SecurityPortal: Ask Buffy – ports; log search tools, DNS – UDP or TCP

From SecurityPortal: Ask Buffy – ports; log search tools, DNS – UDP or TCP [via Linux Today]:

Log Tool

We have all these NT 4.0 logs, but it there a tool that can help sift
through information and present it with meaning? With regard to security,
I just want to get to the information that I need. I need to get to this
information quickly. Do you have any suggestions?

Kevin M Moker

 

This is a subject for which there is a ton of information available.
There is an excellent FAQ available at:

http://www.heysoft.de/nt/eventlog/faq.htm

And an entire book on the subject available from O’Reilly:

http://www.oreilly.com/catalog/winlog/

As for actual products that will monitor your log files and respond to
events, there are several dozen solutions; for example:

http://www.sql-server-performance.com/event_log_monitor.asp

http://www.ipsentry.com/dlfiles/addins/ipsevmon.htm

http://www.eventreporter.com/

You can also export NT event logs, using a variety of products, to UNIX
syslog machines and use your favorite syslog monitoring tool.

Buffy (buffy@securityportal.com)

Security for Web Database Applications

Security for Web Database Applications. You know you want to protect yourself, and your database. Here’s how. [WebReview.com]

Why UDDI Will Succeed, Quietly

Server-side scripting languages: PHP, Perl, Java servlets — Which one’s right for you?

IBM DeveloperWorks:
Server-side scripting languages:
PHP, Perl, Java servlets — Which one’s right for you?

Erik Zoltán (erik@zoltan.org),
Advanced Systems Engineer, EDS
[IBM DeveloperWorks]

Funny: Ballmer and Gates

Funny:
Video with Ballmer and Gates in the car nodding and humming to the nerdy tune. [Scripting News]

Best Practices For VPN Implementation

Best Practices For VPN Implementation. Business Communications Review Apr 10 2001 2:46AM ET [Computer security news]

Remaking the Meeting-Cam

MIT Technology Review: Remaking the Meeting-Cam. Apart from cost, the presence of a cameraperson–usually an outsider–has a psychological impact that tends to change the dynamics of group meetings or lectures. The researchers attacked both problems by designing a system that mimics the actions of human camera operators. [Tomalak’s Realm]

Caldera Security Update: remote root exploit in ntpd

A useful website on 802.11b wireless

Ntpd Remote Buffer Overflow Vulnerability

Ntpd Remote Buffer Overflow Vulnerability [Security Focus]
No word from Sun or other major Unix vendors, yet.