Return-Path: <sentto-279987-1257-991098619-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Mon, 28 May 2001 18:11:09 -0700 (PDT) Received: (qmail 21701 invoked by uid 510); 29 May 2001 00:11:19 -0000 Received: from ef.egroups.com (64.211.240.229) by 204.181.12.215 with SMTP; 29 May 2001 00:11:19 -0000 X-eGroups-Return: sentto-279987-1257-991098619-fc=all.net@returns.onelist.com Received: from [10.1.4.52] by ef.egroups.com with NNFMP; 29 May 2001 01:10:19 -0000 X-Sender: fc@all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_1_3); 29 May 2001 01:10:18 -0000 Received: (qmail 96216 invoked from network); 29 May 2001 01:10:15 -0000 Received: from unknown (10.1.10.142) by m8.onelist.org with QMQP; 29 May 2001 01:10:15 -0000 Received: from unknown (HELO all.net) (65.0.156.78) by mta3 with SMTP; 29 May 2001 01:10:13 -0000 Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id SAA06740 for iwar@onelist.com; Mon, 28 May 2001 18:10:13 -0700 Message-Id: <200105290110.SAA06740@all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Mon, 28 May 2001 18:10:12 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] news Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Chinese writer's son in jail for posting essays on Net. The government's attempt to control political views on the Internet has taken a new twist with the detention of a man whose apparent trespass was to help his father maintain a Web site featuring the father's obscure, left-wing writings. The father, Lu Jiaping, 60, a retired army officer, is free and still living in Beijing, where he spends his days writing essays from his own perspective. He has accused the authorities, for example, of indulging the United States after the recent spy-plane collision, and he has questioned the 1989 massacre of student demonstrators at Tiananmen Square, not because of the blow to democracy but because, he said, it derailed a drive against an ``unstoppable black tide'' of corruption. http://www.siliconvalley.com/docs/news/tech/007922.htm NASA still has security gap NASA has improved its security processes since a scathing General Accounting Office report found holes in some of the space agency's mission-critical systems. But NASA still needs to improve the way it scans for potential vulnerabilities, a new audit by the agency's inspector general says. NASA has implemented nearly all of the recommendations from a May 1999 GAO report, which revealed that auditors were able to hack into several systems. Those systems included one responsible for calculating detailed positioning data for Earth-orbiting spacecraft and another that processes and distributes scientific data received from those spacecraft. http://www.fcw.com/fcw/articles/2001/0521/web-nasa-05-24-01.asp Multiple flaws in Cisco router software exposed Cisco Systems has warned that multiple vulnerability with the operating system used by its 600 series routers leave its vulnerable to a barrage of attacks. Late last night, Cisco issued an alert which admitted that 600 series routers was subject to not one, not two, not three but four potentially serious flaws. It advised users to upgrade the software. One flaw with Cisco CBOS Software, which runs on 600 series routers, means that passwords are stored in clear text in the memory of a router. http://www.theregister.co.uk/content/5/19148.html U.S.'s Defenseless Department When the U.S. government created the National Infrastructure Protection Center in February 1998 to thwart "cyber criminals," officials couldn't stop talking about how the feds were finally fighting back against the hacker menace. Former Attorney General Janet Reno said at the time that the new agency would "pursue criminals who attack or employ global networks" -- and that without the NIPC, "the nation will be at peril." Three years later, it's the NIPC that's in peril -- of being dubbed a poorly organized, ill-conceived bureaucracy that more established agencies routinely ignore and that has not lived up to the promises its proponents once made. http://www.wired.com/news/politics/0,1283,44019,00.html 18th Century warfare to fight Internet crackers The Software & Information Industry Association (SIIA) calls for a fresh approach to protect credit card details from Internet crackers. According to the SIIA, many businesses today implement an 'eggshell' security model: hard on the outside and soft in the centre. The problem is that there is often little or nothing to prevent hackers from accessing sensitive customer records - once they breach firewall defences. A technology working group of the SIIA's ebusiness division has come up with an concept called the Electronic Citadel. Sensitive data is encrypted so that it can be validated at any time in the future but the original information may only be recovered during a defined period of time. This is described as the final barrier to protect sensitive data when other defences have been breached. http://www.theregister.co.uk/content/8/19180.html Jawz Inc - Cyber Terrorism in the Classroom - JAWZ Inc., a leading provider of secure information management solutions held its premier eSecurity course on Cyber Terrorism. The one-day advanced course aimed at Intelligence officers and forensic examiners took students into the virtual world of Internet, introduced them to on-line terrorist organizations, targets, existing dangers, resources, tools and case studies. The course calendars for Cyber Terrorism, Computer Forensics, Hacking Fundamentals and Basics of IT Security will expand due to demand for these courses. "Security attacks are on the rise. We've seen these attacks grow over the last 15 months - and most significantly, political attacks, such as the U.S./China 'cyber war' website attacks demonstrate the critical need for increased security and education," said Robert Kubbernus, Chairman and CEO of JAWZ Inc. "With more sophisticated hackers, online hacker tools and "always on" connections, the Internet has become the largest criminal playground." http://63.108.181.201/2001/05/24/mn/0000-3047-KEYWORD.Missing.html ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:14 PDT