WingNET Internet Services

Why Surf When You Can Fly? (R)

Editing Your Username in Mac OS 9

This article covers how to change your username for dialup Internet access in Apple Macintosh Operating System 9.

[Read the rest of this entry…]

WingNET Buys ZipStar Customers

On November 15, 2002, ZipStar LLC formally ceased operations as an Internet Service Provider. Through an agreement with WingNET Internet Services, another local Internet Service Provider with multiple T1s, nationwide access numbers and fast connections, all current ZipStar customers are able to continue service with little or no interruption.

ZipStar staff sent out letters to most current customers in an attempt to notify them of this decision. Unfortunately, not all customers were notified through postal mail.

If you are one of the customers who have not received a letter in the mail explaining how to continue your Internet service, please contact the offices of WingNET Internet Services at (423) 559-5465, a Cleveland number that is local to most of the ZipStar customers. You will be given information regarding the details of the switch as well as a special offer to you as a former ZipStar customer during the transition.

This page is currently being served by WingNET since the transition is in effect and does not speak for ZipStar LLC beyond the actual news related above.

If you are a former customer who still has gozipstar.com set as your home page, you should now point your browser to this address –> www.wingnet.net <– as your start page. For help in doing this, call our offices.

Linux Forensics Links

Linux Forensics Links PDF Print E-mail

The following list are potentially useful if you need to do forensics on a compromised computer.  They were found elsewhere on the Net and noted here for archival purposes.

http://www.bastille-linux.org/

http://www.rootkit.nl/projects/rootkit_hunter.html
http://www.chkrootkit.org/

http://www.sleuthkit.org/index.php
http://www.sleuthkit.org/sleuthkit/
http://sleuthkit.sourceforge.net/autopsy/desc.php
http://www.sleuthkit.org/links.php

http://www.linux-forensics.com/links.html

http://www.forensics.nl/toolkits
http://www.intrusions.org/incidents/lists

http://seclists.org/
http://www.insecure.org/
http://www.insecure.org/tools.html

http://www.hackinglinuxexposed.com/articles/
http://www.hackinglinuxexposed.com/about/ << pretty good book

http://www.linuxexposed.com/Articles/Security.html