[iwar] Historical posting


From: Fred Cohen
From: fc@all.net
To: iwar@onelist.com

Mon, Jan 1, 1999


fc  Mon Jan 1, 1999
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA15269 for iwar@onelist.com; Tue, 18 Apr 2000 05:21:43 -0700
To: iwar@onelist.com
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, Jan 1, 1999
From: Fred Cohen 
Reply-To: iwar@egroups.com
Subject: [iwar] Historical posting

          

Swedish military to prepare for high-tech warfare
The Swedish government plans to train special
information technology soldiers to protect the
nation's military computer systems from hackers,
a newspaper reported Monday. The government has
issued a directive to the armed forces to train
``IT soldiers'' to be able to destroy hostile
systems as well as protect Swedish computer
systems, according to the daily Svenska Dagbladet.
http://www.sjmercury.com/svtech/news/breaking/merc/docs/008563.htm

How to Get a Job in Computer Security
ABC's report on hackers just encouraged illegal
intrusions into computer networks.
The two questions I'm asked most frequently by readers
are "How do I hack computers?" and "How do I get a job
in security?" About eighteen months ago, I started a
series of columns on how to hack computers. Since real
hackers want to learn about computers on their own, the
columns were focused on providing assignments for
readers to complete on their own. Each column outlined
a computer principle, with little guidance.
http://www.zdnet.com/zdtv/cybercrime/spyfiles/story/0,3700,2413045,00.html

FC