Microsoft has released Windows 8.1 power user guide for business. This guide is more focused on a enterprise user and you can learn about the advanced features of Windows 8.1, such as updated File Explorer, Task Manager, Internet Explorer 11, Mobility Center, Windows To Go, Miracast support, and SkyDrive Pro.
Technical Collaborator …
Aug. 1st I’ve started (yet again) a 12 months collaboration contract with Bari’s section of the C.N.R.’s Institute for Biomedical Technologies for the “Identification, classification and configuration of a bioinformatics infrastructure for the RNA-Seq noncoding RNAs data functional analysis” within the LIBI project.
Tuesday I found this article, which made the double think on how fortunate I am to deal (mostly) with OS X or GNU/Linux software distributions…
The quarterly report shows that 74 different programs from 24 different vendors are installed on the average UK PC and 28 of them, just over a third, are from Microsoft.
That third, and the operating systems, are mostly kept up to date with Microsoft’s Windows Update system. But beyond that, there’s another 23 different autoupdate mechanisms for the remaining programs which need to be monitored or managed.
While some programs have auto-update mechanisms with silent updates, other programs which need regular updates require the user to visit the vendor’s web site to check whether an update was needed.
The report notes that around 8.9% of users have unpatched operating systems and estimates that, on average, 6.5% of programs on a PC aren’t up to date. Around 3.4% of programs on the average PC are also end-of-lifed and no longer have security patches available for them.
the H-security ☞ The update jungle: PC owners have to watch 24 sources for fixes
Over my publicly reachable servers I’ve installed for security reasons, among some other tools, Rootkit Hunter.
What does rkhunter do?
Rkhunter is much like a virus scanner for a Windows system.
It has definitions to help identify rootkits and reports them. Just like anything, rkhunter isn’t 100%, but it weeds out the majority of rootkits. Upon running rkhunter, various system files, conf files, and bin directories are examined. The results are cross-referenced against the results of infected systems (from the definitions) and the results are compiled. This is where *nix systems really shine. While your OS may vary, and how it’s compiled or configured, the file system and configuration is basically the same.
This allows programs like rkhunter to provide results with a fairly small window for error or false positive.
While the installation via the distribution repositories is trivial, fine tuning the rkhunter.conf file is another pair of hands, since we have to tailor it to our system’s configuration and handle those false positive warning messages. Periodically receiving those, in fact, lowers our level of attention on the signals coming from the server.
So it’s a good idea to have a read on the provided README file provided by your distribution’s package. Over a CentOS 5.8 system of mine you make it giving a simple:
The solution I found after some googling was to edit the /etc/rkhunter.conf file in this way:
# This setting tells rkhunter where the xinetd configuration # file is located. # XINETD_CONF_PATH=/etc/xinetd.conf # ^^^ de-commented by me $INSERT-DATE XINETD_ALLOWED_SVC=/etc/xinetd.d/nrpe # ^^^ added by me $INSERT-DATE
This has solved the issue and I got no more warnings about it!