Return-Path: <sentto-279987-4787-1023545658-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sat, 08 Jun 2002 07:18:07 -0700 (PDT) Received: (qmail 10521 invoked by uid 510); 8 Jun 2002 14:14:38 -0000 Received: from n25.grp.scd.yahoo.com (66.218.66.81) by all.net with SMTP; 8 Jun 2002 14:14:38 -0000 X-eGroups-Return: sentto-279987-4787-1023545658-fc=all.net@returns.groups.yahoo.com Received: from [66.218.66.97] by n25.grp.scd.yahoo.com with NNFMP; 08 Jun 2002 14:14:18 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_3_2); 8 Jun 2002 14:14:17 -0000 Received: (qmail 96216 invoked from network); 8 Jun 2002 14:14:17 -0000 Received: from unknown (66.218.66.218) by m14.grp.scd.yahoo.com with QMQP; 8 Jun 2002 14:14:17 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 8 Jun 2002 14:14:16 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g58EHR120114 for iwar@onelist.com; Sat, 8 Jun 2002 07:17:27 -0700 Message-Id: <200206081417.g58EHR120114@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sat, 8 Jun 2002 07:17:27 -0700 (PDT) Subject: [iwar] [NewsBits] NewsBits - 06/06/02 (fwd) Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=-5.0 required=5.0 tests=NEWSBITS,DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: June 6, 2002 Retiree Stuck in Netter's Prison A 70-year-old man has been in jail for more than three months for refusing to delete from his website addresses and other personal data of employees at the retirement home that evicted him. The jailing of Paul Trummel, a native of England who moved to the United States in 1985, has drawn fire from national and international writers' groups that support his First Amendment claims. http://www.wired.com/news/politics/0,1283,53021,00.html http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3414542.htm Hacker subpoena descends into farce New York Times cracker rejoices in DoJ 'bungle' US prosecutors last month issued a subpoena demanding that a reporter from the US MSNBC cable TV network hand over notes on a hacker with whom he had contact, it emerged yesterday. The subpoena, which ordered Bob Sullivan to hand over all contact information on Adrian Lamo, who claimed to have broken into the computer networks of the New York Times, has since been withdrawn. http://www.vnunet.com/News/1132399 Hacker group defaces naval websites 'Infidelz' follows on from the 'Deceptive Duo'. Navy and government administrators may have been able to breathe more easily with hacker menace the Deceptive Duo out of the way but, following an anonymous tip-off, it looks like others may have taken up the cause. An email received by vnunet.com this morning told us to check out a Navy subdomain, tracker.hroc.navy.mil, which is apparently used to track CVs and job applications. http://www.vnunet.com/News/1132407 Xbox hacked with $50-worth of hardware MIT student says it was 'easy'. A student at the Massachusetts Institute of Technology (MIT) has managed to hack the security on Microsoft's Xbox, theoretically allowing him to write his own code for the machine. But because of copyright restrictions he will not be able to share the full worth of his discoveries. http://www.vnunet.com/News/1132402 FBI wants to track your Web trail From the Bill Gates e-mails unveiled during the Microsoft trial to the Enron debacle, the digital trails people leave have provided stunning insight into their beliefs and habits. Now the FBI is hoping to capture and corral more of our digital detritus in the name of fighting terrorism. http://zdnet.com.com/2100-1105-933202.html http://news.com.com/2100-1023-933183.html http://news.zdnet.co.uk/story/0,,t269-s2111486,00.html Government e-snoop centre set to go live Criminals will just use stronger encryption, warns expert. The UK government's new internet surveillance centre will become operational this summer, but it could make it harder rather than easier to catch paedophiles and terrorists by encouraging them to use stronger encryption. The National Technical Assistance Centre (NTAC), based at MI5 headquarters, will decrypt seized computer data and intercepted internet and email traffic on behalf of law enforcement, security and intelligence agencies. http://www.vnunet.com/News/1132384 Hollywood Net horror gets sequel After being closed down in Taiwan due to goverment pressure, a follow-on from the Movie88 site has opened in Iran, which does not recognise foreign copyright. A video-on-demand site that was shut down earlier this year with the help of Hollywood has seemingly sprouted a new head in Iran, underscoring vexing problems of Internet copyright enforcement for movie studios. http://news.zdnet.co.uk/story/0,,t269-s2111428,00.html Open Source Software May Offer Target for Terrorists, According to Study by Alexis de Tocqueville Institution's Committee for the Common Defense Business Editors. Terrorists trying to hack or disrupt U.S. computer networks might find it easier if the federal government attempts to switch to "open source" as some groups propose. "Opening the Open Source Debate", a soon to be released white paper by Alexis de Tocqueville Institution details the complex issues surrounding open source, particularly if federal agencies such as the Department of Defense or the Federal Aviation Administration use software that inherently requires that its blueprints, source code and architecture is made widely available to any person interested - without discretion. http://www.businesswire.com/cgi-bin/f_headline.cgi?bw.053002/221502375 Microsoft takes a swipe at passwords Microsoft is developing new security software it hopes will make Web services and its entire product lineup more appealing to big companies. The software maker will announced plans on Thursday for technology code-named TrustBridge that will allow businesses to authenticate user identities between companies and applications using Web services standards. With TrustBridge-- which will debut next year--Microsoft is attempting to solve a common problem faced by workers in big companies: too many user identifications and passwords, said Adam Sohn, a product manager at Microsoft. http://zdnet.com.com/2100-1104-933191.html http://www.newsfactor.com/perl/story/18107.html http://news.com.com/2100-1001-933297.html http://zdnet.com.com/2100-1105-933312.html Employee Revenge There was a time when vindictive former employees sought revenge by taking a couple of office supplies or spreading rumors about the boss. But in today's computerized offices, angry workers and disgruntled employees can access computer systems and destroy data with a click of the mouse, causing millions of dollars in damage. http://www.techtv.com/cybercrime/features/story/0,23008,3386967,00.html Security through obsolescence Here's an interesting way to secure an Internet- connected computer against intruders: Make sure the operating system and software it runs are so old that current hacking tools won't work on it. This was suggested by Brian Aker, one of the programmers who works on Linux.com, NewsForge, Slashdot, and other OSDN sites; he runs several servers of his own that host a number of small non-profit sites in the Seattle area. "I have one box still running a version of Solaris that's so old none of the script kiddies can figure it out," Brian says. http://www.theregister.co.uk/content/55/25608.html Privacy vs. Security: A Bogus Debate? David Brin is a privacy heretic. He doesn't agree with those in the intelligence and law enforcement communities who argue that Americans have to surrender freedoms to make their lives safe. Nor does he agree with advocates who argue that it makes sense to protect privacy at all costs -- certainly not if it means living with added insecurity. http://www.businessweek.com/technology/content/jun2002/tc2002065_6863.htm Tightening the Internet screws In a previous column, I discussed ways to minimize exposure from e-mail-borne viruses and spurious browsing. Based on the feedback I received, I now believe that most CIOs doubt that the company derives benefits from any Internet activity that can't be directly related to an employee's job and, therefore, be managed or controlled.In this column, I'll discuss some of the observations and suggestions I've received for protecting the enterprise while maximizing employees' usage of electronic mail to and from the Internet and Internet browsing. http://www.techrepublic.com/article.jhtml?id=r00520020530lan01.htm Get a secure grip on IM by downloading our list of IM services http://www.techrepublic.com/article.jhtml?id=r00520020326wtn01.htm Understanding and managing new corporate privacy risks http://www.techrepublic.com/article.jhtml?id=r00520020328ern01.htm ------------------------ Yahoo! Groups Sponsor ---------------------~--> Tied to your PC? Cut Loose and Stay connected with Yahoo! Mobile http://us.click.yahoo.com/QBCcSD/o1CEAA/Zr0HAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT