Re: [iwar] news

From: e.r. (fastflyer28@yahoo.com)
Date: 2001-07-23 17:11:05


Return-Path: <sentto-279987-1457-995933466-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Mon, 23 Jul 2001 17:13:07 -0700 (PDT)
Received: (qmail 32148 invoked by uid 510); 23 Jul 2001 23:13:45 -0000
Received: from n25.groups.yahoo.com (216.115.96.75) by 204.181.12.215 with SMTP; 23 Jul 2001 23:13:45 -0000
X-eGroups-Return: sentto-279987-1457-995933466-fc=all.net@returns.onelist.com
Received: from [10.1.4.55] by mv.egroups.com with NNFMP; 24 Jul 2001 00:11:06 -0000
X-Sender: fastflyer28@yahoo.com
X-Apparently-To: iwar@yahoogroups.com
Received: (EGP: mail-7_2_0); 24 Jul 2001 00:11:06 -0000
Received: (qmail 8599 invoked from network); 24 Jul 2001 00:11:05 -0000
Received: from unknown (10.1.10.26) by l9.egroups.com with QMQP; 24 Jul 2001 00:11:05 -0000
Received: from unknown (HELO web14510.mail.yahoo.com) (216.136.224.169) by mta1 with SMTP; 24 Jul 2001 00:11:05 -0000
Message-ID: <20010724001105.16183.qmail@web14510.mail.yahoo.com>
Received: from [12.78.117.220] by web14510.mail.yahoo.com via HTTP; Mon, 23 Jul 2001 17:11:05 PDT
To: iwar@yahoogroups.com
In-Reply-To: <200107231258.FAA31229@big.all.net>
From: "e.r." <fastflyer28@yahoo.com>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Mon, 23 Jul 2001 17:11:05 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: Re: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

And who has Buch been hiring for his major agencies posts-business
types. National security versus the bottom line. 275 million people
loose and the stock holders of the companies they have worked for win.
Very sweet deal for them.  National security is unimportant to these
people.  Gee, this is getting more fun every day.  Bush is beyond
foolish in starting the 21 Club.  Most of its members are without a
clue on IWAR and cyber-terrorism, and the firm which they ran have all
been  victums of cybers attacks already.  

--- Fred Cohen <fc@all.net> wrote:
> Bush may replace cybersecurity chief with advisers President Bush is
> weighing a markedly different approach to protecting the nation's
> technology backbone from terrorism =97 one that would replace the
> high-profile security job his predecessor created with an advisory
> board
> of federal officials.  The job currently held by national security
> expert Richard Clarke would be replaced with a board of about 21
> officials from all major federal agencies, according to a draft
> executive order obtained by the Associated Press.  The board would
> report to National Security Adviser Condoleezza Rice.  Among the
> agencies that would participate are the departments of State,
> Defense,
> Justice, Energy and Treasury, as well as the National Security
> Agency,
> CIA and FBI. 
>
http://www.usatoday.com/life/cyber/tech/2001-07-17-bush-cybersecurity.htm
> [FC - thus moving it to a 'lower level' within the hierarchy.  Most
> companies
> are moving it to a higher level.]
> 
> U.S.  Security Plan Too Top-Heavy? Critics fear proposed changes to
> the
> way the government protects the nation's technology backbone from
> terrorism could bog down the process and remove the accountability of
> having a single person in charge.  A draft executive order from
> President Bush, obtained by The Associated Press, would abolish the
> high-profile post of security chief in favor of a board of about 21
> officials from all major federal agencies. 
> http://www.wired.com/news/politics/0,1283,45337,00.html
> 
> Decoy PCs give hackers a security lesson For the best security, hack
> the
> hackers, suggest security experts who have spent several months
> watching
> malicious intruders break into disguised decoy systems on the
> Internet. 
> The informal study found it was only two to four days before hackers
> attacked an unprotected Windows 98 system with its file sharing
> enabled. 
> Hackers attacked one such system four times in a five-day period. 
> The
> fastest takeover was 15 minutes, when a hacker broke into a PC
> running
> Red Hat Linux 6.2. 
>
http://www.cnn.com/2001/TECH/internet/07/17/honeynet.project.idg/index.html
> 
> Half of U.S.  Broadband Users Unprotected Are you practically begging
> hackers and Internet thieves to attack? Up to half of U.S.  broadband
> users are leaving themselves wide open to attack by Internet thieves
> and
> hackers.  Why? Because subscribers to "always on" Net connections
> aren't
> using any protection--like a firewall or antivirus software--to keep
> the
> black hats from gaining access to their PCs.  A survey of 1000
> families
> reveals 50 percent of U.S.  broadband subscribers (including digital
> subscriber line, cable, and satellite services) do not have intrusion
> protection, says digital communications researcher Cahners In-Stat
> Group.
> http://www.security-informer.com/ic_651182_3494_1-3283.html
> 
> German Group Supports 'Opt-In' Spam Standard The German Multimedia
> Association (DMMV) said it supports so-called an "opt-in" remedy for
> fighting unsolicited commercial e-mail, or "spam." The announcement
> comes amid continued debate at the highest levels of the European
> Union
> on how to deal with spam.  A solid majority of the EU Telecoms
> Council
> supports the "opt-in" system, which would ban direct marketers from
> sending unsolicited e-mails unless they are given explicit consent by
> potential recipients.  The council comprises telecommunications
> ministers of the 15 EU member states. 
> http://www.newsbytes.com/news/01/168076.html
> 
> Comedian demands $1m for Virus US comedian Ray Owens has demanded
> compensation from anti-virus vendor Symantec for publishing his work
> without copyright.  Owens wrote a fake virus warning which advises
> people to delete the "insidious aol.exe virus" - the executable which
> boots up the AOL application.  The joke known as AOL.exe hoax, was
> reported on many anti-virus vendors' sites, many of them included
> Owens
> entire copyrighted material in their descriptions. 
>
http://www.silicon.com/public/door?REQUNIQ=3D995458325&6004REQEVENT=3D&REQINT1=3D4=205827&REQSTR1=3Dnewsnow
> [FC - Awesome idea]
> 
> Attack Worm Aimed At White House The Code Red Internet worm is
> designed
> to turn Microsoft Web servers into zombies that are expected to
> attack
> the White House Web site next week.  But security experts say the
> worm's
> ability to disrupt www.whitehouse.gov is likely to be limited. 
> According to independent dissections of the worm by Symantec's
> Anti-Virus Research Center (SARC) and eEye Digital Security, the worm
> contains code intended to swamp the network of the White House site
> through a distributed denial of service attack (DDoS) beginning
> Friday,
> July 20.  Initially, security experts believed the worm was a
> relatively
> benign program that merely defaced Web sites running Microsoft's
> Internet Information Server (IIS). 
> http://www.newsbytes.com/news/01/168147.html
> http://www.theregister.co.uk/content/4/20474.html
> http://news.cnet.com/news/0-1003-200-6617292.html
> http://www.msnbc.com/news/602036.asp
> http://www.zdnet.com/zdnn/stories/news/0,4586,5094437,00.html
>
http://www.zdnet.com/filters/printerfriendly/0,6061,2792223-54,00.html
>
http://www.techtv.com/news/hackingandsecurity/story/0,24195,3338042,00.html
> 
> Europe may be source of Cyprus Net attack The U.S.  Federal Bureau of
> Investigation believes a data bombardment attack that crippled Cyprus
> Internet service providers in the past week may have originated in
> Europe, an industry source said on Thursday.  ISPs on the island have
> been targeted in a denial of service attack first launched on July
> 12. 
> The last attack was recorded on July 18 through a Korean address and
> services have since returned to normal.  "We have been told the
> inquiry
> has shifted from the FBI in the United States to FBI in Europe," the
> industry source told Reuters.  "This attack was not from a person in
> the
> United States."
> http://www.zdnet.com/zdnn/stories/newsbursts/0,7407,2792140,00.html
> 
> White House dodges web virus The White House website has beaten a
> computer virus attack designed to knock it out of action.  The virus,
> called Code Red, has already infected around 200,000 computer systems
> around the world, defacing many websites with the message "Hacked By
> Chinese".  The infected systems were scheduled to bombard the
> numerical
> internet address that represents the White House website on Thursday.
> 
> But security experts said officials apparently moved the site to a
> different address, dodging the internet bullet. 
> http://news.bbc.co.uk/hi/english/sci/tech/newsid_1448000/1448431.stm
> http://www.zdnet.com/zdnn/stories/news/0,4586,5094437,00.html
> http://www.fcw.com/fcw/articles/2001/0716/web-worm-07-20-01.asp
> http://news.cnet.com/news/0-1003-200-6617292.html
> 
> Vigilantes Prepare To Strike Back At Code Red Worm As the Code Red
> Worm
> enters a period of hibernation, some security experts are ready to
> turn
> vigilante in their quest to stamp out the malicious code.  According
> to
> estimates Thursday from the CERT Coordination Center, more than
> 225,000
> Web servers running Microsoft's Internet Information Server (IIS)
> software have been infected by the worm, which is designed to deface
> the
> home page of an infected site and attempt to spread to other
> unpatched
> servers.  The worm also turns an infected site into an unwitting
> participant in a distributed denial of service (DDoS) attack on the
> White House Web site.
> http://www.newsbytes.com/news/01/168177.html
> 
> U.S.  Atty General announces new cybercrime initiative On a day that
> the
> White House's Web site came under attack by hackers, U.S.  Attorney
> General John Ashcroft announced a new cybercrime initiative to combat
> hacking, copyright and trademark violations, theft of trade secrets,
> and
> economic espionage.  Ashcroft made the announcement at the offices of
> security software maker VeriSign Inc.  here, following a meeting with
> a
> group of high-tech executives to discuss the state of Internet
> security. 
> Although the timing of the announcement, which coincided with an
> attack
> on the White House Web site was coincidental, Ashcroft said at a
> press
> conference that the incident clearly demonstrated that the government
> needed to do more to make cyberspace more secure. 
> http://www.siliconvalley.com/docs/news/reuters_wire/1349936l.htm
> http://www.siliconvalley.com/docs/news/svfront/ash072101.htm
> http://news.excite.com/news/ap/010720/17/ashcroft-cybercrime
> http://news.cnet.com/news/0-1003-200-6626166.html
> 
> China shuts down 2,000 Internet cafes, paper says China has shut
> nearly
> 2,000 down Internet cafes across the country and has ordered 6,000 to
> suspend operations and make changes, state media said on Friday. 
> Anonymous cybercafes are popular because they allow people to evade
> tough content laws, whose infringement on a personal homepage or
> message
> board authorities are likely to track to its source.  The Shanghai
> Daily
> said the move, China's second major clampdown on the popular cafes in
> a
> little more than a year, aims to regulate the Internet service market
> in
> line with rules set by the Ministries of Information Industry, Public
> Security and Culture and the State Administration of Industry and
> Commerce.  More than 56,800 Internet cafes or bars have been
> inspected
> during a probe that began in April, the newspaper said.  It said
> police
> closed 53 Internet bars and ordered 59 others to suspend operations
> for
> ``rectification and improvement'' in Nanjing in the eastern province
> of
> Jiangsu. 
> http://www.siliconvalley.com/docs/news/reuters_wire/1348140l.htm
> 


__________________________________________________
Do You Yahoo!?
Get personalized email addresses from Yahoo! Mail
http://personal.mail.yahoo.com/

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:37 PDT