[iwar] Historical posting


From: Fred Cohen
From: fc@all.net
To: iwar@onelist.com

Mon, Jan 1, 1999


fc  Mon Jan 1, 1999
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA15269 for iwar@onelist.com; Tue, 18 Apr 2000 05:21:43 -0700
To: iwar@onelist.com
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, Jan 1, 1999
From: Fred Cohen 
Reply-To: iwar@egroups.com
Subject: [iwar] Historical posting

          

 -- 26 January 2000  Proof of Echelon's Existence
A researcher has found evidence to confirm the existence of Echelon,
the program thought to be a major global surveillance network.  It
appears to be more limited in scope than previously thought.
http://www.wired.com/news/print/0,1294,33891,00.html

-- 31 January 2000  NSA Computer Outage
Computers used to process collected intelligence at the National Security
Agency (NSA) failed and remained out of commission for three days last
week.  Contingency plans were immediately implemented, and organization
reports it has nearly caught up with the information-processing backlog
that the outage created.
http://www.usatoday.com/life/cyber/tech/cth244.htm
http://news.cnet.com/category/0-1009-200-1537774.html

-- 26 January 2000  China Issues Internet Regulations
The Chinese government has issues strict Internet controls to prevent
state secrets from being leaked.  Web sites will need to have security
checks, and all software used to transmit sensitive data must be
registered.  http://www.wired.com/news/print/0,1294,33910,00.html
http://www.usatoday.com/life/cyber/tech/cth217.htm
http://www.currents.net/newstoday/00/01/27/news6.html
-- 31 January 2000  Most Ignore Chinese Registration Requirements
Few companies complied with China's stringent new software registration
regulations.  http://www.wired.com/news/print/0,1294,33992,00.html

-- 27 January 2000  Distributed Denial of Service Attacks
Distributed Denial of Service Attacks (DDOS) are all but impossible to
trace back to the perpetrator, and successfully defending against an
attack doesn't prevent the cracker from launching a new one.  Firewalls
that could be used to catch a DDOS attack would also block important
functions.  http://www.theregister.co.uk/000127-000005.html

-- 26 January 2000  Top Viruses of 1999
Sophos has compiled a list of the top ten reported viruses of 1999; some
of those listed, such as Form and Laroux, are several years old.
http://news.bbc.co.uk/hi/english/sci/tech/newsid_619000/619687.stm


FC