[iwar] Historical posting


From: Fred Cohen
From: fc@all.net
To: iwar@onelist.com

Mon, Jan 1, 1999


fc  Mon Jan 1, 1999
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA15269 for iwar@onelist.com; Tue, 18 Apr 2000 05:21:43 -0700
To: iwar@onelist.com
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, Jan 1, 1999
From: Fred Cohen 
Reply-To: iwar@egroups.com
Subject: [iwar] Historical posting

          

Malicious programs lie in wait, FBI warns
The FBI's nerve center for cyberspace crimes has warned
that outlaw hackers may use a new class of malicious
software to cripple Internet operations and other computer
networks on New Year's Eve. Under a "worst-case but clearly
possible scenario," the National Infrastructure Protection
Center says the destructive new programs could be used to
wreak havoc during the Y2K period. The center issued its
alert last week to computer-security professionals throughout
the United States.
http://www.uniontrib.com/news/computing/991215-0010_1b15fbi.html

Large-scale phone invasion goes unnoticed by all but FBI
Where have all the hackers gone?
That's an understandable question considering the actions
that currently pass for a news-making "hack." One might
think that the days of Kevin Mitnick's phone hijinks or
Robert Morris's computer worm, which disrupted the
operations of over 6,000 computers nationwide in 1988,
are gone.
http://cnn.com/1999/TECH/computing/12/14/phone.hacking/index.html

Distributed Attack
A new way to mount a denial-of-service attack uses
distributed computing to harness the power of more
than 1,000 PCs. Hacker groups have frowned upon them,
calling them a common game played by bored spammers
and hacker wannabes. And security experts concede the
concept is nothing new. Still, a denial-of-service (DoS)
attack can cripple machines across even the largest
networks, resulting in lost business, frustrated users,
and a painstaking recovery process.
http://www.zdnet.com/zdtv/cybercrime/features/story/0,3700,2404608,00.html

FC