Return-Path: <sentto-279987-1458-995934409-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Mon, 23 Jul 2001 17:28:07 -0700 (PDT) Received: (qmail 32719 invoked by uid 510); 23 Jul 2001 23:29:27 -0000 Received: from n35.groups.yahoo.com (216.115.96.85) by 204.181.12.215 with SMTP; 23 Jul 2001 23:29:27 -0000 X-eGroups-Return: sentto-279987-1458-995934409-fc=all.net@returns.onelist.com Received: from [10.1.4.54] by mu.egroups.com with NNFMP; 24 Jul 2001 00:26:49 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_2_0); 24 Jul 2001 00:26:48 -0000 Received: (qmail 16406 invoked from network); 24 Jul 2001 00:26:48 -0000 Received: from unknown (10.1.10.27) by l8.egroups.com with QMQP; 24 Jul 2001 00:26:48 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta2 with SMTP; 24 Jul 2001 00:26:48 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id RAA04744 for iwar@onelist.com; Mon, 23 Jul 2001 17:26:47 -0700 Message-Id: <200107240026.RAA04744@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Mon, 23 Jul 2001 17:26:47 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] news Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Red Code worm prompts DOD to block Web site access The Defense Department has blocked public access to its Web sites until the Code Red computer worm virus no longer poses a threat. Authorized government users still have full access to Defense Web sites and the Internet, said Maj. Barry Venable, spokesman for the Space Command in Colorado Springs, Colo., which monitors Defense networks. But as of late last week, DOD had blocked public access in an effort to contain the virus. Venable said DOD has had some =93minor impacts=94 on systems because of Code Red, but no major damage. http://www.gcn.com/vol1_no1/news/4708-1.html http://www.newsbytes.com/news/01/168238.html `Malicious' computer bug poised to do more harm A malicious computer bug spreading over the Internet this month came within minutes of crippling the White House Web site late Thursday -- and is still poised to do more damage. Called ``Code Red Worm,'' the bug has infested the Web servers of mostly large businesses and organizations that use Microsoft Windows NT 4.0 and Windows 2000, leading to the defacement of Web sites hosted by the tainted computers. So far, the worm has replicated itself onto at least 250,000 computer systems. http://www.siliconvalley.com/docs/news/depth/coderd072101.htm http://www.msnbc.com/news/603086.asp China seeks to build the Great Firewall Clusters of 20-something hipsters hunch over their computer screens, brainstorming for new ideas to keep their Web site cutting edge. Welcome to people.com.cn - the online version of the People's Daily. Renowned since the 1949 Communist revolution as China's biggest newspaper - and its biggest bore - the People's Daily always pumped out the party line. But with the Internet revolution sweeping China at warp speed, the gray old daily has repositioned itself. Now, it's a mouthpiece looking for fresh eyes. Click a link for the latest news, or join an online chat forum with 20,000 people in real time. Have your say and let off steam. But be careful. Behind the hot hyperlinks and snappy Web pages, Big Brother is watching more closely than ever. A smiling President Jiang Zemin looks down from a colour poster in the third floor offices of the Web site, where 10 full-time censors scan the screens with their fingers poised on the delete buttons. Known colloquially as ``cleaning ladies'' because of their sanitizing duties, they patrol the online chat rooms looking for offending comments on taboo subjects. http://www.thestar.com/NASApp/cs/ContentServer?GXHC_gx_session_id_=7a3c668764fcc323&pagename=thestar/Layout/Article_Type1&c=Article&cid=995666807411&call_page=TS_News&call_pageid=968332188492&call_pagepath=News/News&col=968793972154 Crackdown follows China's embrace of Net The quiet in the huge Feiyu Net Cafe is broken only by the click of more than 600 keyboards, the beep of computer games and the occasional employee wheeling a cart piled with boxed lunches and shouting, ``Who wants food?'' Yet the place is often packed, every seat occupied during peak periods. It's a scene repeated in tens of thousands of Internet cafes that have sprung up across China in the past five years. These cafes are popular places for young Chinese to check their e-mail, visit news sites and play computer games. They also present a major headache for China's communist leaders, worried about their hold on power. http://www0.mercurycenter.com/premium/business/docs/chinanet23.htm http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB16/ http://english.eastday.com/epublish/gb/paper1/265/class000100004/hwz56214.htm http://www.siliconvalley.com/docs/news/reuters_wire/1348140l.htm Security patch approach is failing A noted security expert has said current security practices are too reliant on expecting users to apply patches and has suggested better monitoring might lead to more robust security. Bruce Schneier, chief technology officer of Counterpane Internet Security, said the outbreak of the Code Red Worm, which targets vulnerable IIS Web servers, shows that "the patch treadmill doesn't work". http://www.theregister.co.uk/content/55/20564.html "Security Through Obscurity" Ain't What They Think The most misunderstood statement in the computer security field has got to be "security through obscurity is bad." As security professionals, many of us try to teach a few simple lessons to help system administrators become more security conscious. Unfortunately, the simplicity of our lessons has backfired. In this article, I'll talk about how obscurity can aid security -- hopefully, I can clear up some of this confusion. http://securityportal.com/beale/beale20010720.html ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:37 PDT