[iwar] Historical posting


From: Fred Cohen
From: fc@all.net
To: iwar@onelist.com

Mon, Jan 1, 1999


fc  Mon Jan 1, 1999
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA15269 for iwar@onelist.com; Tue, 18 Apr 2000 05:21:43 -0700
To: iwar@onelist.com
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, Jan 1, 1999
From: Fred Cohen 
Reply-To: iwar@egroups.com
Subject: [iwar] Historical posting

          

 27 December 1999  Cyber Warfare Preparedness
This article paints cyber warfare scenarios and points out the
interdependence of technological systems.
http://www.it.fairfax.com.au/industry/19991227/A59706-1999Dec27.html

27 December 1999  Distributed Attack Tools Warnings
Between 50 and 100 attacks involving such tools as TFN (Tribe Flood
Network) and Trinoo have been reported.  The key to disabling these
systems is to find the master programs throughout the covertly set up
network.  CERT recommends out-of-band communications procedures or
emergency response teams to deal with such denial of service attacks.
http://www.currents.net/newstoday/99/12/27/news3.html

25 December 1999  New Guinea's Electricity Commission Not Yet Y2K
                  Compliant
Papua New Guinea's Electricity Commission is bankrupt and needs money
to complete Y2K compliance measures.  If the funds aren't made available,
the commission predicts "major disruption" to a number of its computer
systems.  http://www.currents.net/newstoday/99/12/25/news1.html

23 December 1999  Guarding the Internet
Groups from government and industry are joining forces to guard the
Internet during the Y2K rollover.
http://www.techweb.com/wire/story/TWB19991223S0002

23 December 1999  New Versions of TFN and Trinoo
A new, more powerful version of Tribe Flood Network (TFN), the distributed
attack tool, enlists a broader base of operating systems, encrypts
communications, and uses a single command to launch an attack.  A new
version of Trinoo is expected soon.  Other distributed attack tools
exist but are harder to detect than are these two.
http://news.cnet.com/category/0-1003-200-1504709.html
http://www.computerworld.com/home/print.nsf/all/991223D786

22 December 1999  E-Mail Scanner Hole
Norton's e-mail virus scanner uses a proxy that makes users' computers
visible on the Internet, and could lead to denial of service attacks.
http://www.msnbc.com/news/349602.asp

A General Accounting Office (GAO) report indicates Environmental
Protection Agency (EPA) systems are vulnerable to crackers.  Two years
ago, the agency suffered a number of security breaches leading to lost
data.
http://www.zdnet.com/zdnn/stories/news/0,4586,2412552,00.html?chkpt=hud0004200
http://www.currents.net/newstoday/99/12/23/news2.html

20 December 1999  Evidence of Y2K Problems
Early Y2K glitches include raw sewage spilling into streets in a
California town and automobiles being registered as "horseless carriages"
in Maine.  http://www.zdnet.com/zdnn/stories/news/0,4586,2411183,00.html

FC