Return-Path: <sentto-279987-1456-995933127-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Mon, 23 Jul 2001 17:07:07 -0700 (PDT) Received: (qmail 32009 invoked by uid 510); 23 Jul 2001 23:08:06 -0000 Received: from n19.groups.yahoo.com (216.115.96.69) by 204.181.12.215 with SMTP; 23 Jul 2001 23:08:06 -0000 X-eGroups-Return: sentto-279987-1456-995933127-fc=all.net@returns.onelist.com Received: from [10.1.4.52] by mw.egroups.com with NNFMP; 24 Jul 2001 00:05:27 -0000 X-Sender: fastflyer28@yahoo.com X-Apparently-To: iwar@yahoogroups.com Received: (EGP: mail-7_2_0); 24 Jul 2001 00:05:26 -0000 Received: (qmail 90625 invoked from network); 24 Jul 2001 00:05:25 -0000 Received: from unknown (10.1.10.26) by m8.onelist.org with QMQP; 24 Jul 2001 00:05:25 -0000 Received: from unknown (HELO web14506.mail.yahoo.com) (216.136.224.69) by mta1 with SMTP; 24 Jul 2001 00:05:25 -0000 Message-ID: <20010724000524.64443.qmail@web14506.mail.yahoo.com> Received: from [12.78.117.220] by web14506.mail.yahoo.com via HTTP; Mon, 23 Jul 2001 17:05:24 PDT To: iwar@yahoogroups.com In-Reply-To: <200107231258.FAA31229@big.all.net> From: "e.r." <fastflyer28@yahoo.com> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Mon, 23 Jul 2001 17:05:24 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: Re: [iwar] news/The "21 Club" Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Richard Clarke has been tossed for 21 CEO's. Can you say conflict of interest? This guy just get more outlandish. Email later on the details. BR --- Fred Cohen <fc@all.net> wrote: > Bush may replace cybersecurity chief with advisers President Bush is > weighing a markedly different approach to protecting the nation's > technology backbone from terrorism =97 one that would replace the > high-profile security job his predecessor created with an advisory > board > of federal officials. The job currently held by national security > expert Richard Clarke would be replaced with a board of about 21 > officials from all major federal agencies, according to a draft > executive order obtained by the Associated Press. The board would > report to National Security Adviser Condoleezza Rice. Among the > agencies that would participate are the departments of State, > Defense, > Justice, Energy and Treasury, as well as the National Security > Agency, > CIA and FBI. > http://www.usatoday.com/life/cyber/tech/2001-07-17-bush-cybersecurity.htm > [FC - thus moving it to a 'lower level' within the hierarchy. Most > companies > are moving it to a higher level.] > > U.S. Security Plan Too Top-Heavy? Critics fear proposed changes to > the > way the government protects the nation's technology backbone from > terrorism could bog down the process and remove the accountability of > having a single person in charge. A draft executive order from > President Bush, obtained by The Associated Press, would abolish the > high-profile post of security chief in favor of a board of about 21 > officials from all major federal agencies. > http://www.wired.com/news/politics/0,1283,45337,00.html > > Decoy PCs give hackers a security lesson For the best security, hack > the > hackers, suggest security experts who have spent several months > watching > malicious intruders break into disguised decoy systems on the > Internet. > The informal study found it was only two to four days before hackers > attacked an unprotected Windows 98 system with its file sharing > enabled. > Hackers attacked one such system four times in a five-day period. > The > fastest takeover was 15 minutes, when a hacker broke into a PC > running > Red Hat Linux 6.2. > http://www.cnn.com/2001/TECH/internet/07/17/honeynet.project.idg/index.html > > Half of U.S. Broadband Users Unprotected Are you practically begging > hackers and Internet thieves to attack? Up to half of U.S. broadband > users are leaving themselves wide open to attack by Internet thieves > and > hackers. Why? Because subscribers to "always on" Net connections > aren't > using any protection--like a firewall or antivirus software--to keep > the > black hats from gaining access to their PCs. A survey of 1000 > families > reveals 50 percent of U.S. broadband subscribers (including digital > subscriber line, cable, and satellite services) do not have intrusion > protection, says digital communications researcher Cahners In-Stat > Group. > http://www.security-informer.com/ic_651182_3494_1-3283.html > > German Group Supports 'Opt-In' Spam Standard The German Multimedia > Association (DMMV) said it supports so-called an "opt-in" remedy for > fighting unsolicited commercial e-mail, or "spam." The announcement > comes amid continued debate at the highest levels of the European > Union > on how to deal with spam. A solid majority of the EU Telecoms > Council > supports the "opt-in" system, which would ban direct marketers from > sending unsolicited e-mails unless they are given explicit consent by > potential recipients. The council comprises telecommunications > ministers of the 15 EU member states. > http://www.newsbytes.com/news/01/168076.html > > Comedian demands $1m for Virus US comedian Ray Owens has demanded > compensation from anti-virus vendor Symantec for publishing his work > without copyright. Owens wrote a fake virus warning which advises > people to delete the "insidious aol.exe virus" - the executable which > boots up the AOL application. The joke known as AOL.exe hoax, was > reported on many anti-virus vendors' sites, many of them included > Owens > entire copyrighted material in their descriptions. > http://www.silicon.com/public/door?REQUNIQ=3D995458325&6004REQEVENT=3D&REQINT1=3D4=205827&REQSTR1=3Dnewsnow > [FC - Awesome idea] > > Attack Worm Aimed At White House The Code Red Internet worm is > designed > to turn Microsoft Web servers into zombies that are expected to > attack > the White House Web site next week. But security experts say the > worm's > ability to disrupt www.whitehouse.gov is likely to be limited. > According to independent dissections of the worm by Symantec's > Anti-Virus Research Center (SARC) and eEye Digital Security, the worm > contains code intended to swamp the network of the White House site > through a distributed denial of service attack (DDoS) beginning > Friday, > July 20. Initially, security experts believed the worm was a > relatively > benign program that merely defaced Web sites running Microsoft's > Internet Information Server (IIS). > http://www.newsbytes.com/news/01/168147.html > http://www.theregister.co.uk/content/4/20474.html > http://news.cnet.com/news/0-1003-200-6617292.html > http://www.msnbc.com/news/602036.asp > http://www.zdnet.com/zdnn/stories/news/0,4586,5094437,00.html > http://www.zdnet.com/filters/printerfriendly/0,6061,2792223-54,00.html > http://www.techtv.com/news/hackingandsecurity/story/0,24195,3338042,00.html > > Europe may be source of Cyprus Net attack The U.S. Federal Bureau of > Investigation believes a data bombardment attack that crippled Cyprus > Internet service providers in the past week may have originated in > Europe, an industry source said on Thursday. ISPs on the island have > been targeted in a denial of service attack first launched on July > 12. > The last attack was recorded on July 18 through a Korean address and > services have since returned to normal. "We have been told the > inquiry > has shifted from the FBI in the United States to FBI in Europe," the > industry source told Reuters. "This attack was not from a person in > the > United States." > http://www.zdnet.com/zdnn/stories/newsbursts/0,7407,2792140,00.html > > White House dodges web virus The White House website has beaten a > computer virus attack designed to knock it out of action. The virus, > called Code Red, has already infected around 200,000 computer systems > around the world, defacing many websites with the message "Hacked By > Chinese". The infected systems were scheduled to bombard the > numerical > internet address that represents the White House website on Thursday. > > But security experts said officials apparently moved the site to a > different address, dodging the internet bullet. > http://news.bbc.co.uk/hi/english/sci/tech/newsid_1448000/1448431.stm > http://www.zdnet.com/zdnn/stories/news/0,4586,5094437,00.html > http://www.fcw.com/fcw/articles/2001/0716/web-worm-07-20-01.asp > http://news.cnet.com/news/0-1003-200-6617292.html > > Vigilantes Prepare To Strike Back At Code Red Worm As the Code Red > Worm > enters a period of hibernation, some security experts are ready to > turn > vigilante in their quest to stamp out the malicious code. According > to > estimates Thursday from the CERT Coordination Center, more than > 225,000 > Web servers running Microsoft's Internet Information Server (IIS) > software have been infected by the worm, which is designed to deface > the > home page of an infected site and attempt to spread to other > unpatched > servers. The worm also turns an infected site into an unwitting > participant in a distributed denial of service (DDoS) attack on the > White House Web site. > http://www.newsbytes.com/news/01/168177.html > > U.S. Atty General announces new cybercrime initiative On a day that > the > White House's Web site came under attack by hackers, U.S. Attorney > General John Ashcroft announced a new cybercrime initiative to combat > hacking, copyright and trademark violations, theft of trade secrets, > and > economic espionage. Ashcroft made the announcement at the offices of > security software maker VeriSign Inc. here, following a meeting with > a > group of high-tech executives to discuss the state of Internet > security. > Although the timing of the announcement, which coincided with an > attack > on the White House Web site was coincidental, Ashcroft said at a > press > conference that the incident clearly demonstrated that the government > needed to do more to make cyberspace more secure. > http://www.siliconvalley.com/docs/news/reuters_wire/1349936l.htm > http://www.siliconvalley.com/docs/news/svfront/ash072101.htm > http://news.excite.com/news/ap/010720/17/ashcroft-cybercrime > http://news.cnet.com/news/0-1003-200-6626166.html > > China shuts down 2,000 Internet cafes, paper says China has shut > nearly > 2,000 down Internet cafes across the country and has ordered 6,000 to > suspend operations and make changes, state media said on Friday. > Anonymous cybercafes are popular because they allow people to evade > tough content laws, whose infringement on a personal homepage or > message > board authorities are likely to track to its source. The Shanghai > Daily > said the move, China's second major clampdown on the popular cafes in > a > little more than a year, aims to regulate the Internet service market > in > line with rules set by the Ministries of Information Industry, Public > Security and Culture and the State Administration of Industry and > Commerce. More than 56,800 Internet cafes or bars have been > inspected > during a probe that began in April, the newspaper said. It said > police > closed 53 Internet bars and ordered 59 others to suspend operations > for > ``rectification and improvement'' in Nanjing in the eastern province > of > Jiangsu. > http://www.siliconvalley.com/docs/news/reuters_wire/1348140l.htm > __________________________________________________ Do You Yahoo!? Make international calls for as low as $.04/minute with Yahoo! Messenger http://phonecard.yahoo.com/ ------------------------ Yahoo! Groups Sponsor ---------------------~--> Secure your servers with 128-bit SSL encryption! Grab your copy of VeriSign's FREE Guide "Securing Your Web Site for Business." Get it now! http://www.verisign.com/cgi-bin/go.cgi?a=n094442340008000 http://us.click.yahoo.com/6lIgYB/IWxCAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:37 PDT