security

Michael Havens bmike1 at gmail.com
Tue Feb 11 11:21:14 MST 2014


how does one update my router/modem? I think I do:

192.168.0.1

in the address bar and then select an option for updating? (i'm not home at
the moment). Is it that simple? I've never updated it in the 5 years I've
had it.

:-)~MIKE~(-:


On Mon, Feb 10, 2014 at 10:15 PM, Michael Butash <michael at butash.net> wrote:

> This was one of the biggest reasons I forced myself into using linux
> full-time for a bit, and back around 2006 there wasn't much.  Ubuntu was
> about the first decent desktop os system I found that worked right out of
> box, and remained maintainable.  For a good while at least, these days not
> so much...
>
> Security is predatory with windoze, it's sad when things come to that, and
> it's been that way almost as long as there's been networking in 95,
> certainly before unknown.  They set the example for what NOT to do, but
> hard not to pick apart with all eyes on them.  Just look at child actors in
> comparison, they were there early, set the trend to build off, and eventual
> breakdown|crack out|win8|vista ensues in a healthy career, for a bit.
>
> When you have 99% marketshare, it becomes an impassable target for crime
> and exploitation.  Living open-source comes with some inherent benefit,
> security through obscurity.  I'll take it, just hiding yourself behind a
> firewall/router/nat-box, it works almost no concern.  I still apt-get
> dist-upgrade occasionally (and deal with the aftermath, usually on a long
> weekend).
>
> Oddly the most recent rash of exploitation for linux concerns mutable
> worms looking for infectable embedded firmware linux devices, looking for
> exposed services due to lack of updates once running, and they're common as
> almost every router runs it.  Linux has it's issues too, as security
> updates are still rather constant, with good reason.  Embedded routers and
> such are almost cherry-pickable if you leave them exposed and never
> updated.  Even openssh updates occasionally still for them.
>
> Using netstat -anp is a good idea.  More exactly:
>
> sudo netstat -anp | egrep 'tcp|udp' | grep LISTEN | grep -v 127
>
> Be wary of anything listening when on a publicly routable address, or your
> browser if a desktop.  Always hide behind a router/nat, and don't trust
> hotel/wifi networks.  Audit your listening socket/ports, they're open doors
> to screwing your os by anyone that can hit them.  Use noscript|notscript,
> adblock plus, and ghostery on chrome|chromium|firefox (never ie), you're
> generally good even on windoze.
>
> Many corps are adopting macs, mine included currently, that they're bound
> to grow as the next target.  We're adopting linux users through acquisition
> as well people like me living in the shadows against corporate policy, so
> the trend is shifting significantly that will recommit some targeting by
> government and criminals alike.  Google expelled windoze after targeted
> spearphishing/exploit by China, and it's becoming more of a trend all over.
>
> -mb
>
>
>
> On 02/10/2014 08:38 PM, eric oyen wrote:
>
>> well,
>> there are about exactly 8. There are also about 9 or 10 root kits and
>> perhaps half a dozen trojans. Compared to windows (at last count somewhere
>> north of 80,000 different items of malware).
>>
> ---------------------------------------------------
> PLUG-discuss mailing list - PLUG-discuss at lists.phxlinux.org
> To subscribe, unsubscribe, or to change your mail settings:
> http://lists.phxlinux.org/mailman/listinfo/plug-discuss
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.phxlinux.org/pipermail/plug-discuss/attachments/20140211/b432b53c/attachment.html>


More information about the PLUG-discuss mailing list