[iwar] News

From: Fred Cohen (fc@all.net)
Date: 2002-02-14 21:44:28


Return-Path: <sentto-279987-4457-1013750669-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 14 Feb 2002 21:45:08 -0800 (PST)
Received: (qmail 15582 invoked by uid 510); 15 Feb 2002 05:24:44 -0000
Received: from n35.groups.yahoo.com (216.115.96.85) by all.net with SMTP; 15 Feb 2002 05:24:44 -0000
X-eGroups-Return: sentto-279987-4457-1013750669-fc=all.net@returns.groups.yahoo.com
Received: from [216.115.97.190] by n35.groups.yahoo.com with NNFMP; 15 Feb 2002 05:24:29 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_2); 15 Feb 2002 05:24:28 -0000
Received: (qmail 60689 invoked from network); 15 Feb 2002 05:24:28 -0000
Received: from unknown (216.115.97.167) by m4.grp.snv.yahoo.com with QMQP; 15 Feb 2002 05:24:28 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.snv.yahoo.com with SMTP; 15 Feb 2002 05:24:28 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g1F5iS908071 for iwar@onelist.com; Thu, 14 Feb 2002 21:44:28 -0800
Message-Id: <200202150544.g1F5iS908071@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 14 Feb 2002 21:44:28 -0800 (PST)
Subject: [iwar] News
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Subject: [nyectf] Computer Attack could lead to military response - Anyone
    want to DOS a country?
...

Apparently if you launch a "cyber" attack the US may respond with a =
military counterattack....

Imagine the consequenses of spoofing an attack from another country??=20

Imagine how easy it would be?=20

 http://www.washingtonpost.com/wp-dyn/articles/A6846-2002Feb13.html
-------------

filename="Bush Adviser Warns Cyberterrorists (washingtonpost.com).url"

BASEURL=http://www.washingtonpost.com/wp-dyn/articles/A6846-2002Feb13.html

-------------

Subject: December 2000 SNMP Advisory

If you go to this WEB site, not only is the whole problem of SNMP laid
out, but
the source information reveals this vulnerability back to 11/20/99.

http://rr.sans.org/threats/SNMP.php

-------------

If you mean by "this" the vulnerabilities described in CA-2002-03, this 
reference on the web do not descibe "this" problem, it describe the many 
other problems SNMP implementations have suffered and the flaws in the 
protocol.  SNMP problems of various sorts have been known for over a decade.

-------------

New OMB Security Report 
If you have anything to do with government computing, you may want to
read the new US Office of Management and Budget report on the status
information security in 24 Federal agencies.  We're telling you early
so you can get it before the OMB web site gets overwhelmed. (We hope.)
It's 110 pages long, written by someone who clearly "gets it."  The
agency summaries, however, seem to reflect a difficulty by the inspector
general community to grasp what it takes to secure information systems.
Fascinating reading for those with an interest in security of federal
systems.
http://www.whitehouse.gov/omb/pubpress/2002-05.html

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Sponsored by VeriSign - The Value of Trust
Secure all your Web servers now - with a proven 5-part
strategy. The FREE Server Security Guide shows you how.
http://us.click.yahoo.com/iWSNbC/VdiDAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:03 PST