As reported earlier CanSecWest conference was designed to test zero day vulnerability against three leading desktop operating systems. The result is out:
 The MacBook Air went first
 Windows Vista was cracked (hacked) on the last day of the contest
 Linux remained undefeated
Although several attendees tried to crack the Linux laptop, nobody could pull it off, said Terri Forslof, a manager of security response with TippingPoint. “I was surprised that it didn’t go,” she said.
=> More information available at official web site (Via Yahoo news) Sysadmin because even developers need heroes!!!
The most anticipated matchup in the cracker (or hacker) world is going on to take control of a computer using zero day vulnerability. Checkout official site for more information about the Pwn2Own contest. The prize is US $20,000, plus you get to keep the laptop.
The joke on this page was obtained from the FSF’s email archives of the GNU Project:
There are four major species of Unix sysad:
1.The TECHNICAL THUG. Usually a systems programmer who has been forced into system administration; writes scripts in a polyglot of the Bourne shell, sed, C, awk, perl, and APL.
2.The ADMINISTRATIVE FASCIST. Usually a retentive drone (or rarely, a harridan ex-secretary) who has been forced into system administration.
3.The MANIAC. Usually an aging cracker who discovered that neither the Mossad nor Cuba are willing to pay a living wage for computer espionage. Fell into system administration; occasionally approaches major competitors with indesp schemes.
4.The IDIOT. Usually a cretin, morpohodite, or old COBOL programmer selected to be the system administrator by a committee of cretins, morphodites, and old COBOL programmers.
HOW TO IDENTIFY YOUR SYSTEM ADMINISTRATOR:
Hackers (read as cracker) attacking on unpatched versions of the Mambo content management system that can be used to build botnets for use in phishing scams and distributed denial of service (DDoS) attacks.
They are using PHP-based CMS mass-exploitation and other vulnerabilities in open source CMS applications. If you are in server, collocation businesses then watch out all these attacks.
Update Mambo as soon as possible. More information available at following sites: