Re: security

Top Page
Attachments:
Message as email
+ (text/plain)
+ (text/html)
+ (text/plain)
Delete this message
Reply to this message
Author: Michael Havens
Date:  
To: Mike Butash, Main PLUG discussion list
Subject: Re: security
how does one update my router/modem? I think I do:

192.168.0.1

in the address bar and then select an option for updating? (i'm not home at
the moment). Is it that simple? I've never updated it in the 5 years I've
had it.

:-)~MIKE~(-:


On Mon, Feb 10, 2014 at 10:15 PM, Michael Butash <> wrote:

> This was one of the biggest reasons I forced myself into using linux
> full-time for a bit, and back around 2006 there wasn't much. Ubuntu was
> about the first decent desktop os system I found that worked right out of
> box, and remained maintainable. For a good while at least, these days not
> so much...
>
> Security is predatory with windoze, it's sad when things come to that, and
> it's been that way almost as long as there's been networking in 95,
> certainly before unknown. They set the example for what NOT to do, but
> hard not to pick apart with all eyes on them. Just look at child actors in
> comparison, they were there early, set the trend to build off, and eventual
> breakdown|crack out|win8|vista ensues in a healthy career, for a bit.
>
> When you have 99% marketshare, it becomes an impassable target for crime
> and exploitation. Living open-source comes with some inherent benefit,
> security through obscurity. I'll take it, just hiding yourself behind a
> firewall/router/nat-box, it works almost no concern. I still apt-get
> dist-upgrade occasionally (and deal with the aftermath, usually on a long
> weekend).
>
> Oddly the most recent rash of exploitation for linux concerns mutable
> worms looking for infectable embedded firmware linux devices, looking for
> exposed services due to lack of updates once running, and they're common as
> almost every router runs it. Linux has it's issues too, as security
> updates are still rather constant, with good reason. Embedded routers and
> such are almost cherry-pickable if you leave them exposed and never
> updated. Even openssh updates occasionally still for them.
>
> Using netstat -anp is a good idea. More exactly:
>
> sudo netstat -anp | egrep 'tcp|udp' | grep LISTEN | grep -v 127
>
> Be wary of anything listening when on a publicly routable address, or your
> browser if a desktop. Always hide behind a router/nat, and don't trust
> hotel/wifi networks. Audit your listening socket/ports, they're open doors
> to screwing your os by anyone that can hit them. Use noscript|notscript,
> adblock plus, and ghostery on chrome|chromium|firefox (never ie), you're
> generally good even on windoze.
>
> Many corps are adopting macs, mine included currently, that they're bound
> to grow as the next target. We're adopting linux users through acquisition
> as well people like me living in the shadows against corporate policy, so
> the trend is shifting significantly that will recommit some targeting by
> government and criminals alike. Google expelled windoze after targeted
> spearphishing/exploit by China, and it's becoming more of a trend all over.
>
> -mb
>
>
>
> On 02/10/2014 08:38 PM, eric oyen wrote:
>
>> well,
>> there are about exactly 8. There are also about 9 or 10 root kits and
>> perhaps half a dozen trojans. Compared to windows (at last count somewhere
>> north of 80,000 different items of malware).
>>
> ---------------------------------------------------
> PLUG-discuss mailing list -
> To subscribe, unsubscribe, or to change your mail settings:
> http://lists.phxlinux.org/mailman/listinfo/plug-discuss
>

---------------------------------------------------
PLUG-discuss mailing list -
To subscribe, unsubscribe, or to change your mail settings:
http://lists.phxlinux.org/mailman/listinfo/plug-discuss