Network World
Friday, April 18, 2014
DNSstuff.com
Get information about your IP
IP Information
50+ On-demand DNS and network tools
Error 404--Not Found

Error 404--Not Found

From RFC 2068 Hypertext Transfer Protocol -- HTTP/1.1:

10.4.5 404 Not Found

The server has not found anything matching the Request-URI. No indication is given of whether the condition is temporary or permanent.

If the server does not wish to make this information available to the client, the status code 403 (Forbidden) can be used instead. The 410 (Gone) status code SHOULD be used if the server knows, through some internally configurable mechanism, that an old resource is permanently unavailable and has no forwarding address.

Are rootkits really all bad?

Settlement in Sony CD case resurrects rootkit debate.

Page 2 of 4

Anti-virus vendors CA, Trend Micro and McAfee say they reject use of rootkits as a way to protect security software. “We call it stealth technology rather than rootkit technology, and by and large it’s a negative thing,” says Stuart McClure, senior vice president of global threat at McAfee.

Related links
Error 404--Not Found

Error 404--Not Found

From RFC 2068 Hypertext Transfer Protocol -- HTTP/1.1:

10.4.5 404 Not Found

The server has not found anything matching the Request-URI. No indication is given of whether the condition is temporary or permanent.

If the server does not wish to make this information available to the client, the status code 403 (Forbidden) can be used instead. The 410 (Gone) status code SHOULD be used if the server knows, through some internally configurable mechanism, that an old resource is permanently unavailable and has no forwarding address.

Report: Oracle pushes back against Oregon officials over troubled health care site
04/17/14
Oracle is gearing up for a fight with officials in Oregon over its role developing an expensive health insurance exchange website that still isn't fully operational.

Health Insurance Exchange Tech Winners and Losers
04/17/14
Between the federal Healthcare.gov site and various state websites, more than 7.5 million Americans signed up for 2014 healthcare coverage on a health insurance exchange. Building those exchanges proved to be much, much easier said than done. Here's a quick look at who succeeded and who failed.

For Red Hat, it's RHEL and then…?
04/17/14
Red Hat is hosting its annual summit this week - this year in San Francisco - where the company is seemingly basking in the glory of making more than a billion dollars off a free open source project.

But there are those who say stealth technologies can be ethical and shouldn’t be dismissed as absolutely evil.

“Rootkits are inherently deceptive, of course,” says Christine Olson, project manager with StopBadware.org, the Cambridge, Mass., group formed by Harvard University and Oxford University to provide the public with a detailed list of software programs deemed to be unethical, deceptive or dangerous. “But there are instances where the owner of the machine might want to deceive others using the machine” and would have the right to do so, she says.

James Butler, CTO at Komoku, a start-up funded by the Defense Advanced Research Projects Agency to develop ways to detect rootkits, says the debate that started after security researcher Mark Russinovich discovered the Sony rootkit remains murky.

“The debate centers around whether it’s acceptable for a company to install software that uses stealth in order to protect the company’s software from being detected,” he says. In Sony’s case, the way the software was written would allow an attacker to also use the stealth abilities to hide programs. “In the end, rootkits can be good or evil. It’s all in how they’re used,” he says.

Gartner security analyst John Pescatore asserts corporations could benefit from more rootkit-like applications, such as for monitoring employees. “Yes, there is a role for stealth in the enterprise world,” he says, adding that in the home PC environment, parents might want rootkit-like ways to monitor what their kids do on a home PC.