Behdad Esfahbod's daily notes on GNOME, Pango, Fedora, Persian Computing, Bob Dylan, and Dan Bern!

My Photo
Location: Toronto, Ontario, Canada

Ask Google.

Contact info
Hacker Emblem Become a Friend of GNOME I Power Blogger
follow me on Twitter
July 2003
August 2003
October 2003
November 2003
December 2003
March 2004
April 2004
May 2004
July 2004
August 2004
September 2004
November 2004
March 2005
April 2005
May 2005
June 2005
July 2005
August 2005
September 2005
October 2005
November 2005
December 2005
January 2006
February 2006
March 2006
April 2006
May 2006
June 2006
July 2006
August 2006
September 2006
October 2006
November 2006
December 2006
January 2007
February 2007
March 2007
April 2007
May 2007
June 2007
July 2007
August 2007
September 2007
October 2007
November 2007
December 2007
January 2008
February 2008
March 2008
April 2008
May 2008
June 2008
July 2008
August 2008
October 2008
November 2008
December 2008
January 2009
March 2009
April 2009
May 2009
June 2009
July 2009
August 2009
November 2009
December 2009
March 2010
April 2010
May 2010
June 2010
July 2010
October 2010
November 2010
April 2011
May 2011
August 2011
September 2011
October 2011
November 2011
November 2012
June 2013
January 2014
May 2015
Current Posts
McEs, A Hacker Life
Saturday, May 28, 2005
 In the blogs

Thanks to Miguel I found Ulrich Drepper's blog too. Found the long paper in this post of him about how to write shared libraries useful. If you want to get an in depth tour on how shared libraries are implemented in ELF, that's for you.

In another post, Ulrich talks about how many people do not know about what a firewall is, or that their computer can be remotely controlled by an attacker, and other security (or lack thereof) stuff. Which reminded me that I had a similar yet different problem: Installed Fedora Core 3 on a friend's laptop few months ago. She's a graduate student in Computer Science too, and coming from a Windows background. I updated the FC3 after installation, turned off unneeded services, and tuned up for multimedia. After a few days, she had a question: What is the security features of her system? I didn't really know what to answer, something like: Well, it's secure as long as you keep it updated and don't do silly things. She followed up with questions about how to install the firewall, what about the antivirus, ad blocker, blah blah. I explained to her that there's not much of a virus for Linux, and although firewalls exist and heavily used, it's not quite necessary when you only have the ssh port open, and that she's already behind the firewall that is the router, etc. Being a freaked Windows user before, she insisted on me setting up a firewall for her AND to check that her machine is not already compromised. Set up iptables easily thanks to Fedora Security Level tool, but had no idea how to persuade her that she's all clean. Almost told her that there's almost no way to ensure 100% that you are not compromised. She couldn't see that, just wanted to make sure. So to make her happy, I found a way to make her feel better by asking rpm to verify all the installed files (fortunately prelink was not run yet and all binaries passed verification). Now that was something to her, 'cause it took a long time with huge disk activity, and looked quite like what antivirus software does: Slowing down your machine for a while. In the meantime she inquired about what does this rpm -V do, and then on how to make sure the installed packages are the right ones? I answered with the GPG signature on packages, which led us to the fact that gpgcheck is off in her yum.conf (and keys are not installed). Holy sh*t, all my trick was in the water now. So she claimed everybody in the world could have been altering packages she downloaded. I answering no, only the Rogers and AT&T and other guys providing the route between Red Hat and you could, and that you should trust me that they are busier than altering your RPM packages and just yours. It came to the point that she was saying "hacking is easy, every teenager can do that, just because you are saying my machine is clean, doesn't mean it's clean.", which IIRC, I simply replied "Go grab your old Windows if you like, I ain't install the whole thing again." :( She's been using the Fedora 24/7 since then, with no real problem. :)

Another social problem I have had with Windows users: I'm sharing an apartment with a friend, Amir. We share a Rogers cable high-speed. He does P2P and has set a limit on bandwidth, so I don't have any problem with that. Once I found that I cannot download above 4kb/s from, where I usually used to do at 70kb/s for the least. Turned out Amir has reinstalled Windows again, and have installed Gozilla to speed up downloading lots of applications he's got to install one more time. It took quite a while to make him understand how Gozilla is not going to make more bandwidth out of our cable, but simply eating my lunch by opening 20 connections instead of one. And the damn router doesn't have any traffic shaping capabilities. :( It's amazing how living without Windows makes words like "download accelerator", "spyware", "shareware", "antivirus", ... meaningless and unimportant.

Richard Stallman writes in the FSF blog about his recent visit to Alhambra, Spain. Man, if you like that, you gotta visit the Persian gardens in Isfahan, Shiraz, and a few other cities. Traveling to Iran is a lot easier now (see here) Isfahan the Movie is an stunning short modeling of a mosque in Isfahan, in case you've not seen it before. I like the way RMS writes about his girlfriend too. That's what I like about RMS in general, he's always as young as he was in 1982.

You have a nice blog here. Did you know
there Is A 90% Chance That Your Computer Has AdWare Or Spyware On It Right NOW!

Spyware and Adware viruses have rapidly become the number one threat to your computer with over 90% of computers already infected. These include trojans, bugs, ad serving software, monitoring software and more.
I also have a free spyware protection site-blog. It can help you find and get rid of spyware, adware plus other stuff pn your computer for good. Free downloads.
You should check it out if you get the time!
I must say that without some of the information you have, would my computer be filled with spyware. I'm always looking for more information about microsoftcom spyware and I have bookmarked your blog among the must visit resources!

Keep the good work up!
More info about microsoftcom spyware here.
Post a Comment

Links to this post:

Create a Link

<< Archive
<< Home