Return-Path: <sentto-279987-1198-988936287-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Thu, 03 May 2001 17:32:07 -0700 (PDT) Received: (qmail 28299 invoked by uid 510); 3 May 2001 23:32:31 -0000 Received: from fk.egroups.com (64.211.240.232) by 204.181.12.215 with SMTP; 3 May 2001 23:32:31 -0000 X-eGroups-Return: sentto-279987-1198-988936287-fc=all.net@returns.onelist.com Received: from [10.1.4.55] by fk.egroups.com with NNFMP; 04 May 2001 00:31:27 -0000 X-Sender: fc@all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_1_2); 4 May 2001 00:31:26 -0000 Received: (qmail 76995 invoked from network); 4 May 2001 00:31:26 -0000 Received: from unknown (10.1.10.26) by l9.egroups.com with QMQP; 4 May 2001 00:31:26 -0000 Received: from unknown (HELO all.net) (65.0.156.78) by mta1 with SMTP; 4 May 2001 00:31:26 -0000 Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id RAA09313 for iwar@onelist.com; Thu, 3 May 2001 17:31:25 -0700 Message-Id: <200105040031.RAA09313@all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Thu, 3 May 2001 17:31:25 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] news Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit May 2, 2001 Chinese hackers hit Colo. high techs In its intended form, the Web site for the Rocky Mountain Windows Technology User Group includes links to job openings and Windows news. But Monday, it displayed a waving red Chinese flag. Chinese hackers have been attacking U.S. Web sites this week, mostly replacing pages with anti-American rhetoric. By Tuesday, Chinese hackers had claimed hundreds of attacks -- and warned that they could get worse. ``It's a minor hack. It wasn't extremely destructive, but it certainly was annoying,'' said Bruce Handley, president of the user group. U.S. hackers have retaliated by defacing Chinese sites. http://www.siliconvalley.com/docs/news/tech/029860.htm Pro-China Hackers Attack California Websites http://www.europeaninternet.com/china/news.php3?id=397950 http://www.civic.com/civic/articles/2001/0430/web-hack-05-02-01.asp U.S., Chinese hackers continue Web defacements http://www.cnn.com/2001/TECH/internet/05/02/china.hacks.idg/index.html U.S. railroad regulator hit by hackers http://www.msnbc.com/news/567402.asp http://www.gcn.com/vol1_no1/daily-updates/4114-1.html FBI's Cyber-cops Warn Of 'Significant Rise' In Unix Hacks Malicious hackers have scanned literally millions of Unix-based computer networks of late in search of a particular printer program and network protocol that can be exploited to gain complete control over affected systems, federal computer security experts warned Monday. The National Infrastructure Protection Center (NIPC), the FBI's cybercrime arm, said it had observed a "very significant increase" in attempts to exploit the weaknesses. According to the alert, the vulnerabilities reside in program called "lpd/LPRng," which handles printer requests across Unix networks. The other weakness involves Sun Microsystems' RPC (remote procedure call), a protocol listening on Port 111 on Unix systems that allows services across a network to communicate with one another. http://www.newsbytes.com/news/01/165159.html FBI 'hack' could set dangerous precedent An FBI operation to obtain evidence on two Russian hackers, from servers based in Russia, could give intelligence agents free reign to hack computers outside the US. A sting operation in which FBI agents downloaded data from two Russian-based computers has some high-tech lawyers concerned that the precedent may be used to justify indiscriminate, cross-border hacking. http://www.zdnet.co.uk/news/2001/17/ns-22577.html http://news.cnet.com/news/0-1003-200-5785729.html Microsoft tells US Air Force to bug off Microsoft's security patch for Outlook, which is designed to protect users from the effects of another Love Bug-style virus, has come under fire from no less a body than the US Air Force. In a paper to be presented at a security workshop in June, an assistant professor of computer science at the US Air Force Academy will deliver a devastating critique of Microsoft's approach to security in general and Outlook in particular. Martin Carlisle will tell an audience of security experts that a security patch to Outlook, which is designed to stop viruses spreading via automated messages through requiring user's authorisation via a dialog box, can be easily circumvented. http://www.theregister.co.uk/content/8/18679.html Codebreaker II Cracked it! Well, it's been quite an afternoon down here at the Vulture Central encryption department. Not two hours after we gave you an apparently much-needed leg up, we got an triumphant e-mail from one Mark Wutka. Mark has every right to be pleased with himself, having successfully cracked the code and supplied the original text. He also outlined several other details - which we will obviously not disclose now - indicating that he was right on the ball. http://www.theregister.co.uk/content/28/18692.html ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:10 PDT