|some thoughts here on New Years Eve..
||[Dec. 31st, 2005|08:24 pm]
|||||Commodores - Easy||]|
Having computer issues over the last 2-3 months has been quite a sobering event! Damn you, I was enjoying about 60percent of my life.
A tale of 2 ladies: 1 gave me a bed, the other gave me nice pink sheets. I wonder if the 3rd will appear soon as I certainly hope I know what's next! holla..
Rootkits do not always come in the form of computer software/hardware. There have be many times in history where the form was much more human! I certainly hope my life has not been invaded by such imposters.. for those that don't know, Rootkits are similiar to 'Invasion of the Body Snatchers' as what we see is not exactly how things are. They are designed for remote control and surveillance. Unfortunately, digging them out of any system is extremely difficult and takes much skill as they are designed first and foremost for stealth, a ninja is another good example. Thankfully, I am Mr. Mips, I have many ninja skills. nuff
[it has yet to be proven I was hit with a rootkit or am just fucking stupid (see verse vi)]
I have just come out of the most intense 3 months I think I have ever experienced (paralleling the post breakup months a couple of years ago). I still have not figured out how far out I was, I imagine this determination will come, as Paul Harvey would say, with the rest of the story.
2005 had some serious bad sucking
i'm running out of thoughts, will get back to you after another tallboy.
I'm working on shedding the 'chiseled marble' look and am heading towards a more 'polished pearl' appearance. I'll let you know how it goes.
Vitruvius is working on his very own Debian based distro designed just for cats. I'm sure a live cd will also be available.
Through all of this I have actually created some art and developed some techniques, yeah yeah it was done with a computer. some of the pieces are actually closer to 4' in width. I'm hoping to begin exploring proper ways of printing/mounting the imagery onto wood then encasing them in acrylic as I believe this would be the best way to truly bring out the depth (there are a lot of little details in the work).
Everyone should lock down their wireless using WEP or even better a RADIUS server. Also, implement MAC address filtering so only computers with the MAC addresses you specify can be on the network (this is not failsafe as MAC addresses can be spoofed). Yeah sure, it would be great if we all had this nice open networks and everyone could just surf along. Unfortunately, some of those folk surfing along may be sniffing some of your packets and with WiFi, they only need to be sitting in a car, up the street!
I'm not referring to Macintosh when I say MAC address (see previous verse). MAC address is a hardware address unique to network connected devices. Look it up in Google.
It is quite possible, if your network has had open wifi for some time, there may be a few bugs floating around internally. Hackers like to leave little backdoors so they may easily revisit such graciousness, or just over the internet.
If you suspect a computer isn't 'normal', remove the hard drives and fucking pave them on a secure, clean system. Paving as in end to end, sector to sector, bit to bit paving, minimum 3 times, some folk recommend that 7 times type of paving. Paving a drive on a suspected system does nothing except waste your time. Flash the BIOS, Reset Open Firmware, etc as little buggies like to hide here waiting to hook in to the next available boot strap.
Rootkits will not be detected by Anti-Virus or Spyware software. Sorry.
It may be good measure to have at least one clean computer around for paving and other forensic/emergency measures (see verse xix). This computer should not be connected in anyway to the normal network or to the outside world. Creative thinking is of the upmost importance here regarding how to install/update and maintain such a system.
Setting up a box with Debian Linux (www.debian.org) is a good start on having an external clean system though downloading and burning the OS on a suspected system may not be such a great idea. Burn the ISO image of the Net Install version, it is 180MB. Boot with the CD and the installer will download the software it needs. The partition manager that comes with Debian is a start down a well paved road though it doesn't do the full sector by sector overwrite. At least it zaps potential problems that may be hiding and waiting to load if the disk is mounted with another OS.
Isn't this so much fun? It's all so educational, and fun like.
Aren't the built-in mics on all of our laptops and computers really cool? It's like we have a little recording studio all around us. (continued next verse)
Not all bugs are so obvious. A Rootkit, for example, can easily turn your computers microphones on and off, all without knowledge of the user. Even checking the Sound control panels, etc would still show them as being muted, off or uninstalled. Isn't technology fucking great?
As with sound devices, rootkits can control any aspect of the computer like those little homing devices, er uh, I mean WiFi cards (Airport, etc) they've started putting inside the laptops and computers. They can be on even when they show they are off. The only preventitive measure here is to remove the internal card completely and just use a PCMCIA external card when a WiFi connection is needed.