[iwar] news

From: Fred Cohen (fc@all.net)
Date: 2001-07-23 17:26:47


Return-Path: <sentto-279987-1458-995934409-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Mon, 23 Jul 2001 17:28:07 -0700 (PDT)
Received: (qmail 32719 invoked by uid 510); 23 Jul 2001 23:29:27 -0000
Received: from n35.groups.yahoo.com (216.115.96.85) by 204.181.12.215 with SMTP; 23 Jul 2001 23:29:27 -0000
X-eGroups-Return: sentto-279987-1458-995934409-fc=all.net@returns.onelist.com
Received: from [10.1.4.54] by mu.egroups.com with NNFMP; 24 Jul 2001 00:26:49 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_2_0); 24 Jul 2001 00:26:48 -0000
Received: (qmail 16406 invoked from network); 24 Jul 2001 00:26:48 -0000
Received: from unknown (10.1.10.27) by l8.egroups.com with QMQP; 24 Jul 2001 00:26:48 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta2 with SMTP; 24 Jul 2001 00:26:48 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id RAA04744 for iwar@onelist.com; Mon, 23 Jul 2001 17:26:47 -0700
Message-Id: <200107240026.RAA04744@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Mon, 23 Jul 2001 17:26:47 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Red Code worm prompts DOD to block Web site access The Defense
Department has blocked public access to its Web sites until the Code Red
computer worm virus no longer poses a threat.  Authorized government
users still have full access to Defense Web sites and the Internet, said
Maj.  Barry Venable, spokesman for the Space Command in Colorado
Springs, Colo., which monitors Defense networks.  But as of late last
week, DOD had blocked public access in an effort to contain the virus. 
Venable said DOD has had some =93minor impacts=94 on systems because of
Code Red, but no major damage. 
http://www.gcn.com/vol1_no1/news/4708-1.html
http://www.newsbytes.com/news/01/168238.html

`Malicious' computer bug poised to do more harm A malicious computer bug
spreading over the Internet this month came within minutes of crippling
the White House Web site late Thursday -- and is still poised to do more
damage.  Called ``Code Red Worm,'' the bug has infested the Web servers
of mostly large businesses and organizations that use Microsoft Windows
NT 4.0 and Windows 2000, leading to the defacement of Web sites hosted
by the tainted computers.  So far, the worm has replicated itself onto
at least 250,000 computer systems. 
http://www.siliconvalley.com/docs/news/depth/coderd072101.htm
http://www.msnbc.com/news/603086.asp

China seeks to build the Great Firewall Clusters of 20-something
hipsters hunch over their computer screens, brainstorming for new ideas
to keep their Web site cutting edge.  Welcome to people.com.cn - the
online version of the People's Daily.  Renowned since the 1949 Communist
revolution as China's biggest newspaper - and its biggest bore - the
People's Daily always pumped out the party line.  But with the Internet
revolution sweeping China at warp speed, the gray old daily has
repositioned itself.  Now, it's a mouthpiece looking for fresh eyes. 
Click a link for the latest news, or join an online chat forum with
20,000 people in real time.  Have your say and let off steam.  But be
careful.  Behind the hot hyperlinks and snappy Web pages, Big Brother is
watching more closely than ever.  A smiling President Jiang Zemin looks
down from a colour poster in the third floor offices of the Web site,
where 10 full-time censors scan the screens with their fingers poised on
the delete buttons.  Known colloquially as ``cleaning ladies'' because
of their sanitizing duties, they patrol the online chat rooms looking
for offending comments on taboo subjects. 
http://www.thestar.com/NASApp/cs/ContentServer?GXHC_gx_session_id_=7a3c668764fcc323&pagename=thestar/Layout/Article_Type1&c=Article&cid=995666807411&call_page=TS_News&call_pageid=968332188492&call_pagepath=News/News&col=968793972154

Crackdown follows China's embrace of Net The quiet in the huge Feiyu Net
Cafe is broken only by the click of more than 600 keyboards, the beep of
computer games and the occasional employee wheeling a cart piled with
boxed lunches and shouting, ``Who wants food?'' Yet the place is often
packed, every seat occupied during peak periods.  It's a scene repeated
in tens of thousands of Internet cafes that have sprung up across China
in the past five years.  These cafes are popular places for young
Chinese to check their e-mail, visit news sites and play computer games. 
They also present a major headache for China's communist leaders,
worried about their hold on power. 
http://www0.mercurycenter.com/premium/business/docs/chinanet23.htm
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB16/
http://english.eastday.com/epublish/gb/paper1/265/class000100004/hwz56214.htm
http://www.siliconvalley.com/docs/news/reuters_wire/1348140l.htm

Security patch approach is failing A noted security expert has said
current security practices are too reliant on expecting users to apply
patches and has suggested better monitoring might lead to more robust
security.  Bruce Schneier, chief technology officer of Counterpane
Internet Security, said the outbreak of the Code Red Worm, which targets
vulnerable IIS Web servers, shows that "the patch treadmill doesn't
work".
http://www.theregister.co.uk/content/55/20564.html

"Security Through Obscurity" Ain't What They Think The most
misunderstood statement in the computer security field has got to be
"security through obscurity is bad." As security professionals, many of
us try to teach a few simple lessons to help system administrators
become more security conscious.  Unfortunately, the simplicity of our
lessons has backfired.  In this article, I'll talk about how obscurity
can aid security -- hopefully, I can clear up some of this confusion. 
http://securityportal.com/beale/beale20010720.html


------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:37 PDT