Gip is an IP address calculator that integrates well with the GNOME desktop environment.Gip provides system administrators with tools for IP address based calculations. For example, an administrator who needs to find out which IP prefix length equals the IP netmask 255.255.240.0, just types in the mask and gets the prefix length presented. But many more advanced calculations can be made. Gip can convert an address range into a list of prefix lengths. It can also split subnets using a given IP netmask or IP prefix length. Many more calculations are possible.
Install Gip in Ubuntu
sudo apt-get install gip
Labels: gnome
Fixed in Firefox 2.0.0.5
MFSA 2007-25 XPCNativeWrapper pollution
MFSA 2007-24 Unauthorized access to wyciwyg:// documents
MFSA 2007-23 Remote code execution by launching Firefox from Internet Explorer
MFSA 2007-22 File type confusion due to %00 in name
MFSA 2007-21 Privilege escalation using an event handler attached to an element not in the document
MFSA 2007-20 Frame spoofing while window is loading
MFSA 2007-19 XSS using addEventListener and setTimeout
MFSA 2007-18 Crashes with evidence of memory corruption
Mozilla provides Firefox 2 for Windows, Linux, and Mac OS X in a variety of languages. You can get the latest version of Firefox 2 here.
Leader in Proactive Malware Protection Receives Honors for Strong Performance and Ease of Use in Competitive Review
SAN DIEGO - June 2007 - ESET, the leader in proactive threat protection, today announced that ESET NOD32 Antivirus received five stars in SC Magazine's review of anti-malware management tools, the highest overall individual ranking awarded in group reviews. The evaluation, which examined 12 anti-malware vendors, declared NOD32 Antivirus a leader in protection, ease of use and management, and awarded the product the maximum honors in five of the six individual categories.
Kaspersky Lab, a leading developer of secure content management solutions, has released a new analytical report on the evolution of self-defense technologies in malicious programs. The report is authored by Alisa Shevchenko, one of the company's senior malware analysts.
The article provides an overview of how malicious programs have evolved to combat security solutions and which self-defense techniques are currently used. It also discusses techniques used by virus writers in the past which are no longer effective due to the continued evolution of security solutions. The article also includes predictions as to which technologies are likely to be used in the near future.
The complete report is available on Viruslist.com at the following link: