Return-Path: <sentto-279987-3633-1004450949-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 30 Oct 2001 06:10:08 -0800 (PST) Received: (qmail 32654 invoked by uid 510); 30 Oct 2001 14:08:26 -0000 Received: from n15.groups.yahoo.com (216.115.96.65) by 204.181.12.215 with SMTP; 30 Oct 2001 14:08:26 -0000 X-eGroups-Return: sentto-279987-3633-1004450949-fc=all.net@returns.onelist.com Received: from [10.1.1.223] by n15.groups.yahoo.com with NNFMP; 30 Oct 2001 14:09:02 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 30 Oct 2001 14:09:09 -0000 Received: (qmail 43785 invoked from network); 30 Oct 2001 14:09:08 -0000 Received: from unknown (10.1.10.142) by 10.1.1.223 with QMQP; 30 Oct 2001 14:09:08 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta3 with SMTP; 30 Oct 2001 14:09:08 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id f9UE9C309094 for iwar@onelist.com; Tue, 30 Oct 2001 06:09:12 -0800 Message-Id: <200110301409.f9UE9C309094@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 30 Oct 2001 06:09:12 -0800 (PST) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Alleged.Hacker.Attacks.U..Wisconsin.Student.Web.Sites] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Alleged Hacker Attacks U. Wisconsin Student Web Sites Boyce & Amanda Heyman, U-WIRE, 10/29/2001 <a href="http://www.antionline.com/showthread.php?threadid=121503">http://www.antionline.com/showthread.php?threadid=121503> MADISON, Wis. -- For the first time in more than two years, a hacker invaded University of Wisconsin's Student Information Technology Web sites last Friday, compromising one of SIT's machines and making SIT Web sites unavailable. However, technicians solved the problem over the weekend and SIT president Richard Lingk said they are currently investigating the security breach. "We did have an incident on Friday, but we noticed it in a couple of hours with some tools that we've developed over the years," he said. "We got it under control right away. We fixed it over this weekend and used the time to do some upgrades we've been wanting to do." Lingk, a University of Wisconsin-Madison senior, was unwilling to disclose the specifics of the investigation, but said he is confident the hacker will be identified. "We have to go through our log files that we have -- it's pretty intensive," he said. "I don't want to go too much into it because it just makes it easier for people to cover their tracks. It is currently under investigation and we will catch the people or person who did it." SIT, organized in 1996, is a student-run program that facilitates Web site production and maintenance for UW-Madison students and student organizations. "The bulk of the system is managed by SIT," Division of Information Technology employee Brian Rust said. DoIT works directly with SIT to provide a network connection for the Web sites. Lingk said although he does not know what motivated Friday's incident, hackers generally want to cause trouble. "Usually what hackers like to do is to break into a machine and use it as a point to break into other machines," he said. "Or maybe just to snoop -- who knows?" However, Lingk emphasized that SIT Web sites remain unhurt. "None of the people that use our service had any of their data lost," he said. "They've caused us some problems, but it's been ironed out." (C) 1999 Badger Herald via U-WIRE ------------------------ Yahoo! Groups Sponsor ---------------------~--> Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more! http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:58 PST