May, 2004
Lab’s Anti-Virus Efforts Pay Off -- Sasser Stopped in Tracks
Sometimes, the best indication that something is working well is that not much happens, like when you are inoculated against a disease – and then don’t get sick. That’s the type of approach the Lab's Computer Protection Program takes when it comes to protecting Lab computers from external viruses. A key part of this approach is regular checkups – the Computer Protection Program scans Windows systems on the Lab network to search for vulnerabilities.

Tip of the Month: Don’t Forget to Take Out the (Email) Trash
If you’re a user of the Lab’s central email service, getting rid of unwanted email is really a two-step process. When you delete a message, it is sent to the Trash folder, kind of like putting a piece of trash in a wastebasket. The next step is to empty the trash folder (like emptying the wastebasket into the trash barrel). Until the messages are removed from the Trash folder, they accumulate and continue to take up storage space in the Lab’s email system. In fact, some 40 gigabytes of trashed email is currently being stored – about 10 percent of the total stored mail.

To empty the Trash folder, pull down the File menu and click on “Empty Trash.” That’s it.

Berkeley Lab to Share Linux Cluster Expertise at Community College Conference

Greg Kurtzer of ITSD’s UNIX Services Group will be among the presenters at a national high-perfomance computing conference to be held June 9, 2004, at Contra Costa College in San Pablo. According to ITSD’s Charlie Verboom, who will be moderating one of the sessions, both the workshop and conference are good resources for Lab groups who have hired summer students to help with computing projects or for staff members who have an interest in learning more about HPC at an introductory level.

Building a Linux Cluster? ITSD’s UNIX Group Offers Expertise

Linux clusters are playing an increasingly important computational science role in research across Lab divisions. For many projects, a cluster assembled from off-the-shelf hardware and open-source software is a cost-effective way to obtain a high-performance system. But cutting through the hype and making sense of all the competing systems can be a real challenge. Fortunately, expertise is at hand.

Lab Offers Loaner Cell Phones for Summer Travel
If your Lab or personal cell phone doesn’t provide international access and you’ll be traveling overseas on Lab business, you can arrange a short-term rental (up to 30 days) of an international cell phone from ITSD’s Telephone Service Center. Read more about this service. As with all Lab-issue cell phones, users are responsible for reimbursing the cost of personal calls.

 Protecting Your Computer
On-Line Course Provides Lab Managers with Step-By-Step Cyber Security Training
The Lab’s Computer Protection Program has developed an on-line course entitled “What Managers Need to Know about Berkeley Lab Cyber Security.” As an open, scientific environment, Berkeley Lab needs to tailor its security plans to fit the needs of each organization. This online manual consists of Action Items to help Laboratory managers form their organization’s computer security plan and integrate computer security into the work environment..

Sign-ups for June 2 Advanced UNIX Security Course Open
The Computer Protection Program is offering a new, advanced UNIX security course to be held from 9 a.m. to 2 p.m. on Wednesday, June 2, in Perseverance Hall. Read the course description. Enrollment is limited and is available on a first-come, first-served basis via the Lab’s Employee Self-Service site. The last day to sign up for this free course is COB Friday, May 28.

Patches for High Risk Mac OS X Vulnerabilities Are Now Available
Apple has recently released patches for several serious Mac OS X buffer overflow problems that could allow an attacker to gain unauthorized superuser privileges. Be sure that software update is enabled on your system so that your system will obtain the patches. Read more about the vulnerabilities. You can also read an LBNL Mac OS X security checklist.

Get the Cyber Security Scoop from the Computer Protection Quarterly
Every three months, the Lab’s Computer Protection Program publishes the Computer Protection Quarterly, providing detailed information about important cyber security issues. Both the current and past issues are available on the Web.

IMAGE: computer virus
Monthly Virus Update: Netsky Worm Still Proliferating:
The LBNL virus wall detected and deleted more worms and viruses (a total of 178,023) last month than the month before. Variants of the Netsky worm once again led all others.
  Top  
ITSD