Das ist mein WEBLOG! |
... newer stories
Sonntag, 26. März 2006
Eröffnungsbeitrag - Social Software
Barbara.Voglsberger.Uni-Linz, 13:58h
Social Software
Ich habe mich bereits im letzten Semester mit diesem Thema eingehend auseinander gesetzt. Hier nochmals eine kurze Zusammenfassung: Was ist Social Software? Quelle: http://de.wikipedia.org/wiki/Social_Software Als Soziale Software (englisch Social Software) werden (Software-)Systeme bezeichnet, die die menschliche Kommunikation, Interaktion und Zusammenarbeit unterstützen. Das Schlagwort „Social Software“ hat sich um 2002 in Zusammenhang mit neuen Anwendungen wie Wikis und Weblogs etabliert; der Begriff kann aber auch bereits vorher existierende Dienste umfassen. Den Systemen ist gemein, dass sie Aufbau und Pflege Sozialer Netzwerke und von Communities unterstützen und weitgehend mittels Selbstorganisation funktionieren. Also das was wir hier machen, Beiträge in diesem (unserem) Blog zu verfassen, fällt unter Social Software. Persönliche Erfahrungen Zu meinen persönlichen Erfahrungen in diesem Bereich gehören vor allen jene, aus dem letzten Semester. Ich habe einiges in diesem Blog publiziert, aber anscheindend war es zu wenig, daher werde ich es dieses Semester nochmals versuchen. Sonst kann ich eigentlich nicht viel zu meinen persönlichen Erfahrungen sagen, weil ich doch immer wieder versuche, diesen neuen Medien etwas auszuweichen. Teilweise bin ich persönlich nicht so wirklich davon überzeugt! Ich denke mir, ein face-to-face Gespräch ist, wenn es möglich ist, doch immer noch am besten. Dennoch bemühe ich mich, mit den neuen Medien zu arbeiten!! Persönliche Erwartungen an die LVA Zu meinen persönlichen Erwartungen kann ich nicht sehr viel sagen, da ich ja schon weiß, wie diese LVA abläuft. Doch für mich möchte ich dieses Semester versuchen, doch mehr mitzuarbeiten und vor allem auch gute Beiträge in meinem Blog zu publizieren. Ich hoffe, dass mir das auch so gelingen wird. Gefahren durch Social Software Wie in der LVA letzten Donnerstag besprochen wurde, sind geführte Blogs nicht nur von Vorteil. Sie tragen dazu bei, dass zum Beispiel auch Falschinformationen schnell verbreitet werden. Denn bekannte Blogs werden von vielen Nutzern gelesen und auch gleich weiter verlinkt! Ob dies alles so von Vorteil ist, kann ich auch nicht sagen. Aber meiner Meinung nach sind Informationen aus dem Internet, egal welcher Art, mit Vorsicht zu genießen. Jeder kann publizieren und jeder kann das weiterverwenden. Doch welche Informationen wirklich bestätigt sind oder auch nicht, dass kann man meistens nicht nachvollziehen. ... link (1 comment) ... comment Sonntag, 29. Januar 2006
Ping von www.heisse.de
Barbara.Voglsberger.Uni-Linz, 15:27h
Das Ergebnis:
Leider hat die Bildschirmkopie wieder nicht funktioniert, daher wieder einfach so reinkopiert!! Microsoft Windows XP [Version 5.1.2600] (C) Copyright 1985-2001 Microsoft Corp. C:\>ping www.heisse.de Ping www.heisse.de [82.165.110.56] mit 32 Bytes Daten: Antwort von 82.165.110.56: Bytes=32 Zeit=1597ms TTL=54 Antwort von 82.165.110.56: Bytes=32 Zeit=39ms TTL=54 Antwort von 82.165.110.56: Bytes=32 Zeit=40ms TTL=54 Antwort von 82.165.110.56: Bytes=32 Zeit=40ms TTL=54 Ping-Statistik für 82.165.110.56: Pakete: Gesendet = 4, Empfangen = 4, Verloren = 0 (0% Verlust), Ca. Zeitangaben in Millisek.: Minimum = 39ms, Maximum = 1597ms, Mittelwert = 429ms C:\> ... link (0 comments) ... comment Portscan mein PC
Barbara.Voglsberger.Uni-Linz, 15:21h
Das Ergebnis meines Portscan:
Kurz eine Zusammenfassung. Fast alle meine Ports sind geschlossen, bis auf FTP, Telnet, WEb, Ident und ICMP. Dieser Scan ist eigentlich ganz interessant, weil ich so erkennen kann, wo die Schwachstellen bei meinem PC liegen, und wo ich unbedingt etwas ändern sollte. Das Ergbnis ist folgendes: You are not fully protected: We have detected that some of our probes connected with your computer. Ich hab es leider so einfügen müssen, weil die Bildschirmkopie nicht funktioniert hat, aber ich hab es!!! Service Ports Status Additional Information FTP DATA 20 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. FTP 21 OPEN File Transfer Protocol is used to transfer files between computers. A misconfigured FTP server can allow an attacker to transfer files, Trojan horses, and virus programs at will. SSH 22 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. TELNET 23 OPEN Telnet is used to remotely create a shell (dos prompt), this can allow an attacker to control your system as if he was sitting in front of it. SMTP 25 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. DNS 53 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. DCC 59 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. FINGER 79 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. WEB 80 OPEN HTTP web services publish web pages. A misconfigured web server can not only offer an attacker needed information about his target, but it can allow for various security breaches. POP3 110 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. IDENT 113 OPEN Ident is often used for IRC (chat), but also provides information about your system and who is using it. Location Service 135 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. NetBIOS 139 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. HTTPS 443 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. Server Message Block 445 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. SOCKS PROXY 1080 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. UPnP 5000 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. WEB PROXY 8080 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed. Results from scan of commonly used trojans at TCP/IP address: 195.3.113.55 Service Ports Status Possible Trojans Trojan 1243 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. Trojan 1999 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. Trojan 6776 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. Trojan 7789 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. Trojan 12345 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. Trojan 31337 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. Trojan 54320 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. Trojan 54321 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. Results from scan of ICMP at TCP/IP address: 195.3.113.55 Protocol Type Status Additional Information ICMP 8 OPEN An ICMP ping request is usually used to test Internet access. However, an attacker can use it to determine if your computer is available and what OS you are running. This gives him valuable information when he is determining what type of attack to use against you. ... link (0 comments) ... comment Montag, 23. Januar 2006
Netzwerktools einsetzen
Barbara.Voglsberger.Uni-Linz, 10:14h
Ergebnis: traceroute to www.heisse.de am Sonntag 29. 1. 2006
1 fwsrv1.ces.uta.at (213.90.2.2) 0.554 ms 0.189 ms 0.216 ms 2 213.90.1.17 (213.90.1.17) 0.775 ms 0.582 ms 0.643 ms 3 wat1-15-21.net.uta.at (62.218.15.21) 0.941 ms 0.602 ms 0.658 ms 4 c76wmode1-tengigE4-1.net.uta.at (212.152.192.206) 0.804 ms 0.783 ms 0.777 ms 5 vie3-core.gigabiteth1-0.swip.net (130.244.205.57) 0.956 ms 1.205 ms 0.922 ms 6 shu1-core.pos2-0.swip.net (130.244.205.50) 1.264 ms 1.199 ms 1.181 ms 7 sl-gw10-vie-1-1.sprintlink.net (80.66.137.29) 1.261 ms 1.701 ms 1.118 ms 8 sl-bb21-vie-5-0.sprintlink.net (80.66.136.40) 1.178 ms 2.625 ms 1.641 ms 9 sl-bb21-fra-6-0.sprintlink.net (213.206.129.135) 24.827 ms 24.586 ms 24.424 ms 10 sl-gw20-fra-1-1.sprintlink.net (217.147.96.227) 24.984 ms 26.631 ms 24.963 ms 11 sle-schlun-2-0.sprintlink.net (217.147.97.58) 16.345 ms 122.225 ms 15.449 ms 12 so-4000.gw-backbone-a.bs.ka.schlund.net (212.227.120.8) 18.172 ms 18.477 ms 18.267 ms 13 a0kac1.gw-dista-a.bs.ka.schlund.net (212.227.116.216) 18.418 ms 18.042 ms 18.422 ms 14 gw-ps5.bs.ka.schlund.net (212.227.125.6) 18.569 ms 18.781 ms 18.555 ms 15 kundenserver.de (82.165.110.56) 18.026 ms 18.203 ms 17.997 ms ... link (0 comments) ... comment ... older stories
|
Online for 6974 days
Last update: 2006.06.24, 10:14 status
You're not logged in ... login
menu
search
calendar
recent updates
Netzwerktools einsetzen
Portscan Zum Abschluss habe ich noch den Portscan... by Barbara.Voglsberger.Uni-Linz (2006.06.24, 10:14) Netzwerktools einsetzen
Tracert Nun auch das Ergebnis des Tracert vom Wochenende,... by Barbara.Voglsberger.Uni-Linz (2006.06.24, 09:12) Netzwerktools einsetzen
Ping Ergebnis des Scans am Wochenende vom 24. Juni... by Barbara.Voglsberger.Uni-Linz (2006.06.24, 09:06) Netzwerktools einsetzen
Traceroute Traceroute ist ein Diagnose-Werkzeug, mit... by Barbara.Voglsberger.Uni-Linz (2006.06.23, 17:59) Netzwerktools einsetzen
Ping Ping ist ein Computerprogramm, mit dem überprüft... by Barbara.Voglsberger.Uni-Linz (2006.06.23, 17:58) |