PLABS
softwareguideswar roomaboutgo-home
Latest Configuration Guides
Platform Title
Date
Red Hat Enterprise Linux 6.5 Snort Intrusion Detection System w/ Barnyard2 and PostgreSQL Support
February 9, 2014
Red Hat Enterprise Linux 6.4 Apache 2 Web Server w/ PHP5, OpenSSL, Suhosin and PostgreSQL, MySQL, IBM DB2 and/or Oracle Databases
May 24, 2013
IBM AIX 7.1 Setting Up TCP/IP, SSH and a GNU C / C++ Development Environment on AIX
January 9, 2012
Affiliations

The Cavalry is a global grassroots organization that is focused on issues where computer security intersects public safety and human life. We strive to ensure that these technologies are worthy of the trust we place in them.

Media and Research Requests
For journalists of all media, please use my PGP key for e-mail communications. Most requests I receive are for validating claims of major security events or vulnerabilities.

About one out of every five events I examine turn out to be fully or partially true. Our little community is increasingly becoming filled with rotten apples.

There is also an assumption of anonymity on my part, with exceptions only in very specific and authorized situations.


For research discoveries and disclosure, I already have a trusted list of journalists. For individuals and groups looking to include me in their efforts, please communicate using my PGP key listed above. Do your due dilligence first. I get a lot of requests and vetting what is legitimate is time consuming..
threatpost|  News

Apple Rushes Fix for Latest ‘Text Bomb’ Bug As Abuse Spreads

16 February 2018 - Apple said it is working on a fix for the latest text bomb bug that crashes a number of iOS and Mac apps that display specific Telugu language characters.   …

Intel Expands Bug Bounty Program Post-Spectre and Meltdown

15 February 2018 - Intel will pay up to $250,000 to researchers who identify bugs more severe than 9.0 on the CVSS scale.

Reported Critical Vulnerabilities In Microsoft Software On the Rise

15 February 2018 - Avecto researchers say removing admin rights from users would mitigate many of the threats.

Word-based Malware Attack Doesn’t Use Macros

15 February 2018 - Malicious e-mail attachments used in this campaign don’t display any warnings when opened and silently install malware.

Dell EMC Patches Critical Flaws in VMAX Enterprise Storage Systems

14 February 2018 - Attacks include a hard-coded password vulnerability that could give attackers unauthorized access to systems.

Snort  |  Blog

Snort Subscriber Rule Set Update for 02/15/2018

16 February 2018 - Just released:Snort Subscriber Rule Set Update for 02/15/2018We welcome the introduction of the newest rule release from Talos. In this release we introduced 11 new rules of which 0 are Shared Object rules and made modifications to 46 additional rules of which 0 are Shared Object rules. There were n…

Snort 3.0 Ruleset Announcement!

13 February 2018 - Join as we welcome the first official builds of the Snort 3 subscriber and registered ruleset to the family!Today marks the first day that we will begin publishing the Snort 3 subscriber and registered rulesets along side of the Snort 2.x rulesets on Snort.org.  These are going to be downloadab…

Snort++ Build 243 Available Now on Snort.org

13 February 2018 - A new release of Snort++ (build 243) is now available on snort.org which includes lots of new functionality and important bug fixes.  Here is an overview of the updates since the prior release:Important changes since the last release:build: dropping automake support - only cmake tarballs provid…

Snort Subscriber Rule Set Update for 02/13/2018, Snort 3 official ruleset!

13 February 2018 - Just released:Snort Subscriber Rule Set Update for 02/13/2018We welcome the introduction of the newest rule release from Talos. In this release we introduced 51 new rules of which 2 are Shared Object rules and made modifications to 7 additional rules of which 1 are Shared Object rules. This release…


© 2001-2017 Procyon Labs / Randal T. Rioux