Gregory L Houlette USA, Marengo, Indiana Technologist, Engineer Tek Armory, LLC I am starting a network security consulting business and have been scouring the Internet for good, flexible, lightweight solutions to the problems faced by the Linux computer users among my customers. Since I run Fedora, it makes sense to share those tools that I have found to be useful to me (whenever possible). Along the way, I may eventually need to develop some custom tools that are reasonable to publish via the GPL and also create Fedora RPM packages for sharing with other linux users as well. Since I have over 20 years experience as a programmer (mostly 'bare metal' peripheral device driver and diagnostic test code) I am well acquainted with regression testing and other aspects of SW QA, and can contribute (time permitting) to code review, testing and patch development. Most of the projects I have worked on over the years were buried deep within the companies that I worked for (such as, most recently, Quantum corporation which at one time was the largest desktop disk drive manufacturer in the world). I am FLUENT in assembler, pretty darn good with C and shell script (learning Perl slowly) and have a deep understanding of the way computers *_REALLY_* work inside at the bit level (I just don't get excited about languages anymore). On the issue of trust (a subject near and dear to my heart) I've always subscribed to the belief that it must be earned, not taken. I can only say that since information security is going to be my livelihood for the foreseeable future (the last time I changed my 'vocation' was almost 25 years ago, so I don't swap career paths without a whole lot of thought) it makes sense to develop a good reserve of "reputation capital" in what I do here and elsewhere. I guess from your standpoint, you'll just have to wait and see... In the mean time, I've been working with Michael Boelen (author of Rootkit Hunter) to get an RPM rolled up for submission. Michael has created, what I believe to be, a very useful host-based tool for the scanning of *n[i|u]x and BSD boxes for rootkits. You can find his website here: http://www.rootkit.nl/ And here are the files I will be submitting to QA testing and making a Bugzilla entry for: http://home.earthlink.net/~tamaster/sitebuildercontent/ sitebuilderfiles/rkhunter-1.1.8-0.fdr.0.1.beta1.src.rpm http://home.earthlink.net/~tamaster/sitebuildercontent/ sitebuilderfiles/rkhunter-1.1.8-0.fdr.0.1.beta1-signed.md5 Tomorrow... Must Sleep... ~~ pub 1024D/BC275410 2004-05-12 Greg Houlette (Tek Armory, LLC) <tamaster@xxxxxxxxx> Key fingerprint = 6ED2 F28B EE8B 8EA7 56E9 8F28 62BC 67F9 BC27 5410 uid Tamaster (Tek Armory Master Chef) <tamaster@xxxxxxxxx> uid Tamaster (Tek Armory Master Chef) <root@mystra> Google this: Greg Houlette Y2K power down
Attachment:
signature.asc
Description: This is a digitally signed message part