Return-Path: <sentto-279987-3675-1004499494-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 30 Oct 2001 19:39:08 -0800 (PST) Received: (qmail 3602 invoked by uid 510); 31 Oct 2001 03:37:30 -0000 Received: from n32.groups.yahoo.com (216.115.96.82) by 204.181.12.215 with SMTP; 31 Oct 2001 03:37:30 -0000 X-eGroups-Return: sentto-279987-3675-1004499494-fc=all.net@returns.onelist.com Received: from [10.1.1.223] by n32.groups.yahoo.com with NNFMP; 31 Oct 2001 03:38:14 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 31 Oct 2001 03:38:14 -0000 Received: (qmail 86232 invoked from network); 31 Oct 2001 03:38:14 -0000 Received: from unknown (10.1.10.26) by 10.1.1.223 with QMQP; 31 Oct 2001 03:38:14 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta1 with SMTP; 31 Oct 2001 03:38:14 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id f9V3cKF30917 for iwar@onelist.com; Tue, 30 Oct 2001 19:38:20 -0800 Message-Id: <200110310338.f9V3cKF30917@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 30 Oct 2001 19:38:20 -0800 (PST) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:NY.Times.Computers.Shut.Down.by.Apparent.Attack] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Tuesday October 30 7:21 PM ET NY Times Computers Shut Down by Apparent Attack NEW YORK (Reuters) - Internet connections at the New York Times Co (NYSE:NYT - news) were interrupted for several hours on Tuesday afternoon after the paper's computers were flooded with bogus information in an apparent attack. ``We don't know that it was malicious, but there seems to be no innocent explanation,'' wrote network administrator Terry Schwadron in an e-mail to newsroom employees. The Times computers ``started receiving a huge amount of electronic transmission that flooded the machinery that protects the paper from hacker attacks,'' according to Schwadron's e-mail, in what he called ``denial of service activity.'' In a denial of service attack, thousands of fake messages are sent to server computers, tying up the recipient's network. The main White House Web site (http://www.whitehouse.gov) was hit with a similar attack in May. The New York Times Web site (http://www.nytimes.com) was online as of Tuesday evening. A spokeswoman for the company, reading a statement, said: ''Some New York Times employees are experiencing difficulty accessing the Internet through their computers. Our technical staff is trying to determine the reason for this. At this time, we do not know the cause.'' The spokeswoman did confirm the contents of Schwadron's e-mail. The New York Times has gone through two anthrax scares since Oct. 12, but tests came up negative for the bacteria. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more! http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:58 PST