[iwar] Historical posting


From: Fred Cohen
From: fc@all.net
To: iwar@onelist.com

Mon, Jan 1, 1999


fc  Mon Jan 1, 1999
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA15269 for iwar@onelist.com; Tue, 18 Apr 2000 05:21:43 -0700
To: iwar@onelist.com
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, Jan 1, 1999
From: Fred Cohen 
Reply-To: iwar@egroups.com
Subject: [iwar] Historical posting

          

29 November 1999  NSA Surveillance Faces New Technology Digital communications equipment, fiber optic cables, and good, strong encryption software are making eavesdropping increasingly difficult for the National Security Agency (NSA). http://www.wired.com/news/politics/0,1283,32770,00.html


29 November 1999  Pakistan Not Well Prepared for Y2K Pakistan's critical infrastructure could suffer considerably with the arrival of January 1, 2000, according to the head of the country's Y2K team.  When the military deposed the premier in October, Y2K efforts ceased.  Now that they have resumed, there is not enough time to make everything compliant. http://www.techserver.com/noframes/story/0,2294,500062952-500104078-500458764-0,00.html


26 November 1999  Experts Warn of Internet Spying Tools Online greeting cards and screen savers could contain embedded code which will switch on a computer's microphone, make a recording and send it off to a designated address.  The same thing could be done with a web camera. http://news.bbc.co.uk/hi/english/sci/tech/newsid_537000/537520.stm

(See also http://all.net/ under "New Security Database"
	=> Attack Methods => audio/video viewing)


23 November 1999  Government Web Sites Defaced A cracker claiming to have the government's best interests at heart defaced three government web sites, including one at NASA.  The cracker used a well-known hole to infiltrate the sites. http://www.wired.com/news/politics/0,1283,32729,00.html


23 November 1999  Buffer Overflows are Common and Unnecessary Buffer overflows are a serious security threat because they allow executable code to run without normal security measures and potentially take control of a system.  Buffer overflows occur frequently, and are usually the result of sloppy programming.  Defenses against buffer overflows include debugging tools, and devices that prevent excess code from moving out of or executing in the address space. http://dailynews.yahoo.com/h/cn/19991123/tc/19991123021.html


22 November 1999  DOD May Ban JavaScript The Department of Defense (DOD) is considering banning all mobile code, including JavaScript, from its sites because such code poses a security risk.  As a result, the DOD sites would be less interactive http://www.zdnet.com/intweek/stories/news/0,4164,2398925,00.html