[iwar] news

From: Fred Cohen (fc@all.net)
Date: 2001-04-21 19:30:18


Return-Path: <sentto-279987-1151-987906620-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Sat, 21 Apr 2001 19:31:07 -0700 (PDT)
Received: (qmail 7973 invoked by uid 510); 22 Apr 2001 01:31:35 -0000
Received: from ej.egroups.com (64.211.240.230) by 204.181.12.215 with SMTP; 22 Apr 2001 01:31:35 -0000
X-eGroups-Return: sentto-279987-1151-987906620-fc=all.net@returns.onelist.com
Received: from [10.1.4.53] by ej.egroups.com with NNFMP; 22 Apr 2001 02:30:20 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_1_2); 22 Apr 2001 02:30:19 -0000
Received: (qmail 61960 invoked from network); 22 Apr 2001 02:30:19 -0000
Received: from unknown (10.1.10.142) by l7.egroups.com with QMQP; 22 Apr 2001 02:30:19 -0000
Received: from unknown (HELO all.net) (65.0.156.78) by mta3 with SMTP; 22 Apr 2001 02:30:19 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id TAA14805 for iwar@onelist.com; Sat, 21 Apr 2001 19:30:18 -0700
Message-Id: <200104220230.TAA14805@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sat, 21 Apr 2001 19:30:18 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

U. of Miami hacked by 1i0n Crew! Chinese hackers have not caught up to
their American counterparts in the race for, well, who knows what they
are racing towards, but the headhunt is on and China can chalk up a few
more hits.  1i0n Crew, best known for the creation of the recent 1i0n
worm sent out to attack Linux systems, has defaced the University of
Miami Law Department website.  They also got a Korean site: the Sachon
Office of Education.  An anonymous hacker took over the Department of
Health and Human Services leaving only the message: You've been hacked
by the Chinese Government.  Of course, the chances that really was the
Chinese government are remote.  Would the FBI publicize a hack into a
Chinese site? Probably not.  Now for the conspiracy theorists out there,
it seems possible that an American hacker (or other) could have hacked
an American site and left the message to stir up a little trouble. 
http://www.securitywatch.com/newsforward/default.asp

Hacktivists launch virtual demo while streets blocked UK protests lend a
hand to demonstrators who can't get to American trade conference in
Canada.  A group of demonstrators in the UK are organising a "virtual
sit-in" against the trade group Free Trade Area of Americas (FTAA) in
protest of its promotion of economic globalisation and defiance of its
attempts to hamper street protests.  According to the organisers -- the
Electrohippies -- Internet action provides the only means to register
their opposition to the FTAA and its policies during its conference in
Quebec, which starts on Friday.  The FTAA has gained police support to
impose a 5km curfew zone around the conference in order to disrupt
protests.
http://www.zdnet.co.uk/news/2001/15/ns-22370.html
http://www.wired.com/news/politics/0,1283,43137,00.html

Political cyberterrorism: Labour is Conservative The general election is
hotting up and the Internet will play a big part in it.  Odd then that
the Web address www.newlabour.co.uk points to arch enemy
www.conservatives.com.  What's going on here? A man known as Robert
Parker owns this URL that, quite frankly, many many people are likely to
tap in if they want to know more about the Labour party/government. 
Robert is a hard man to get hold of.  He won't answer his phone and the
company that registered the URL seems to believe that the Data
Protection Act prevents them from telling us any other contact details. 
http://www.theregister.co.uk/content/6/18416.html


------------------------ Yahoo! Groups Sponsor ---------------------~-~>
Secure your servers with 128-bit SSL encryption!
Grab your copy of VeriSign's FREE Guide,
"Securing Your Web site for Business." Get it now!
http://us.click.yahoo.com/4cW4jC/e.WCAA/bT0EAA/kzAVlB/TM
---------------------------------------------------------------------_->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:08 PDT