Return-Path: <sentto-279987-5173-1029327073-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 14 Aug 2002 05:14:08 -0700 (PDT) Received: (qmail 10380 invoked by uid 510); 14 Aug 2002 12:09:47 -0000 Received: from n1.grp.scd.yahoo.com (66.218.66.64) by all.net with SMTP; 14 Aug 2002 12:09:47 -0000 X-eGroups-Return: sentto-279987-5173-1029327073-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.197] by n1.grp.scd.yahoo.com with NNFMP; 14 Aug 2002 12:11:14 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_7_4); 14 Aug 2002 12:11:13 -0000 Received: (qmail 71259 invoked from network); 14 Aug 2002 12:11:13 -0000 Received: from unknown (66.218.66.217) by m4.grp.scd.yahoo.com with QMQP; 14 Aug 2002 12:11:13 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta2.grp.scd.yahoo.com with SMTP; 14 Aug 2002 12:11:12 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g7ECBx609508 for iwar@onelist.com; Wed, 14 Aug 2002 05:11:59 -0700 Message-Id: <200208141211.g7ECBx609508@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 14 Aug 2002 05:11:58 -0700 (PDT) Subject: [iwar] [NewsBits] NewsBits - 08/13/02 (fwd) Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=-5.0 required=5.0 tests=NEWSBITS,DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: August 13, 2002 Princeton removes dean who hacked Yale Web site A Princeton University dean will be removed from his job and offered another at the school after accessing Yale University's admissions Web site without authorization, Princeton's president said Tuesday. Stephen LeMenager, associate dean and director of admissions, had been on paid administrative leave. He has said he accessed the site to see how secure it was. http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3857890.htm http://www.usatoday.com/tech/news/2002-08-13-princeton-hacking_x.htm http://www.cnn.com/2002/TECH/internet/08/13/yale.princeton.hacking.otsc/ind= e=20 x.html Glitch blacks out FBI=92s Web sites The FBI accidentally pulled the plug on its own Web sites on Tuesday morning. A misconfiguration in the bureau=92s domain name setup meant that many visitors to FBI.gov could not get through. As of 2 p.m. ET, the FBI=92s configuration problem had been fixed. The apparent error also wiped out the online presence of the FBI=92s high-tech crime unit, the National Infrastructure Protection Center, at NIPC.gov. http://www.msnbc.com/news/793610.asp http://zdnet.com.com/2100-1105-949564.html http://news.zdnet.co.uk/story/0,,t269-s2120788,00.html China to permit hearing on theft of Lucent software In a surprising twist to a high-profile espionage case, the Chinese government will allow federal prosecutors from New Jersey to travel to Beijing and interview witnesses about the theft of a Lucent Technologies computer program. The development is a rarity, say legal scholars and attorneys with the U.S. Justice Department. http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3849979.htm Yahoo yields to Chinese Web laws Yahoo on Tuesday defended its decision to sign off on voluntary content limitations in China, a move that critics say opens the door to online censorship by the Web portal. The agreement, called the "Public Pledge on Self-Discipline for the China Internet Industry," essentially ensures that Internet companies in China will abide by the country's pre-existing regulations. Although these regulations are controversial, including requirements that companies monitor and restrict information deemed "harmful," the pledge does not broaden existing laws, according to Yahoo. http://news.com.com/2100-1023-949643.html Norwegians scramble for tech savvy DeCSS judge The trial of the teenage Norwegian programmer accused of creating the DeCSS "piracy tool" has been delayed until December 9 this year. Jon Johansen, who created DeCSS as a utitlity to play DVDs on PCs running on Linux, was due to stand trial for creating the DeCSS programme this summer. But the trial has been put back so that a "technically savvy" judge could be appointed, Greplaw reports. http://www.theregister.co.uk/content/4/26658.html U.S. vulnerable to data sneak attack A group of hackers couldn't single-handedly bring down the United States' national data infrastructure, but a terrorist team would be able to do significant localized damage to U.S. systems, according to a recent war games simulation. The United States Naval War College worked with Gartner Research to conduct a "Digital Pearl Harbor" simulation last month, testing U.S. responses to attacks on telecommunications, the Internet, financial systems and the power grid. The analysts found that it would be possible to inflict some serious damage to the nation's data and physical infrastructure systems, but it would require a syndicate with significant resources, including $200 million, country-level intelligence and five years of preparation time. http://zdnet.com.com/2100-1105-949605.html http://news.com.com/2100-1017-949605.html U.S. computer systems vulnerable to attack? The U.S. government is the world's largest technology consumer -- at least if you measure it in terms of dollars spent. The Bush administration had budgeted more than $50 billion for tech spending in the next fiscal year. But past administrations have also invested billions in systems that many officials in Washington seem to agree have never worked. http://www.cnn.com/2002/TECH/industry/08/13/government.computers/index.html White-Hat Hate Crimes on the Rise When hackers broke into Ryan Russell's server and plastered his private e-mails and other personal files on the Internet last week, Russell tried to shrug it off as a harmless prank. But Russell, editor of Hack Proofing Your Network and an analyst with SecurityFocus.com, also seemed shaken by the incident. "There's a group out there whose goal in life is to show they're smarter than you and they have the tools to do it," said Russell, a "white-hat" hacker who goes by the nickname "BlueBoar." http://www.wired.com/news/culture/0,1284,54400,00.html A Site to Despise Untrained Spies The American Civil Liberties Union has launched a website for people to protest the Bush administration's citizen informant program, which would enlist civilians nationwide to report suspicious behavior by their fellow Americans. The ACLU charges that the Terrorist Information and Prevention System (TIPS), which is expected to launch this fall, is a massive invasion of privacy. http://www.wired.com/news/politics/0,1283,54492,00.html Spammers can't spell "cat" New ideas - new weapons, if you will - are sorely needed if we are serious about eradicating spam before we're all too old to care. Existing spam filters appear to be causing many legitimate e-mail senders and recipients more grief than does junk e-mail - witness the nightmarish tale from the online magazine TidBITS that we chronicled here two weeks ago. http://www.nwfusion.com/columnists/2002/0812netbuzz.html Most of your company is missing! There are two types of companies. Those that have already experienced a serious data loss and those that will. Unfortunately, most companies think their existing data storage and backup plans fully protect them from data loss. All to often, companies discover that a large amount of vital corporate information was left unprotected. http://zdnet.com.com/2100-1107-949556.html Evolving firewalls Firewalls have evolved considerably since their inception. Learn about the various generations of firewalls and target the one that best suits your company. Webopedia.com defines a firewall as "a system designed to prevent unauthorised access to or from a private network." Although technically accurate, this definition tells us only what a firewall does and doesn't address the more important question of how it does it. For administrators who are continually focused on keeping their networks secure, it is helpful to take a closer look at the way firewalls function and how they have evolved in recent years to better protect our corporate networks. http://techupdate.zdnet.co.uk/story/0,,t481-s2120765,00.html Rental car companies may be tracking you via GPS A flurry of lawsuits filed in the last few months claims a Budget Rent a Car licensee in Tucson, Arizona, used satellite technology to track renters who took cars out of state - and penalized them thousands of dollars under a policy that charged $1 per mile if the car was taken beyond the boundary. The suits allege invasion of privacy and fraud, among other claims. http://www.nandotimes.com/technology/story/497792p-3969319c.html Wristwatches are 'LoJack for kids' Richard Winn of Pinegrove, Pa., doesn't think of himself as paranoid, but with so many abductions in the news lately, he wants to protect his daughters, ages 6 and 9. So he bought them special wristwatches that will track their locations 24 hours a day. "You hope like heck you're not over-paranoid and you're not too fearful of your child being dragged away," Winn says. "But you know the opportunity exists." http://www.usatoday.com/tech/techreviews/products/2002-08-12-gps-device_x.htm ------------------------ Yahoo! Groups Sponsor ---------------------~--> 4 DVDs Free +s&p Join Now http://us.click.yahoo.com/pt6YBB/NXiEAA/RN.GAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:32 PDT