[iwar] news

From: Fred Cohen (fc@all.net)
Date: 2001-05-03 17:31:25

Return-Path: <sentto-279987-1198-988936287-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Thu, 03 May 2001 17:32:07 -0700 (PDT)
Received: (qmail 28299 invoked by uid 510); 3 May 2001 23:32:31 -0000
Received: from fk.egroups.com ( by with SMTP; 3 May 2001 23:32:31 -0000
X-eGroups-Return: sentto-279987-1198-988936287-fc=all.net@returns.onelist.com
Received: from [] by fk.egroups.com with NNFMP; 04 May 2001 00:31:27 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_1_2); 4 May 2001 00:31:26 -0000
Received: (qmail 76995 invoked from network); 4 May 2001 00:31:26 -0000
Received: from unknown ( by l9.egroups.com with QMQP; 4 May 2001 00:31:26 -0000
Received: from unknown (HELO all.net) ( by mta1 with SMTP; 4 May 2001 00:31:26 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id RAA09313 for iwar@onelist.com; Thu, 3 May 2001 17:31:25 -0700
Message-Id: <200105040031.RAA09313@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 3 May 2001 17:31:25 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

May 2, 2001

Chinese hackers hit Colo.  high techs In its intended form, the Web site
for the Rocky Mountain Windows Technology User Group includes links to
job openings and Windows news.  But Monday, it displayed a waving red
Chinese flag.  Chinese hackers have been attacking U.S.  Web sites this
week, mostly replacing pages with anti-American rhetoric.  By Tuesday,
Chinese hackers had claimed hundreds of attacks -- and warned that they
could get worse.  ``It's a minor hack.  It wasn't extremely destructive,
but it certainly was annoying,'' said Bruce Handley, president of the
user group.  U.S.  hackers have retaliated by defacing Chinese sites. 

Pro-China Hackers Attack California Websites

U.S., Chinese hackers continue Web defacements

U.S.  railroad regulator hit by hackers

FBI's Cyber-cops Warn Of 'Significant Rise' In Unix Hacks Malicious
hackers have scanned literally millions of Unix-based computer networks
of late in search of a particular printer program and network protocol
that can be exploited to gain complete control over affected systems,
federal computer security experts warned Monday.  The National
Infrastructure Protection Center (NIPC), the FBI's cybercrime arm, said
it had observed a "very significant increase" in attempts to exploit the
weaknesses.  According to the alert, the vulnerabilities reside in
program called "lpd/LPRng," which handles printer requests across Unix
networks.  The other weakness involves Sun Microsystems' RPC (remote
procedure call), a protocol listening on Port 111 on Unix systems that
allows services across a network to communicate with one another. 

FBI 'hack' could set dangerous precedent An FBI operation to obtain
evidence on two Russian hackers, from servers based in Russia, could
give intelligence agents free reign to hack computers outside the US.  A
sting operation in which FBI agents downloaded data from two
Russian-based computers has some high-tech lawyers concerned that the
precedent may be used to justify indiscriminate, cross-border hacking. 

Microsoft tells US Air Force to bug off Microsoft's security patch for
Outlook, which is designed to protect users from the effects of another
Love Bug-style virus, has come under fire from no less a body than the
US Air Force.  In a paper to be presented at a security workshop in
June, an assistant professor of computer science at the US Air Force
Academy will deliver a devastating critique of Microsoft's approach to
security in general and Outlook in particular.  Martin Carlisle will
tell an audience of security experts that a security patch to Outlook,
which is designed to stop viruses spreading via automated messages
through requiring user's authorisation via a dialog box, can be easily

Codebreaker II Cracked it! Well, it's been quite an afternoon down here
at the Vulture Central encryption department.  Not two hours after we
gave you an apparently much-needed leg up, we got an triumphant e-mail
from one Mark Wutka.  Mark has every right to be pleased with himself,
having successfully cracked the code and supplied the original text.  He
also outlined several other details - which we will obviously not
disclose now - indicating that he was right on the ball. 


Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 

This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:10 PDT