Return-Path: <sentto-279987-4457-1013750669-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 14 Feb 2002 21:45:08 -0800 (PST) Received: (qmail 15582 invoked by uid 510); 15 Feb 2002 05:24:44 -0000 Received: from n35.groups.yahoo.com (216.115.96.85) by all.net with SMTP; 15 Feb 2002 05:24:44 -0000 X-eGroups-Return: sentto-279987-4457-1013750669-fc=all.net@returns.groups.yahoo.com Received: from [216.115.97.190] by n35.groups.yahoo.com with NNFMP; 15 Feb 2002 05:24:29 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_2); 15 Feb 2002 05:24:28 -0000 Received: (qmail 60689 invoked from network); 15 Feb 2002 05:24:28 -0000 Received: from unknown (216.115.97.167) by m4.grp.snv.yahoo.com with QMQP; 15 Feb 2002 05:24:28 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.snv.yahoo.com with SMTP; 15 Feb 2002 05:24:28 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g1F5iS908071 for iwar@onelist.com; Thu, 14 Feb 2002 21:44:28 -0800 Message-Id: <200202150544.g1F5iS908071@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Thu, 14 Feb 2002 21:44:28 -0800 (PST) Subject: [iwar] News Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Subject: [nyectf] Computer Attack could lead to military response - Anyone want to DOS a country? ... Apparently if you launch a "cyber" attack the US may respond with a = military counterattack.... Imagine the consequenses of spoofing an attack from another country??=20 Imagine how easy it would be?=20 http://www.washingtonpost.com/wp-dyn/articles/A6846-2002Feb13.html ------------- filename="Bush Adviser Warns Cyberterrorists (washingtonpost.com).url" BASEURL=http://www.washingtonpost.com/wp-dyn/articles/A6846-2002Feb13.html ------------- Subject: December 2000 SNMP Advisory If you go to this WEB site, not only is the whole problem of SNMP laid out, but the source information reveals this vulnerability back to 11/20/99. http://rr.sans.org/threats/SNMP.php ------------- If you mean by "this" the vulnerabilities described in CA-2002-03, this reference on the web do not descibe "this" problem, it describe the many other problems SNMP implementations have suffered and the flaws in the protocol. SNMP problems of various sorts have been known for over a decade. ------------- New OMB Security Report If you have anything to do with government computing, you may want to read the new US Office of Management and Budget report on the status information security in 24 Federal agencies. We're telling you early so you can get it before the OMB web site gets overwhelmed. (We hope.) It's 110 pages long, written by someone who clearly "gets it." The agency summaries, however, seem to reflect a difficulty by the inspector general community to grasp what it takes to secure information systems. Fascinating reading for those with an interest in security of federal systems. http://www.whitehouse.gov/omb/pubpress/2002-05.html ------------------------ Yahoo! Groups Sponsor ---------------------~--> Sponsored by VeriSign - The Value of Trust Secure all your Web servers now - with a proven 5-part strategy. The FREE Server Security Guide shows you how. http://us.click.yahoo.com/iWSNbC/VdiDAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:03 PST