Archive for September 2001
XML Divided
XML Divided. Edd Dumbill: XML Divided “So there are points of inflection in our comprehension of the world around us. We are now at such a point in the XML world, too. This is not to say that the future for XML looks bleak — in many ways it’s never looked better — but tomorrow’s XML will be very different from what we’re used to.” [via ZopeNewbies]
Web service invocation sans SOAP
Web service invocation sans SOAP. developerWorks: Web service invocation sans SOAP “SOAP has become almost synonymous with Web services, even though it is just one of many possible bindings for accessing Web services. This means that applications that make use of Web services usually do so through APIs tied to a specific implementation of SOAP. This series of articles will describe a more generic, SOAP-independent approach to invoking Web services called the Web Service Invocation Framework (WSIF). It was specifically designed to invoke Web services described using the Web Services Description Language (WSDL) directly, hiding the complexity of underlying access protocols such as SOAP.” [via ZopeNewbies]
How Xerox got its engineers to use a knowledge management system
TechRepublic: How Xerox got its engineers to use a knowledge management system
One reason the Xerox staff was reluctant to use the KM system was that participation would be an added duty to an already tightly controlled workdayessentially, staff would need to share” in the little downtime available to them. Xerox tried a number of incentives to book employee interest and learned that professional credit was the key. With a quick app revamp, Eureka provided engineers an ability to “author their solutions.
“Once we enabled them to attach their name, it became a professional peer process. Theyre proud of their solutions and are recognized for it,” Holtshouse explained.
Hitchens on the Left and Islamic Fascism
Hitchens on the Left and Islamic Fascism. Christopher Hitchens has been berating fellow leftists for even thinking that the WTC/Pentagon attacks had anything to do with what the US has done in the Middle East.
Let’s pause a moment to appreciate Mr. Hitchens in action.
< [More Like This WebLog]
SANS Incidents handler of 2001/09/25 Vicki Irwin
SANS Incidents handler of 2001/09/25 Vicki Irwin:
A poster to the Handler’s list came to the following conclusion
after performing an analysis on the worm code with a disassembler:“After consuming a certain amount of CPU time [Nimda] goes dormant for 10
days. If counts the days as year*365 + month*30 + day_of_month. The
next wave of attacks will be on Sept 28, Oct 8, Oct 18, Oct 28….”The results of this analysis would explain the slowing very well, and
predicts that we should expect another ramp up in activity on Friday. Other
sources have noted that the use of Nimda’s “GetSystemTime” call is to initiate
the email propagation phase anew every 10 days; but have not said anything
about the worm stopping scanning for web servers upon reaching some defined
limit. In addition to explaining the observed drop off in scan activity, this
analysis would also potentially explain why the strings “Processor Time”,
“User Time”, “Privileged Time”, etc. are found in the worm binary.Note: The incidents.org Nimda report will be updated tomorrow (9/26)
with new information collected since 9/21.
Sun shows off mainframe chasing 106 chip StarCat
Sun shows off mainframe chasing 106 chip StarCat. Swinging hot swapping [The Register]
Blocking Code Red Worm with Cisco IOS NBAR
IPonEverything.net Security Advisory:
Blocking Code Red Worm with Cisco IOS NBAR
Cisco: Using Network-Based Application Recognition and Access Control Lists for Blocking the “Code Red” Worm at Network Ingress Points
requires IOS 12.1(5)T on 7100, 7200 routers,
requires IOS 12.1(6)E on 7500 routers and FlexWAN interfaces
Gartner believes it’s time for businesses with Web applications to start investigating less vulnerable Web server products [than Microsoft IIS].
Gartner, quoted in News.Com: “With the emergence of the Nimda worm — the latest in a long series to attack Microsoft’s Internet Information Server (IIS) and other software — Gartner believes it’s time for businesses with Web applications to start investigating less vulnerable Web server products.”
[Scripting News]
