Re: [iwar] news/The "21 Club"

From: e.r. (fastflyer28@yahoo.com)
Date: 2001-07-23 17:05:24


Return-Path: <sentto-279987-1456-995933127-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Mon, 23 Jul 2001 17:07:07 -0700 (PDT)
Received: (qmail 32009 invoked by uid 510); 23 Jul 2001 23:08:06 -0000
Received: from n19.groups.yahoo.com (216.115.96.69) by 204.181.12.215 with SMTP; 23 Jul 2001 23:08:06 -0000
X-eGroups-Return: sentto-279987-1456-995933127-fc=all.net@returns.onelist.com
Received: from [10.1.4.52] by mw.egroups.com with NNFMP; 24 Jul 2001 00:05:27 -0000
X-Sender: fastflyer28@yahoo.com
X-Apparently-To: iwar@yahoogroups.com
Received: (EGP: mail-7_2_0); 24 Jul 2001 00:05:26 -0000
Received: (qmail 90625 invoked from network); 24 Jul 2001 00:05:25 -0000
Received: from unknown (10.1.10.26) by m8.onelist.org with QMQP; 24 Jul 2001 00:05:25 -0000
Received: from unknown (HELO web14506.mail.yahoo.com) (216.136.224.69) by mta1 with SMTP; 24 Jul 2001 00:05:25 -0000
Message-ID: <20010724000524.64443.qmail@web14506.mail.yahoo.com>
Received: from [12.78.117.220] by web14506.mail.yahoo.com via HTTP; Mon, 23 Jul 2001 17:05:24 PDT
To: iwar@yahoogroups.com
In-Reply-To: <200107231258.FAA31229@big.all.net>
From: "e.r." <fastflyer28@yahoo.com>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Mon, 23 Jul 2001 17:05:24 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: Re: [iwar] news/The "21 Club"
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Richard Clarke has been tossed for 21 CEO's. Can you say conflict of
interest?  This guy just get more outlandish.  Email later on the
details.  BR
--- Fred Cohen <fc@all.net> wrote:
> Bush may replace cybersecurity chief with advisers President Bush is
> weighing a markedly different approach to protecting the nation's
> technology backbone from terrorism =97 one that would replace the
> high-profile security job his predecessor created with an advisory
> board
> of federal officials.  The job currently held by national security
> expert Richard Clarke would be replaced with a board of about 21
> officials from all major federal agencies, according to a draft
> executive order obtained by the Associated Press.  The board would
> report to National Security Adviser Condoleezza Rice.  Among the
> agencies that would participate are the departments of State,
> Defense,
> Justice, Energy and Treasury, as well as the National Security
> Agency,
> CIA and FBI. 
>
http://www.usatoday.com/life/cyber/tech/2001-07-17-bush-cybersecurity.htm
> [FC - thus moving it to a 'lower level' within the hierarchy.  Most
> companies
> are moving it to a higher level.]
> 
> U.S.  Security Plan Too Top-Heavy? Critics fear proposed changes to
> the
> way the government protects the nation's technology backbone from
> terrorism could bog down the process and remove the accountability of
> having a single person in charge.  A draft executive order from
> President Bush, obtained by The Associated Press, would abolish the
> high-profile post of security chief in favor of a board of about 21
> officials from all major federal agencies. 
> http://www.wired.com/news/politics/0,1283,45337,00.html
> 
> Decoy PCs give hackers a security lesson For the best security, hack
> the
> hackers, suggest security experts who have spent several months
> watching
> malicious intruders break into disguised decoy systems on the
> Internet. 
> The informal study found it was only two to four days before hackers
> attacked an unprotected Windows 98 system with its file sharing
> enabled. 
> Hackers attacked one such system four times in a five-day period. 
> The
> fastest takeover was 15 minutes, when a hacker broke into a PC
> running
> Red Hat Linux 6.2. 
>
http://www.cnn.com/2001/TECH/internet/07/17/honeynet.project.idg/index.html
> 
> Half of U.S.  Broadband Users Unprotected Are you practically begging
> hackers and Internet thieves to attack? Up to half of U.S.  broadband
> users are leaving themselves wide open to attack by Internet thieves
> and
> hackers.  Why? Because subscribers to "always on" Net connections
> aren't
> using any protection--like a firewall or antivirus software--to keep
> the
> black hats from gaining access to their PCs.  A survey of 1000
> families
> reveals 50 percent of U.S.  broadband subscribers (including digital
> subscriber line, cable, and satellite services) do not have intrusion
> protection, says digital communications researcher Cahners In-Stat
> Group.
> http://www.security-informer.com/ic_651182_3494_1-3283.html
> 
> German Group Supports 'Opt-In' Spam Standard The German Multimedia
> Association (DMMV) said it supports so-called an "opt-in" remedy for
> fighting unsolicited commercial e-mail, or "spam." The announcement
> comes amid continued debate at the highest levels of the European
> Union
> on how to deal with spam.  A solid majority of the EU Telecoms
> Council
> supports the "opt-in" system, which would ban direct marketers from
> sending unsolicited e-mails unless they are given explicit consent by
> potential recipients.  The council comprises telecommunications
> ministers of the 15 EU member states. 
> http://www.newsbytes.com/news/01/168076.html
> 
> Comedian demands $1m for Virus US comedian Ray Owens has demanded
> compensation from anti-virus vendor Symantec for publishing his work
> without copyright.  Owens wrote a fake virus warning which advises
> people to delete the "insidious aol.exe virus" - the executable which
> boots up the AOL application.  The joke known as AOL.exe hoax, was
> reported on many anti-virus vendors' sites, many of them included
> Owens
> entire copyrighted material in their descriptions. 
>
http://www.silicon.com/public/door?REQUNIQ=3D995458325&6004REQEVENT=3D&REQINT1=3D4=205827&REQSTR1=3Dnewsnow
> [FC - Awesome idea]
> 
> Attack Worm Aimed At White House The Code Red Internet worm is
> designed
> to turn Microsoft Web servers into zombies that are expected to
> attack
> the White House Web site next week.  But security experts say the
> worm's
> ability to disrupt www.whitehouse.gov is likely to be limited. 
> According to independent dissections of the worm by Symantec's
> Anti-Virus Research Center (SARC) and eEye Digital Security, the worm
> contains code intended to swamp the network of the White House site
> through a distributed denial of service attack (DDoS) beginning
> Friday,
> July 20.  Initially, security experts believed the worm was a
> relatively
> benign program that merely defaced Web sites running Microsoft's
> Internet Information Server (IIS). 
> http://www.newsbytes.com/news/01/168147.html
> http://www.theregister.co.uk/content/4/20474.html
> http://news.cnet.com/news/0-1003-200-6617292.html
> http://www.msnbc.com/news/602036.asp
> http://www.zdnet.com/zdnn/stories/news/0,4586,5094437,00.html
>
http://www.zdnet.com/filters/printerfriendly/0,6061,2792223-54,00.html
>
http://www.techtv.com/news/hackingandsecurity/story/0,24195,3338042,00.html
> 
> Europe may be source of Cyprus Net attack The U.S.  Federal Bureau of
> Investigation believes a data bombardment attack that crippled Cyprus
> Internet service providers in the past week may have originated in
> Europe, an industry source said on Thursday.  ISPs on the island have
> been targeted in a denial of service attack first launched on July
> 12. 
> The last attack was recorded on July 18 through a Korean address and
> services have since returned to normal.  "We have been told the
> inquiry
> has shifted from the FBI in the United States to FBI in Europe," the
> industry source told Reuters.  "This attack was not from a person in
> the
> United States."
> http://www.zdnet.com/zdnn/stories/newsbursts/0,7407,2792140,00.html
> 
> White House dodges web virus The White House website has beaten a
> computer virus attack designed to knock it out of action.  The virus,
> called Code Red, has already infected around 200,000 computer systems
> around the world, defacing many websites with the message "Hacked By
> Chinese".  The infected systems were scheduled to bombard the
> numerical
> internet address that represents the White House website on Thursday.
> 
> But security experts said officials apparently moved the site to a
> different address, dodging the internet bullet. 
> http://news.bbc.co.uk/hi/english/sci/tech/newsid_1448000/1448431.stm
> http://www.zdnet.com/zdnn/stories/news/0,4586,5094437,00.html
> http://www.fcw.com/fcw/articles/2001/0716/web-worm-07-20-01.asp
> http://news.cnet.com/news/0-1003-200-6617292.html
> 
> Vigilantes Prepare To Strike Back At Code Red Worm As the Code Red
> Worm
> enters a period of hibernation, some security experts are ready to
> turn
> vigilante in their quest to stamp out the malicious code.  According
> to
> estimates Thursday from the CERT Coordination Center, more than
> 225,000
> Web servers running Microsoft's Internet Information Server (IIS)
> software have been infected by the worm, which is designed to deface
> the
> home page of an infected site and attempt to spread to other
> unpatched
> servers.  The worm also turns an infected site into an unwitting
> participant in a distributed denial of service (DDoS) attack on the
> White House Web site.
> http://www.newsbytes.com/news/01/168177.html
> 
> U.S.  Atty General announces new cybercrime initiative On a day that
> the
> White House's Web site came under attack by hackers, U.S.  Attorney
> General John Ashcroft announced a new cybercrime initiative to combat
> hacking, copyright and trademark violations, theft of trade secrets,
> and
> economic espionage.  Ashcroft made the announcement at the offices of
> security software maker VeriSign Inc.  here, following a meeting with
> a
> group of high-tech executives to discuss the state of Internet
> security. 
> Although the timing of the announcement, which coincided with an
> attack
> on the White House Web site was coincidental, Ashcroft said at a
> press
> conference that the incident clearly demonstrated that the government
> needed to do more to make cyberspace more secure. 
> http://www.siliconvalley.com/docs/news/reuters_wire/1349936l.htm
> http://www.siliconvalley.com/docs/news/svfront/ash072101.htm
> http://news.excite.com/news/ap/010720/17/ashcroft-cybercrime
> http://news.cnet.com/news/0-1003-200-6626166.html
> 
> China shuts down 2,000 Internet cafes, paper says China has shut
> nearly
> 2,000 down Internet cafes across the country and has ordered 6,000 to
> suspend operations and make changes, state media said on Friday. 
> Anonymous cybercafes are popular because they allow people to evade
> tough content laws, whose infringement on a personal homepage or
> message
> board authorities are likely to track to its source.  The Shanghai
> Daily
> said the move, China's second major clampdown on the popular cafes in
> a
> little more than a year, aims to regulate the Internet service market
> in
> line with rules set by the Ministries of Information Industry, Public
> Security and Culture and the State Administration of Industry and
> Commerce.  More than 56,800 Internet cafes or bars have been
> inspected
> during a probe that began in April, the newspaper said.  It said
> police
> closed 53 Internet bars and ordered 59 others to suspend operations
> for
> ``rectification and improvement'' in Nanjing in the eastern province
> of
> Jiangsu. 
> http://www.siliconvalley.com/docs/news/reuters_wire/1348140l.htm
> 


__________________________________________________
Do You Yahoo!?
Make international calls for as low as $.04/minute with Yahoo! Messenger
http://phonecard.yahoo.com/

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Secure your servers with 128-bit SSL encryption! Grab your copy of
VeriSign's FREE Guide "Securing Your Web Site for Business." Get it now!
http://www.verisign.com/cgi-bin/go.cgi?a=n094442340008000
http://us.click.yahoo.com/6lIgYB/IWxCAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:37 PDT