Link

Download: Microsoft Releases Windows 8.1 Power User Guide for Business

Download: Microsoft Releases Windows 8.1 Power User Guide for Business
Download: Microsoft Releases Windows 8.1 Power User Guide for Business

Microsoft has released Windows 8.1 power user guide for business. This guide is more focused on a enterprise user and you can learn about the advanced features of Windows 8.1, such as updated File Explorer, Task Manager, Internet Explorer 11, Mobility Center, Windows To Go, Miracast support, and SkyDrive Pro.

via Microsoft-News.com

one more year at ITB, Bari – CNR

Technical Collaborator …

Aug. 1st I’ve started (yet again) a 12 months collaboration contract with Bari’s section of the C.N.R.’s Institute for Biomedical Technologies for the “Identification, classification and configuration of a bioinformatics infrastructure for the RNA-Seq noncoding RNAs data functional analysis” within the LIBI project.

Aside

The update jungle: PC owners have to watch 24 sources for fixes

Tuesday I found this article, which made the double think on how fortunate I am to deal (mostly) with OS X or GNU/Linux software distributions…

The quarterly report shows that 74 different programs from 24 different vendors are installed on the average UK PC and 28 of them, just over a third, are from Microsoft.
That third, and the operating systems, are mostly kept up to date with Microsoft’s Windows Update system. But beyond that, there’s another 23 different autoupdate mechanisms for the remaining programs which need to be monitored or managed.
While some programs have auto-update mechanisms with silent updates, other programs which need regular updates require the user to visit the vendor’s web site to check whether an update was needed.

The report notes that around 8.9% of users have unpatched operating systems and estimates that, on average, 6.5% of programs on a PC aren’t up to date. Around 3.4% of programs on the average PC are also end-of-lifed and no longer have security patches available for them.

the H-securityThe update jungle: PC owners have to watch 24 sources for fixes

rkhunter warning: Found enabled xinetd service: /etc/xinetd.d/nrpe

Over my publicly reachable servers I’ve installed for security reasons, among some other tools, Rootkit Hunter.

What does rkhunter do?

Rkhunter is much like a virus scanner for a Windows system.
It has definitions to help identify rootkits and reports them. Just like anything, rkhunter isn’t 100%, but it weeds out the majority of rootkits. Upon running rkhunter, various system files, conf files, and bin directories are examined. The results are cross-referenced against the results of infected systems (from the definitions) and the results are compiled. This is where *nix systems really shine. While your OS may vary, and how it’s compiled or configured, the file system and configuration is basically the same.
This allows programs like rkhunter to provide results with a fairly small window for error or false positive.

While the installation via the distribution repositories is trivial, fine tuning the rkhunter.conf file is another pair of hands, since we have to tailor it to our system’s configuration and handle those false positive warning messages. Periodically receiving those, in fact, lowers our level of attention on the signals coming from the server.

So it’s a good idea to have a read on the provided README file provided by your distribution’s package. Over a CentOS 5.8 system of mine you make it giving a simple:

 more /usr/share/doc/rkhunter-1.4.0/README

One of the most annoying false positive warning message I had to deal with was the one regarding the NagiosNRPE plugin running as a xinetd service.

The solution I found after some googling was to edit the /etc/rkhunter.conf file in this way:

# This setting tells rkhunter where the xinetd configuration
# file is located.
#
XINETD_CONF_PATH=/etc/xinetd.conf
#	^^^ de-commented by me $INSERT-DATE
XINETD_ALLOWED_SVC=/etc/xinetd.d/nrpe
#	^^^ added by me $INSERT-DATE

This has solved the issue and I got no more warnings about it!

MacAppBlocker, password-protect single application on a shared account Mac

Reading a Mac mailing list I found a subscriber that asked how to prevent access to the Mail.app application (and so to it’s data) on an iMac shared with four other people on a front desk in an art gallery.

Another user suggested him the usage of MacAppBlocker, from KnewSense Software:

With Mac App Blocker, you can password-protect EACH application on your Mac. Keep your apps and your Mac safe. Set a timeout value to automatically exit the protected application so even when you leave your computer unattended, you’re still protected.

Personally I’ve never been in a situation needing a solution like this one, but I’ve thought about writing down a note on this since one can never know what the future needs will be ;-)