The great folks over at Spamhaus release a weekly report on the worst spammers in the world. The list is compiled of the 10 people or organizations that Spamhaus believes are the worst career spammers and who are causing the most damage on the Internet this week.
You’ll note #3 (Michael Lindsay / iMedia Networks) is based in California, so I think I’m going to gather up a bunch of friends and baseball bats and go on the hunt for this guy. If you are wondering how someone in the United States can run a business strictly based on spamming, well so am I. The obvious statement is that he runs off-shore hosted servers and everything is done as legit as possible to avoid the long arm of the law, but someone needs to do something about these people making a fortune from spam.
That is where the bats come in..
Click here for Spamhaus’ entire Register Of Known Spam Operations
Since I’ve always been the kind of person who learns best on my own, outside of the classroom, I’m always searching for great sites that give away knowledge and books for free. The Online Books Collection is a great index of books put together by John Mark Ockerbloom, a digital library planner and researcher at the University of Pennsylvania. With over 25,000 free books, you can read up on subjects like Psychology, Technology, Music, Science, Law and more!
The FileGate File Distribution Network has a huge collection of educational software and games available for free and licensed under the GPL. Linux4Kids includes software like Math Scrabble, Tux Typing Tutorials, Pitacard Flash Cards and tons more! I would recommend any of these edutainment Linux applications to parents and college students wanting to study and learn in a fun way.
One very important aspect of computer security and hack prevention is the collection and assessment of system log files. In the mind of a hacker, when gaining unlawful entry to a system their first instinct is to cover all traceable tracks. This means deleting log files and possibly even setting up backdoors to enter again at will sometime later in the future. It is important, as a system administrator, to ensure that even if your system has been broken into or tampered with, that you have traceable evidence to figure out exactly what went wrong, and where it went wrong. Hackers tend to tamper with system logs making this sometimes impossible to figure out. Setting up a remote syslog server for all of your servers to send their logs to is how we can ensure that your logs will be completely accurate and un tampered with.
The syslog server configured in this example is an old 486 with an 8GB hard drive, running Slackware Linux 10.2. However, the configuration and commands will work for just about any Linux distribution.