ISO Updates by Steve Scott Good news half of Windows computers have Trojans (less than 68% last year). Bad news - Stealth malware that is 100% undetectable has been developed using virtualization by Joanna Rutkowska. Wireless: hotspot won't need to be filtered per our lawyers. We will still limit p-2-p. Our wireless network will fall under CALEA - not private, but the University network in general probably doesn't fall under CALEA. We will have to provide law enforcement access to logs if requested, but we don't have to identify users. hping : Writes raw packets. Gives you the ability to see if a specific service is alive by creating a specific packet. Must have root access because you are crafting raw packets. Interface is simple (terminal window). You can Use hping like an nmap scanner. See www.hping.org
Publisher
Multimedia Center, Marriott Library
Type
Image
Format
video/mp4
Language
eng
Rights Management
Digital version copyright 2007, University of Utah. All rights reserved.
Holding Institution
Multimedia Center, Marriott Library, University of Utah