Summary:

GTCatalog is software designed to maintain a catalog of products. It is 
implemented in PHP and is available for a variety of platforms including 
Microsoft Windows and Linux variant operating systems.

GTCatalog is prone to an issue that may allow remote attackers to include files 
located on attacker-controlled servers.

This vulnerability is as a result of insufficient sanitization performed on 
remote user supplied data. Specifically the PHP script file 'index.php' is 
vulnerable to this issue.

Under some circumstances, it is possible for remote attackers to influence the 
include path for files ending with '.custom.inc' to point to an external file on 
a remote server by manipulating the '$function' and
'$custom' URI parameters.

If the remote file is a malicious file, this may be exploited to execute 
arbitrary system commands in the context of the web server.

This vulnerability was reported for GTCatalog 0.9.1 and earlier.

3. File Local Stack Overflow Code Execution Vulnerability BugTraq ID: 7008
Remote: No
Date Published: Mar 04 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/7008
Summary:

file is a freely available, open source program available for Unix and Linux 
operating systems.

A problem with the program may result in the execution of attacker-supplied 
instructions.

It has been reported that a stack overflow exists the file program. Although 
details of this issue are currently unavailable, it is likely that this issue 
could be exploited to execute code as the user of the file utility.

This vulnerability would require an attacker to create the malicious code and 
place it in a critical portion of the file.  Once a user executes the file 
utility against this file, malicious code embedded in the ELF header would 
likely be executed with the privileges of the file utility user.

It should also be noted that the file program may be executed by other 
applications on the system, some of which execute with privileges.  This is true 
of LPRNG, which executes the file utility in the master-filter script.  
Exploitation may also occur through applications such as less, which execute the 
file utility when loading a file into the viewer.

4. PY-Livredor index.php HTML Injection Vulnerability BugTraq ID: 6997
Remote: Yes
Date Published: Mar 03 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/6997
Summary:

PY-Livredor is freely available guestbook software. It will run on most Unix and 
Linux variants, as well as Microsoft Windows operating systems.

PY-Livredor does not adequately filter HTML tags from various fields on the 
'index.php' page. Specifically, an attacker may be able to insert malicious HTML 
code into the "titre", "Votre pseudo", "Votre e-mail", "Votre message" fields.

The attacker's code may be executed in the web client of users who view the 
pages generated by the guestbook, in the security context of the website hosting 
the software.

Attackers may potentially exploit this issue to hijack web content or to steal 
cookie-based authentication credentials.

This vulnerability has been reported for PY-Livredor version 1.0.

5. TCPDump Malformed ISAKMP Packet Denial Of Service Vulnerability BugTraq ID: 
6974
Remote: Yes
Date Published: Feb 27 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/6974
Summary:

tcpdump is a freely available, open source network monitoring tool.  It is 
available for the Unix, Linux, and Microsoft Windows operating systems.

A vulnerability in the processing of some packet types may result in an 
inability to further use the tcpdump application.

It has been reported that tcpdump is vulnerable to a denial of service when some 
packet types are received.  By sending a maliciously formatted packet to a 
system using a vulnerable version of tcpdump, it is possible for a remote user 
to cause tcpdump to ignore network traffic from the time the packet is received 
until the application is terminated and restarted.

The problem is in the handling of ISAKMP packets.  When tcpdump receives a 
maliciously crafted ISAKMP packet, the application enters an infinite loop and 
ceases to further monitor network traffic.  This could allow the passing of 
undetected network traffic that would typically be seen by tcpdump.

6. File Utility Local Memory Allocation Vulnerability BugTraq ID: 7009
Remote: No
Date Published: Mar 04 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/7009
Summary:

file is a freely available, open source program available for Unix and Linux 
operating systems.

A problem with the program may result in a denial of service, and may 
potentially allow the execution of attacker-supplied instructions.

It has been reported that a memory allocation issue exists the file program.  
Although details of this issue are currently unavailable, it is likely that this 
issue could be exploited to cause a denial of service condition, and potentially 
execute code as the user of the file utility.

This problem has been reported as a memory allocation problem.  Though 
unconfirmed, this vulnerability is likely either a heap overflow, or a 
double-free problem.  In either circumstance, it would require an attacker to 
create the malicious code and place it in a critical portion of the file.  Once 
a user executes the file utility against this file, malicious code embedded in 
the file would likely be executed with the privileges of the file utility user.

It should also be noted that the file program may be executed by other 
applications on the system, some of which execute with privileges.  This is true 
of LPRNG, which executes the file utility in the master-filter script.  
Exploitation may also occur through applications such as less, which execute the 
file utility when loading a file into the viewer.

7. iPlanet 6.0 Log Viewing Utility Concealed Log Entry Vulnerability BugTraq ID: 
7012
Remote: Yes
Date Published: Mar 04 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/7012
Summary:

iPlanet is an HTTP server product. It is available for a number of platforms, 
including Unix and Linux variants and Microsoft Windows operating systems.

A vulnerability has been reported for iPlanet that may conceal malicious log 
entries from the 'View Access Log' and 'View Error Log' utilities. The problem 
occurs due to the utilities' parsing of the 'Format=' string, which is typically 
used to specify log entry formatting.

An attacker can exploit this vulnerability by generating a log entry using a 
hostname which is prepended with the 'Format=' string. Because the data supplied 
as the 'Format' will not be recognized by the said utilities, the log entry will 
be not be shown.

It should be noted that viewing the log data with other utilities, such as a 
text-based editor, will disclose the malicious entries.

8. Snort RPC Preprocessor Fragment Reassembly Buffer Overflow Vulnerability 
BugTraq ID: 6963
Remote: Yes
Date Published: Mar 03 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/6963
Summary:

Snort is an open-source network intrusion detection system.

A vulnerability in the Snort network IDS has been discovered that may allow for 
remote attackers to compromise hosts using the system.  The vulnerability is due 
to a programmatic flaw in the RPC preprocessor.

The condition is in the procedure "ConvertRPC()" and occurs during the 
reassembly of fragmented records.  This operation uses a loop that iterates once 
for each fragment copied to a buffer.

A check put in place to ensure that the total amount of data copied is not 
greater than the size of the buffer is flawed:

        if(length > size)
        {
            DEBUG_WRAP(DebugMessage(DEBUG_FLOW, "WARNING: rpc_decode
calculated bad "
                        "length: %d\n", length););
            return;
        }
        else
        {
            total_len += length;
            index += 4;
            for (i=0; i < length; i++,rpc++,index++,hdrptr++)
                *rpc = *index;
        }


The expression, "if(length > size)", only verifies that the length of the 
current fragment is not greater than the total buffer size.  The amount of data 
already written to the buffer is not checked.  Consequently, it is possible to 
write beyond the buffer and over potentially sensitive memory:

            for (i=0; i < length; i++,rpc++,index++,hdrptr++)
                *rpc = *index;

Attackers can exploit this vulnerability by transmitting malicious packets 
across a network monitored by Snort.  Successful attacks may result in the 
execution of instructions on the IDS system with root privileges.

9. Typo3 Showpic.PHP File Enumeration Vulnerability BugTraq ID: 6982
Remote: Yes
Date Published: Feb 28 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/6982
Summary:

TYPO3 is a web-based content management system.  It is available for Microsoft 
Windows operating systems and Unix and Linux variants.

TYPO3 is prone to a vulnerability that will allow remote attackers to enumerate 
whether or not files exist on the system hosting the software. This issue exists 
in the 'showpic.php' and 'thumbs.php' scripts and may be exploited by submitting 
a malicious request for a file (including the relative path).  These scripts 
will return information about whether or not a file exists.

This type of information may be useful in mounting further attacks against the 
host system, since the scripts will reveal information about the layout of the 
host's filesystem.

10. Apple QuickTime/Darwin Streaming Server parse_xml.cgi File Disclosure 
Vulnerability
BugTraq ID: 6990
Remote: Yes
Date Published: Feb 28 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/6990
Summary:

QuickTime/Darwin Streaming Administration Server is server technology which 
allows you to send streaming QuickTime data to clients across the Internet.

A file retrieval vulnerability has been reported for QuickTime/Darwin Streaming 
Server (SS). The vulnerability exists due to insufficient sanitization of some 
parameters given to the parse_xml.cgi script. Specifically, directory traversal 
sequences are not sanitized from the value supplied to the 'filename' URI 
parameter. Information obtained in this manner may be used by an attacker to 
launch more organinzed attacks against a vulnerable system.

An attacker may exploit this vulnerability by making a request to the 
parse_xml.cgi script containing dot-dot-slash ('../') sequences followed by a 
filename. When the malicious request is processed, the Streaming Server will 
disclose the contents of the file to an attacker.

This vulnerability was tested on SS for Microsoft Windows systems. Linux 
versions of Darwin SS are reportedly not vulnerable to this issue.

11. Sendmail Header Processing Buffer Overflow Vulnerability BugTraq ID: 6991
Remote: Yes
Date Published: Mar 02 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/6991
Summary:

Sendmail is a widely used MTA for Unix and Microsoft Windows systems.

A remotely exploitable vulnerability has been discovered in Sendmail. The 
vulnerability is due to a buffer overflow condition in the SMTP header parsing 
component.  Remote attackers may exploit this vulnerability by connecting to 
target SMTP servers and transmitting to them malformed SMTP data.

The overflow condition occurs when Sendmail processes addresses or lists of 
addresses in fields such as "From:" or "CC:".  One of the checks to ensure that 
the addresses are valid is flawed, resulting in a buffer overflow condition.  
Successful attackers may exploit this vulnerability to gain root privileges on 
affected servers remotely.

It has been reported that this vulnerability may possibly be locally exploitable 
if the sendmail binary is setuid/setgid.

Versions 5.2 to 8.12.7 are affected.  Administrators are advised to upgrade to 
8.12.8 or apply available patches to prior versions of the 8.x tree.

12. iPlanet Log Analyzer Logfile HTML Injection Vulnerability BugTraq ID: 7017
Remote: Yes
Date Published: Mar 04 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/7017
Summary:

iPlanet is an enterprise web server software package with a built-in tool for 
viewing webserver logs.  It is available for Microsoft Windows, Unix, and Linux 
operating systems.

iPlanet does not sufficiently sanitize HTML when logging requests.  If malicious 
data containing HTML and script code is logged and then viewed using the log 
viewing software, exploitation will occur.  Through exploitation of this issue, 
it will be possible to falsify log information and execute arbitrary script code 
in the web client of the user viewing the logs.

This issue has been demonstrated when the log analysis software renders a 
malicious hostname which contains hostile HTML or script code, which was logged 
when the server did an inverse lookup of hostname data.  This is only one 
possible scenario, and it is likely that data other than the hostname is not 
sufficiently filtered.

This issue occurs when viewing logs in both HTML and text mode.

13. Hypermail CGI Mail Open Relay Vulnerability BugTraq ID: 6973
Remote: Yes
Date Published: Feb 27 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/6973
Summary:

Hypermail is a freely available tool that converts email into HTML format.

It has been reported that Hypermail's CGI-based mail program is prone to a 
condition that may allow attackers to abuse the service as an open mail relay.

This may allow attackers to send mass mails through the vulnerable software. It 
may also be possible to forge a source address to masquerade as a trusted email 
user in an attempt to gather information that may be useful in further attacks 
against the vulnerable system.

Full details of this vulnerability are not currently known. BID will be updated 
as further details are disclosed.

14. Typo3 Log HTML Injection Vulnerability BugTraq ID: 6983
Remote: Yes
Date Published: Feb 28 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/6983
Summary:

TYPO3 is a web-based content management system.  It is available for Microsoft 
Windows operating systems and Unix and Linux variants.

TYP03 logs all system and access related errors in the TYPO3 database and 
provides a facility for administrators to view this information from the web.  
However, data is not sanitized of HTML before being logged.  As a result, remote 
attackers may inject malicious HTML and script code into log files.  When these 
logs are viewed, the hostile code will be interpreted in the web client of the 
user viewing the logs.

This may allow for theft of administrative cookie-based authentication 
credentials and other attacks.

15. Typo3 Translations.PHP Remote File Include Vulnerability BugTraq ID: 6984
Remote: Yes
Date Published: Feb 28 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/6984
Summary:

TYPO3 is a web-based content management system.  It is available for Microsoft 
Windows operating systems and Unix and Linux variants.

TYPO3 is prone to an issue that may allow remote attackers to include files 
located on attacker-controlled servers.

This vulnerability is as a result of insufficient sanitization performed on 
remote user supplied data used by a URI parameter of the
'translations.php' PHP page.

Under some circumstances, it is possible for remote attackers to influence the 
path for an include file to point to an external file by manipulating the 
'$ONLY' URI parameter.

If the remote file is a malicious file, this may be exploited to execute 
arbitrary system commands in the context of the web server.

16. Typo3 Translations.PHP File Disclosure Vulnerability BugTraq ID: 6985
Remote: Yes
Date Published: Feb 28 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/6985
Summary:

TYPO3 is a web-based content management system.  It is available for Microsoft 
Windows operating systems and Unix and Linux variants.

TYPO3 does not sufficiently sanitize input submitted via URI parameters of 
potentially malicious data.  This issue exists in the 'translations.php' script. 
 Specifically, variations of directory traversal sequences and null characters 
(%00) may be specified as a value for the 'ONLY' URI parameter.  By submitting a 
malicious web request to this script that contains a relative path to a resource 
and a null character (%00), it is possible to retrieve arbitrary files that are 
readable by the web server process.

Successful exploitation will permit the attacker to gain access to sensitive 
information that may aid in mounting further attacks against the system hosting 
the software.

17. Typo3 Webroot Folders Information Disclosure Weakness BugTraq ID: 6988
Remote: Yes
Date Published: Feb 28 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/6988
Summary:

TYPO3 is a web-based content management system.  It is available for Microsoft 
Windows operating systems and Unix and Linux variants.

It has been reported that TYPO3 installs, by default, several directories into 
the TYPO3 webroot. These directories are reportedly readable or lacking 
sufficient authentication mechanisms and contain log, configuration and script 
files. This weakness may result in the disclosure of sensitive system based 
information to malicious web users.

The following directories and files have been reported to be prone to this 
issue: /install /fileadmin/ /typo3conf/

The information gathered as a result of this weakness may be used in further 
attacks against the system.

18. Typo3 HTML Hidden Form Field Information Disclosure Weakness BugTraq ID: 
6993
Remote: Yes
Date Published: Feb 28 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/6993
Summary:

TYPO3 is a web-based content management system. It is available for Microsoft 
Windows operating systems and Unix and Linux variants.

Clients of TYPO3 systems may access potentially sensitive data that have been 
obfuscated through hidden form fields. Such fields may contain potentially 
sensitive information which may provide determined attackers with valuable 
information which may be useful in exploiting other known issues in the 
software.

This vulnerability was reported for TYPO3 3.5b5.

19. Hypermail Local Temporary File Race Condition Vulnerability BugTraq ID: 6975
Remote: No
Date Published: Feb 27 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/6975
Summary:

Hypermail is a freely available tool that converts email into HTML format.

A problem with Hypermail may make local symbolic link attacks possible.

It has been reported that Hypermail is vulnerable to a race condition error. 
Under some circumstances, Hypermail creates files in the temporary directory. 
However, it may be possible to create a symbolic link in a crucial point of 
program execution that would result in the overwriting of files pointed to by 
the link. This will only occur if the files are writeable by the Hypermail 
process.

Successful exploitation may cause local files to be corrupted. If files can be 
corrupted with custom data, this may result in privilege elevation.

Full details of this vulnerability are not currently known. The BID will be 
updated as further details are disclosed.

20. Ecartis Hidden Form Field Password Modification Vulnerability BugTraq ID: 
6971
Remote: Yes
Date Published: Feb 27 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/6971
Summary:

Ecartis is a mailing list management package for Linux, BSD, and other Unix 
variant operating systems.

A vulnerability has been reported for Ecartis that may allow attackers to modify 
passwords.

An attacker can exploit this vulnerability by first saving a form locally and 
modifying hidden fields in the saved HTML pages and submitting them. This will 
allow an attacker to authenticate as a privileged user of Ecartis and modify 
passwords.

It is also possible to use tools such as curl to post arbitrary form data.

This vulnerability was reported for Ecartis 1.0.0-snap20021013. It is likely 
that other version are affected.

21. Netscape Communicator Password Disclosure Weakness BugTraq ID: 6981
Remote: No
Date Published: Feb 28 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/6981
Summary:

Netscape Communicator is a combined web browser and e-Mail Client developed for 
a variety of platforms including Microsoft Windows, Linux and Unix variant 
operating environments.

It has been reported that the Netscape Communicator roaming profile function may 
store sensitive user credentials in the 'prefs.js' configuration file using 
plaintext or easily disclosed format.

This weakness may result in an attacker accessing sensitive user credentials 
that may be used in further attacks launched against the system.

Conflicting details have been reported suggesting that perhaps this issue may be 
due to a user initiated configuration change and that password data may be 
encrypted using a trivial XOR based encryption algorithm by default.

This report is closely related to the issue described in BID 6215.

22. Typo3 Runtime Error Page Information Disclosure Vulnerability BugTraq ID: 
6986
Remote: Yes
Date Published: Feb 28 2003 12:00AM Relevant URL:
http://www.securityfocus.com/bid/6986
Summary:

TYPO3 is a web-based content management system.  It is available for Microsoft 
Windows operating systems and Unix and Linux variants.

An information disclosure vulnerability has been reported for TYPO3. The 
vulnerability exists in several 'test', 'class' and 'library' scripts that are 
included with TYPO3.

These scripts may be forced to execute and generate runtime errors. When these 
errors occur, the scripts will output path information.

Information obtained in this manner may be used by an attacker to launch further 
attacks against a vulnerable system.


IV. LINUX FOCUS LIST SUMMARY
----------------------------
1. Port 113 security (Thread)
Relevant URL:

http://online.securityfocus.com/archive/91/314192

2. Red Hat Network updates (Thread) Relevant URL:

http://online.securityfocus.com/archive/91/314193

3. Reviewed the rhn code ..  Red Hat Network updates (Thread) Relevant URL:

http://online.securityfocus.com/archive/91/314126

4. Availability of Sendmail fix (Thread) Relevant URL:

http://online.securityfocus.com/archive/91/314058

5. chroot, scp and security on RedHat 8.0 (Thread) Relevant URL:

http://online.securityfocus.com/archive/91/314036

6. What Is hosts2-ns (Thread)
Relevant URL:

http://online.securityfocus.com/archive/91/313811

7. Article Announcement: Secure MySQL Database Design (Thread) Relevant URL:

http://online.securityfocus.com/archive/91/313541


IV. NEW PRODUCTS FOR LINUX PLATFORM
-----------------------------------
1. N2H2 Sentian
by N2H2
Platforms: Linux, Windows 2000, Windows 95/98, Windows NT, Windows XP Relevant 
URL:
http://www.n2h2.com/products/sentian_home.php
Summary:

Sentian filtering software works with a wide variety of implementations to meet 
the needs of organizations both large and small. Whichever device you prefer, 
every Sentian product uses the categorized filtering database recognized as the 
most effective available.

2. iomart NetIntelligence
by iomart
Platforms: AIX, Linux, Netware, Solaris, Windows 2000, Windows 95/98, Windows 
NT, Windows XP
Relevant URL:
http://www.netintelligence.com/
Summary:

The NetIntelligence product consists of a main reports interface which is 
supported by easy to use administration tools. NetIntelligence has a deployment 
application which is purpose built for straightforward rollout of the product. 
Thereafter the main technical interface is via the administration console which 
allows the administrator to establish policies, user and machine groups- and 
delegate reporting authority to specified users within the organisation. Custom 
content allows bespoke fingerprinting as required. Web-blocking gives policy 
control over Internet Usage.

3. PureSight
by iCognito
Platforms: Linux, Solaris, Windows 2000, Windows NT Relevant URL:
http://www.icognito.com/Products/PureSightHomeDescription.shtml
Summary:

PureSight Home is a powerful tool that helps parents and other concerned users 
embrace technology in their homes while safeguarding the family from intentional 
or accidental viewing of inappropriate content. PureSight Home provides maximal 
protection from objectionable materials on the web without the need for costly 
and time-consuming updates. Easily installed and customized, the 
password-protected tool can be readily set and modified according to parental 
preferences.


V. NEW TOOLS FOR LINUX PLATFORMS
--------------------------------
1. DiskZapper v1.0
by Phil Howard
Relevant URL:
http://diskzapper.com/
Platforms: N/A
Summary:

DiskZapper is a Linux-based bootable (floppy or CD-ROM) tool intended to wipe 
all hard drives on the machine it runs on to binary zero. This is intended for 
uses such as making sure old computers or hard drives being sold or trashed are 
clear of any confidential data, and to be sure certain computers are clear of 
any unlicensed software in the event the software

[continued in next message]


Posted at TCOB1 - Must not be crossposted to any other echo or network without 
the prior permission of Sean Rima


-
To unsubscribe from this list: send the line "unsubscribe linux-newbie" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.linux-learn.org/faqs

Reply via email to