Return-Path: <sentto-279987-4645-1020818153-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 07 May 2002 17:54:08 -0700 (PDT) Received: (qmail 4476 invoked by uid 510); 8 May 2002 00:52:31 -0000 Received: from n24.grp.scd.yahoo.com (66.218.66.80) by all.net with SMTP; 8 May 2002 00:52:31 -0000 X-eGroups-Return: sentto-279987-4645-1020818153-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.197] by n24.grp.scd.yahoo.com with NNFMP; 08 May 2002 00:35:53 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_3_2); 8 May 2002 00:35:52 -0000 Received: (qmail 86226 invoked from network); 8 May 2002 00:35:52 -0000 Received: from unknown (66.218.66.218) by m4.grp.scd.yahoo.com with QMQP; 8 May 2002 00:35:52 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 8 May 2002 00:35:52 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g480aVN18016 for iwar@onelist.com; Tue, 7 May 2002 17:36:31 -0700 Message-Id: <200205080036.g480aVN18016@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 7 May 2002 17:36:31 -0700 (PDT) Subject: [iwar] [NewsBits] NewsBits - 05/06/02 (fwd) Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit May 6, 2002 'Spidey' Already Being Swapped By Online Pirates While Columbia Picture's new "Spider-Man" movie was breaking box-office records over the weekend, Internet movie pirates were busily downloading free copies of the film on file-trading networks. By Saturday, pirated versions of the comic book inspired movie were showing up in "screener" format on the EDonkey, Kazaa, and Morpheus Internet file-swapping systems. http://www.newsbytes.com/news/02/176387.html ISP Can Finally Disconnect Spammer, Court Rules After more than a year of battling with bulk e-mailer MonsterHut, a Rochester-based Internet service provider (ISP) has been given permission by a New York State appeals court to disconnect the company it says is a notorious spammer. The decision Friday reversed lower court rulings last year that kept MonsterHut.com online even though PaeTec Communications of Fairport, N.Y., near Rochester, said MonsterHut had contravened its anti-spam policy. http://www.newsbytes.com/news/02/176381.html Domain owners could face the slammer People who provide false data when registering a domain name on the Web could be thrown into jail for up to five years, if a recently introduced bill becomes law. Reps. Howard Berman, D-Calif., and Howard Coble, R-N.C., introduced the legislation Thursday, targeting Internet address registration procedures that make it easier for Web site publishers to stay anonymous. http://zdnet.com.com/2100-1106-900448.html http://news.com.com/2100-1023-900342.html http://www.newsbytes.com/news/02/176407.html http://www.newsbytes.com/news/02/176371.html Midwest Express hackers cause a stir The self-proclaimed "Deceptive Duo" that hacked into Midwest Express Airlines' intranet say their goal was to embarrass the airline, which is part of the nation's transportation infrastructure and therefore essential to homeland defense. http://www.msnbc.com/news/748369.asp http://www.cnn.com/2002/TECH/internet/05/06/national.security.hackers.idg/in dex.html Cyberspace Full of Terror Targets Officials are most concerned that a cyber attack could be coupled with a conventional terrorist attack, such as those on September 11th, and hinder rescue efforts. Government and private computer networks are facing new threats of terrorist attacks, ranging from an attempt to bring havoc to a major city to nationwide disruptions of finances, transportation and utilities. But people with knowledge of national intelligence briefings say little has been done to protect against a cyber attack. Some of the threats come from individuals who might have connections to Osama bin Laden's al-Qaeda network in Pakistan and elsewhere, those who have been briefed say. http://www.usatoday.com/life/cyber/tech/2002/05/06/cyber-terror.htm Legal protection turns service providers into speech police A 1998 federal law meant to combat digital piracy is increasingly being used to challenge free speech online as well. In one recent case, the search engine Google removed links to a Norwegian site that criticizes the Church of Scientology International after the organization complained of copyright violations. http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3200100.htm China shuts unlicensed Internet cafes in Shanghai, report says Nearly 200 unlicensed Internet cafes were shut down recently in the eastern Chinese city of Shanghai, state-run media reported Monday. The city's Bureau of Commerce and Industry closed 122 establishments in early Monday and more than 75 others at the end of April, Xinhua news agency said. The latest campaign targeted Internet cafes in the Shanghai suburbs, it said. http://www.nandotimes.com/technology/story/392495p-3118009c.html http://www.wired.com/news/politics/0,1283,52330,00.html Working in a network war zone Even before the CanSecWest security conference started on Wednesday, unknown hackers had given the hotel's high-speed network a case of the hiccups. By Wednesday evening, the system was laid out flat. The pros were peeved, and a call for an electronic posse went out. "We're forming a hunting party," Dragos Ruiu, independent security consultant and conference organizer, told the room of nearly 150 hackers and security experts late Thursday afternoon. "If anyone wants to help us find out who's...poisoning the hotel network, talk to me." But that evening, the vandal stayed offline and the hotel network was, for a little while, glitch free. http://news.com.com/2100-1001-900511.html IDS Evasion Techniques and Tactics Blackhats, security researchers and network intrusion detection system (NIDS) developers have continually played a game of point-counter- point when it comes to NIDS technology. The BlackHat community continually develops methods to evade or bypass NIDS sensors while NIDS vendors continually counter act these methods with patches and new releases. Due to he inherent complexities involved in capturing, analyzing and understanding network traffic there are several common techniques that can be used to exploit inherent weaknesses in NIDSs. http://online.securityfocus.com/infocus/1577 Homeland security report will lack consensus, Ridge says A report due to the president by mid-year on the status of homeland security likely will not have consensus, White House Homeland Security Director Tom Ridge said Monday. "I already told the president, 'Do not expect a consensus document,'" Ridge said at the Council of the Americas annual conference at the State Department. "We do not have time to build consensus." http://www.govexec.com/dailyfed/0502/050602td1.htm ------------------------ Yahoo! Groups Sponsor ---------------------~--> Tied to your PC? Cut Loose and Stay connected with Yahoo! Mobile http://us.click.yahoo.com/QBCcSD/o1CEAA/sXBHAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT