Well, [Echo Effect] The Planet of the Dead [/Echo Effect] has been shown, and I give it a 8 out of 10… But already the speculation is on regarding the next Doctor Who Movie that was teased at the end of Planet of the Dead…
\”The Waters of Mars\”. Remember how RTD used the codename \”Torchwood\” for the first few episodes, and the rush tapes for the 2005 season? Why, because it was a anagram of \”Doctor Who\”….
Well, the brainy folks are saying, wait a second \”Waters of Mars\” is a anagram of \”War of the Masters\”. Masters == The Master? While possible, I think folks are digging a little to deep here. Sure I loved John Simms as The Master… Well, okay, I thought he cranked it up to \”11\”, maybe just 1 notch too far…
We\’ll have to see, as they say, time will tell.
There\’s no bias here…
Mac Marginalization: MacInTouch Reader
I belong to a survey group called e-rewards (http://www.e-rewards.com/). I just received an invitation to a survey and when I tried to open the link in Safari I was told that it only ran on Windows with IE or Firefox.
I fired up Parallels to access the survey which asked questions about my opinion of Microsoft and the value of their products. One question was \’For the price of one Macintosh, you can buy 2 Windows PCs. How does this affect your opinion of Microsoft?\’
It\’s kind of interesting to see a survey about Microsoft products that only can be accessed on a Microsoft platform. Is that stacking the desk or what? I can\’t wait to see the results of this \’independent\’ survey!\”
Time Warner tries again, fails to justify caps and charges
Time Warner Cable, stung by public reaction to the Internet data caps it is now trialing in several markets, has issued yet another public statement. Turns out, the problem here doesn\’t rest with the caps but with the \’press reports\’ that \’were premature and did not tell the full story.\’
All of which perfectly explains why Time Warner Cable has also boosted cap limits in every tier.
Click here to read the rest of this article
(Via Ars Technica.)
getpwnam() failed for user kenneth, creating invalid credential?
You finally checked your console log, and you don\’t know what to make about these entries? Â Never fear… I\’ll help explain it… Â Then you can be afraid of the big bad internet…
The following is a sample of the console log of someone attempting to connect to \”Power-mac-g5\” via SSH, without having the proper username and/or password.
Jul 18 19:35:09 power-mac-g5 com.apple.SecurityServer[23]:Â getpwnam() failed for user kenneth, creating invalid credential
Jul 18 19:35:08 power-mac-g5 com.apple.SecurityServer[23]: getpwnam() failed for user tom, creating invalid credential
Jul 18 19:34:48power-mac-g5 sshd[30475]: Failed password for invalid user matt from 190.202.80.3 port 58310 ssh2
Jul 18 03:27:11 power-mac-g5 sshd[28184]: Invalid user test from 218.22.9.118
The first two lines (SecurityServer) shows the attempted login as \”kenneth\”, and as \”tom\”. Â Both logins failed (\”Invalid credential\”), and the following SSH lines in the log give the IP information of the two attempts…
On the other hand, a successful login would look like:
Jul 21 11:23:38 power-mac-g5 sshd[385]: Accepted keyboard-interactive/pam for The_Big_One from 192.168.1.125 port 1210 ssh2
There are only a few solutions for this:
- Since script kiddies are going to be attempting to login via SSH, if you have it enabled, make sure you have a \”hard\” password and username. Â Try to choose an username that is not a dictionary word, or a easy to guess name (eg. Tom, Dick, Harry, George, etc). Â If you must use a common name, try to do a letter substitution (eg. t0m, with a ZERO instead of a O).
- Just don\’t have it enabled, if you don\’t need it. Â The username / password can\’t be compromised if it\’s not running / available.
- Block SSH access to specific IP\’s or IP ranges.
- SSH Keys. Â Restrict the SSH to only accept connections that use your SSH Private Key… Â (I have to research this one). Â (Or only via a VPN connection)
To automate the process of scanning the log file, you can just simply view the  /var/log/secure.log for the details…Another option is to download and use \”Check Failed Password Attempts for Mac\”, which gives you a nice GUI view of the Secure log…
Check Failed Password Attempts is a small application that parses the /var/log/secure.log file looking for failed authorization attempts. It presents a summary of the total number of failed attempts (and successes) per user. It will also optionally display the full log listing of each failed attempt, each successful attempt, and SSH information from the /var/log/system.log (see the preferences to enable/disable these options).
http://www.macupdate.com/info.php/id/17555
Here is one method to setup trusted key pairs, from a Macintosh discussion…
\”The best thing you can do is disable \”Remote Login\” and all other network access via Mac OS X\’s \”Sharing\” preferences and firewall. It\’s also imperative that you use strong passwords that cannot be broken via sophisticated \”dictionary\” attacks.\”
The best thing to do if you need to use ssh for remote access is to turn OFF ssh password authentication and log in using public/private keypairs. Crackers can try dictionary attacks til the end of time but they won\’t get in, because dictionary attacks work against a username/password pair, just people who have both sides of the key and can authenticate against it. Turning off all services/firewalling is great….til you need to actually use the computer remotely.
This behavior can be changed in /private/etc/sshd_conf by changing:
# To disable tunneled clear text passwords, change to no here!
PasswordAuthentication no < defaults to yes
PermitEmptyPasswords no < should be no no matter what (I also turn off \”allow root login\” too)
The next step is to generate a public/private keypair from the command line using \”ssh-keygen -t dsa -f id_dsa\” and give a good pass PHRASE to the key. This creates two keys, a private and a public key. The public key would go in the .ssh folder of the logging in users home directory, and the private key would be plugged into the connecting program (in the .ssh folder if it\’s a *nix system, or plugged into a Windows program like VanDyke\’s SecureCRT).
The log for a successful login looks like:
Mar 27 22:57:03 tux sshd[13827]: Connection from ::ffff:192.168.1.130 port 55831
Mar 27 22:57:03 tux sshd[13827]: Found matching DSA key: 98:07:02:87:af:6a:ae:9c:cc:0f:7f:9b:a4:f4:85:66
Mar 27 22:57:05 tux sshd[13827]: Found matching DSA key: 98:07:02:87:af:6a:ae:9c:cc:0f:7f:9b:a4:f4:85:66
Mar 27 22:57:05 tux sshd[13827]: Accepted publickey for rzeman from ::ffff:192.168.1.130 port 55831 ssh2
And a failed session gives:
GreyGhost:~/temp rzeman$ ssh tux
Enter passphrase for key \’/Users/rzeman/.ssh/id_dsa\’:
Enter passphrase for key \’/Users/rzeman/.ssh/id_dsa\’:
Enter passphrase for key \’/Users/rzeman/.ssh/id_dsa\’:
Permission denied (publickey,keyboard-interactive).
From http://www.macintouch.com/security-mon.html
Using Startup Repair to repair a boot failure (on Win Vista)
Using Startup Repair to repair a boot failure due to a missing file
In this post, we describe how to use Startup Repair to repair a missing file that is preventing Windows Vista from booting. The goal is to familiarize yourself with Startup Repair so that you can use it when you or your customers need it. We really hope no one will need to use it :); but if you do, this knowledge might come handy.
via Windows RE Notes : Using Startup Repair to repair a boot failure due to a missing file.
Apple to Discontinue .Mac HomePage and Groups
In short, if you have any DotMac content, migrate it off or update it now.. You won\’t be able to update it in the future…
Apple to Discontinue .Mac HomePage and Groups: \”Apple today announced that two legacy tools associated with .Mac, HomePage and Groups, will no longer be offered as of July 7, 2009. The two services are not currently offered as part of MobileMe but were still accessible to former .Mac users whose …\”
(Via MacRumors.)
My thoughts on the revised \”tiers of service\” from TWC.
- It\’s nice that Time Warner is offering a lesser priced Internet service, but isn\’t that what RoadRunner Lite already does? And 1 Gb total download for this lesser level… I\’m sorry, but it should be at least 2 Gb…
- \”Our usage data show that about 30% of our customers use less than 1 GB per month.\” Now I\’m a techie, we all know that… But I find this hard to believe that this isn\’t some bean counter says \”950 Mb per month is less than 1 Gb\”. Even if the average for that 30% is 800 Mb, a few large Microsoft updates could easily cause someone to exceed 1 Gb. Up sell your services TWC.
- So, I will be forced to move from a RoadRunner Standard package at $45/month, to RoadRunner Turbo at $75/month, but now with a Tier limit of 100 Gb per month? And I don\’t even know for sure that 100 Gb will cover my use? Or I switch to Earthlink high speed internet for $41.95/month ($29.95/for 6 months) for \”up to 7 Mbps\”, but no tier/bandwidth cap. Or for 72.95/month for \”up to 10 Mbps\”.
How can Earthlink offer these services over TWC\’s lines, and be making a profit, if TWC can\’t?
Does this make sense?
Bowing to Pressure, Time Warner Alters Broadband Caps | Epicenter from Wired.com
Bowing to Pressure, Time Warner Alters Broadband Caps | Epicenter from Wired.com:
\”To accommodate lighter Internet users and those who need a lower priced option, we are introducing a 1 GB per month tier offering speeds of 768 KB/128 KB for $15 per month. Overage charges will be $2 per GB per month. Our usage data show that about 30% of our customers use less than 1 GB per month.
• We are increasing the bandwidth tier sizes included in all existing packages in the trial markets to 10, 20, 40 and 60 GB for Road Runner Lite, Basic, Standard and Turbo packages, respectively. Package prices will remain the same. Overage charges will be $1 per GB per month.
• We will introduce a 100 GB Road Runner Turbo package for $75 per month (offering speeds of 10 MB/1 MB). Overage charges will be $1 per GB per month.\”