Network World
Thursday, April 24, 2014
DNSstuff.com
Get information about your IP
IP Information
50+ On-demand DNS and network tools
Error 404--Not Found

Error 404--Not Found

From RFC 2068 Hypertext Transfer Protocol -- HTTP/1.1:

10.4.5 404 Not Found

The server has not found anything matching the Request-URI. No indication is given of whether the condition is temporary or permanent.

If the server does not wish to make this information available to the client, the status code 403 (Forbidden) can be used instead. The 410 (Gone) status code SHOULD be used if the server knows, through some internally configurable mechanism, that an old resource is permanently unavailable and has no forwarding address.

Are rootkits really all bad?

Settlement in Sony CD case resurrects rootkit debate.

Page 2 of 4

Anti-virus vendors CA, Trend Micro and McAfee say they reject use of rootkits as a way to protect security software. “We call it stealth technology rather than rootkit technology, and by and large it’s a negative thing,” says Stuart McClure, senior vice president of global threat at McAfee.

Related links
Error 404--Not Found

Error 404--Not Found

From RFC 2068 Hypertext Transfer Protocol -- HTTP/1.1:

10.4.5 404 Not Found

The server has not found anything matching the Request-URI. No indication is given of whether the condition is temporary or permanent.

If the server does not wish to make this information available to the client, the status code 403 (Forbidden) can be used instead. The 410 (Gone) status code SHOULD be used if the server knows, through some internally configurable mechanism, that an old resource is permanently unavailable and has no forwarding address.

Facebook tries to break the news with FB Newswire
04/24/14
Facebook, looking to provide more valuable news information, is providing a new tool to that will post real-time content related to the day's news.

FCC defends new net neutrality proposal
04/24/14
A new net neutrality proposal from the U.S. Federal Communications Commission meets the goals of past efforts and does not destroy open Internet principles, as critics have feared, FCC officials said Thursday.

Verizon boosts revenue, income on mobile and broadband growth
04/24/14
Driven by growth in mobile and Fios broadband customers, Verizon Communications on Thursday reported first quarter 2014 revenue of $30.8 billion, up from $29.4 billion a year earlier.

But there are those who say stealth technologies can be ethical and shouldn’t be dismissed as absolutely evil.

“Rootkits are inherently deceptive, of course,” says Christine Olson, project manager with StopBadware.org, the Cambridge, Mass., group formed by Harvard University and Oxford University to provide the public with a detailed list of software programs deemed to be unethical, deceptive or dangerous. “But there are instances where the owner of the machine might want to deceive others using the machine” and would have the right to do so, she says.

James Butler, CTO at Komoku, a start-up funded by the Defense Advanced Research Projects Agency to develop ways to detect rootkits, says the debate that started after security researcher Mark Russinovich discovered the Sony rootkit remains murky.

“The debate centers around whether it’s acceptable for a company to install software that uses stealth in order to protect the company’s software from being detected,” he says. In Sony’s case, the way the software was written would allow an attacker to also use the stealth abilities to hide programs. “In the end, rootkits can be good or evil. It’s all in how they’re used,” he says.

Gartner security analyst John Pescatore asserts corporations could benefit from more rootkit-like applications, such as for monitoring employees. “Yes, there is a role for stealth in the enterprise world,” he says, adding that in the home PC environment, parents might want rootkit-like ways to monitor what their kids do on a home PC.