Return-Path: <sentto-279987-5086-1028031978-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 30 Jul 2002 05:37:08 -0700 (PDT) Received: (qmail 12746 invoked by uid 510); 30 Jul 2002 12:32:24 -0000 Received: from n36.grp.scd.yahoo.com (66.218.66.104) by all.net with SMTP; 30 Jul 2002 12:32:24 -0000 X-eGroups-Return: sentto-279987-5086-1028031978-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.200] by n36.grp.scd.yahoo.com with NNFMP; 30 Jul 2002 12:26:18 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_7_4); 30 Jul 2002 12:26:18 -0000 Received: (qmail 34206 invoked from network); 30 Jul 2002 12:26:17 -0000 Received: from unknown (66.218.66.217) by m8.grp.scd.yahoo.com with QMQP; 30 Jul 2002 12:26:17 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta2.grp.scd.yahoo.com with SMTP; 30 Jul 2002 12:26:17 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g6UCSh408668 for iwar@onelist.com; Tue, 30 Jul 2002 05:28:43 -0700 Message-Id: <200207301228.g6UCSh408668@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 30 Jul 2002 05:28:43 -0700 (PDT) Subject: [iwar] [NewsBits] NewsBits - 07/29/02 (fwd) Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=-4.9 required=5.0 tests=NEWSBITS,PORN_10,DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: July 29, 2002 RIAA Web site disabled by attack The Recording Industry Association of America's Web site was unreachable over the weekend due to a denial-of-service attack. The apparently deliberate overload rendered the RIAA.org site unavailable for portions of four days and came after the group endorsed legislation to allow copyright holders to disrupt peer-to-peer networks. http://news.com.com/2100-1023-947072.html Sony loses lawsuit against Australian man who modified PlayStation consoles Australia's consumer watchdog on Monday hailed a Federal Court decision giving Sony PlayStation owners the right to modify their consoles to play imported and copied games. The Australian subsidiary of Sony was suing Sydney man Eddy Johnson for selling and installing modifications to its PlayStation machines, claiming his actions breached copyright laws. http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3758163.htm http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3756614.htm http://www.nandotimes.com/technology/story/481769p-3847923c.html Malaysian government considers allowing use of pirated software The Malaysian government may allow schools and other institutions to use pirated computer software, despite efforts to reduce widespread software piracy, a news report said Sunday. "We are concerned over the rampant sale and use of pirated software in the country and will continue to conduct raids to curb it,'' said Domestic Trade and Consumer Affairs Minister Muhyiddin Yassin. http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3751765.htm http://www.theregister.co.uk/content/4/26423.html http://www.vnunet.com/News/1133961 States to share cyberterror data States will become better informed about terrorist threats under an agreement reached last week between the National Council of State Chief Information Officers (NASCIO) and the National Infrastructure Protection Center (NIPC). The information will relate to physical threats, as well as cyber attacks. http://zdnet.com.com/2110-1105-946936.html STATE CIOs WORKING TOGETHER TO REACH SECURITY, DATA-SHARING GOALS Homeland security concerns have added to states' efforts to improve their information-sharing capabilities. Find out how CIOs work with their peers to implement technology to accomplish this goal. (TechRepublic article, free registration required) http://www.techrepublic.com/article.jhtml?id=r00520020715thr01.htm TAKE A MEASURED APPROACH TO HOMELAND SECURITY http://www.techrepublic.com/article.jhtml?id=r00520020509ggp01.htm BALANCING PRIVACY, PUBLIC SAFETY, AND NETWORK SECURITY CONCERNS AFTER 9/11 http://www.techrepublic.com/article.jhtml?id=r00520020528jdt01.htm Chinese dissidents publish 'declaration of Internet users' rights' A group of 18 Chinese dissidents and intellectuals published on Monday a "declaration of Internet users' rights" in protest at new website self- censorship rules. The declaration demands the freedom to put together Internet pages, with the only restrictions placed on "evident and real" slander, pornography or certain "violent attacks or behaviour". The document also calls for complete freedom for Chinese people to surf the Internet. http://www.nandotimes.com/technology/story/482185p-3850370c.html Tinker with your MP3 player, get 5 years in jail We were suspicious a few months back when US Senator Joseph Biden (Democrat, Delaware) introduced proposed legislation with Senator Fritz "Hollywood" Hollings (Democrat, South Carolina) to protect emblems of authenticity for digital media, such as holograms, with the same tough laws that criminalize bogus labels on designer-wear. http://www.theregister.co.uk/content/4/26430.html Wi-Fi Honeypots a New Hacker Trap War drivers beware, the next wireless network you tap might be part of an elaborate sting. Hackers searching for wireless access points in the nation's capital may soon war drive right into a trap. Last month researchers at the government contractor Science Applications International Corporation (SAIC) launched what might be the first organized wireless honeypot, designed to tempt unwary Wi-Fi hackers and bandwidth borrowers and gather data on their techniques and tools of choice. http://online.securityfocus.com/news/552 IT Nightmare: The Enemy Within The discovery that employees are attacking internal systems is a challenge because the majority of security monitoring is focused on the outside perimeter of the organization, not on the inside. All it took for Tim Lloyd to destroy more than 1,000 of his employer's programs was about a half-dozen lines of code. Lloyd, employed for 11 years by Stamford, Connecticut-based Omega Engineer Corp. as a network administrator, was convicted in May 2000 of doing US$10 million in damages to the company by deleting proprietary programs. http://www.newsfactor.com/perl/story/18778.html The Right to Defend Is it criminal to reach out and hack an infected machine that's attacking your network? When it comes to matters of security, most policies are hastily enacted as a reaction to some pressing force or foe. This is evident when you look at the rash of laws, procedures and policies put in place since September 11. I guess it is only natural-- our fragile human psyche requires immediate comfort in the face of danger; our fears only resting when we know something is being done, even if that "something" equates to nothing at all. http://online.securityfocus.com/columnists/98 ------------------------ Yahoo! Groups Sponsor ---------------------~--> Will You Find True Love? Will You Meet the One? Free Love Reading by phone! http://us.click.yahoo.com/7dY7FD/R_ZEAA/Ey.GAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT