[iwar] [NewsBits] NewsBits - 07/29/02 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2002-07-30 05:28:43


Return-Path: <sentto-279987-5086-1028031978-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 30 Jul 2002 05:37:08 -0700 (PDT)
Received: (qmail 12746 invoked by uid 510); 30 Jul 2002 12:32:24 -0000
Received: from n36.grp.scd.yahoo.com (66.218.66.104) by all.net with SMTP; 30 Jul 2002 12:32:24 -0000
X-eGroups-Return: sentto-279987-5086-1028031978-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.200] by n36.grp.scd.yahoo.com with NNFMP; 30 Jul 2002 12:26:18 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_7_4); 30 Jul 2002 12:26:18 -0000
Received: (qmail 34206 invoked from network); 30 Jul 2002 12:26:17 -0000
Received: from unknown (66.218.66.217) by m8.grp.scd.yahoo.com with QMQP; 30 Jul 2002 12:26:17 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta2.grp.scd.yahoo.com with SMTP; 30 Jul 2002 12:26:17 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g6UCSh408668 for iwar@onelist.com; Tue, 30 Jul 2002 05:28:43 -0700
Message-Id: <200207301228.g6UCSh408668@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 30 Jul 2002 05:28:43 -0700 (PDT)
Subject: [iwar] [NewsBits] NewsBits - 07/29/02 (fwd)
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=-4.9 required=5.0 tests=NEWSBITS,PORN_10,DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: 

July 29, 2002

RIAA Web site disabled by attack The Recording Industry Association of
America's Web site was unreachable over the weekend due to a
denial-of-service attack.  The apparently deliberate overload rendered
the RIAA.org site unavailable for portions of four days and came after
the group endorsed legislation to allow copyright holders to disrupt
peer-to-peer networks.  http://news.com.com/2100-1023-947072.html

Sony loses lawsuit against Australian man who modified PlayStation
consoles Australia's consumer watchdog on Monday hailed a Federal Court
decision giving Sony PlayStation owners the right to modify their
consoles to play imported and copied games.  The Australian subsidiary
of Sony was suing Sydney man Eddy Johnson for selling and installing
modifications to its PlayStation machines, claiming his actions breached
copyright laws. 
http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3758163.htm
http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3756614.htm
http://www.nandotimes.com/technology/story/481769p-3847923c.html

Malaysian government considers allowing use of pirated software The
Malaysian government may allow schools and other institutions to use
pirated computer software, despite efforts to reduce widespread software
piracy, a news report said Sunday.  "We are concerned over the rampant
sale and use of pirated software in the country and will continue to
conduct raids to curb it,'' said Domestic Trade and Consumer Affairs
Minister Muhyiddin Yassin. 
http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3751765.htm
http://www.theregister.co.uk/content/4/26423.html
http://www.vnunet.com/News/1133961

States to share cyberterror data States will become better informed
about terrorist threats under an agreement reached last week between the
National Council of State Chief Information Officers (NASCIO) and the
National Infrastructure Protection Center (NIPC).  The information will
relate to physical threats, as well as cyber attacks. 
http://zdnet.com.com/2110-1105-946936.html

STATE CIOs WORKING TOGETHER TO REACH SECURITY, DATA-SHARING GOALS
Homeland security concerns have added to states' efforts to improve
their information-sharing capabilities.  Find out how CIOs work with
their peers to implement technology to accomplish this goal. 
(TechRepublic article, free registration required)
http://www.techrepublic.com/article.jhtml?id=r00520020715thr01.htm

TAKE A MEASURED APPROACH TO HOMELAND SECURITY
http://www.techrepublic.com/article.jhtml?id=r00520020509ggp01.htm
BALANCING PRIVACY, PUBLIC SAFETY, AND NETWORK SECURITY CONCERNS AFTER
9/11 http://www.techrepublic.com/article.jhtml?id=r00520020528jdt01.htm

Chinese dissidents publish 'declaration of Internet users' rights' A
group of 18 Chinese dissidents and intellectuals published on Monday a
"declaration of Internet users' rights" in protest at new website self-
censorship rules.  The declaration demands the freedom to put together
Internet pages, with the only restrictions placed on "evident and real"
slander, pornography or certain "violent attacks or behaviour".  The
document also calls for complete freedom for Chinese people to surf the
Internet. 
http://www.nandotimes.com/technology/story/482185p-3850370c.html

Tinker with your MP3 player, get 5 years in jail We were suspicious a
few months back when US Senator Joseph Biden (Democrat, Delaware)
introduced proposed legislation with Senator Fritz "Hollywood" Hollings
(Democrat, South Carolina) to protect emblems of authenticity for
digital media, such as holograms, with the same tough laws that
criminalize bogus labels on designer-wear. 
http://www.theregister.co.uk/content/4/26430.html

Wi-Fi Honeypots a New Hacker Trap War drivers beware, the next wireless
network you tap might be part of an elaborate sting.  Hackers searching
for wireless access points in the nation's capital may soon war drive
right into a trap.  Last month researchers at the government contractor
Science Applications International Corporation (SAIC) launched what
might be the first organized wireless honeypot, designed to tempt unwary
Wi-Fi hackers and bandwidth borrowers and gather data on their
techniques and tools of choice. 
http://online.securityfocus.com/news/552

IT Nightmare: The Enemy Within The discovery that employees are
attacking internal systems is a challenge because the majority of
security monitoring is focused on the outside perimeter of the
organization, not on the inside.  All it took for Tim Lloyd to destroy
more than 1,000 of his employer's programs was about a half-dozen lines
of code.  Lloyd, employed for 11 years by Stamford, Connecticut-based
Omega Engineer Corp.  as a network administrator, was convicted in May
2000 of doing US$10 million in damages to the company by deleting
proprietary programs.  http://www.newsfactor.com/perl/story/18778.html

The Right to Defend Is it criminal to reach out and hack an infected
machine that's attacking your network? When it comes to matters of
security, most policies are hastily enacted as a reaction to some
pressing force or foe.  This is evident when you look at the rash of
laws, procedures and policies put in place since September 11.  I guess
it is only natural-- our fragile human psyche requires immediate comfort
in the face of danger; our fears only resting when we know something is
being done, even if that "something" equates to nothing at all. 
http://online.securityfocus.com/columnists/98

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Will You Find True Love?
Will You Meet the One?
Free Love Reading by phone!
http://us.click.yahoo.com/7dY7FD/R_ZEAA/Ey.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT