[iwar] [NewsBits] NewsBits - 08/13/02 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2002-08-14 05:11:58


Return-Path: <sentto-279987-5173-1029327073-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 14 Aug 2002 05:14:08 -0700 (PDT)
Received: (qmail 10380 invoked by uid 510); 14 Aug 2002 12:09:47 -0000
Received: from n1.grp.scd.yahoo.com (66.218.66.64) by all.net with SMTP; 14 Aug 2002 12:09:47 -0000
X-eGroups-Return: sentto-279987-5173-1029327073-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.197] by n1.grp.scd.yahoo.com with NNFMP; 14 Aug 2002 12:11:14 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_7_4); 14 Aug 2002 12:11:13 -0000
Received: (qmail 71259 invoked from network); 14 Aug 2002 12:11:13 -0000
Received: from unknown (66.218.66.217) by m4.grp.scd.yahoo.com with QMQP; 14 Aug 2002 12:11:13 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta2.grp.scd.yahoo.com with SMTP; 14 Aug 2002 12:11:12 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g7ECBx609508 for iwar@onelist.com; Wed, 14 Aug 2002 05:11:59 -0700
Message-Id: <200208141211.g7ECBx609508@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 14 Aug 2002 05:11:58 -0700 (PDT)
Subject: [iwar] [NewsBits] NewsBits - 08/13/02 (fwd)
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=-5.0 required=5.0 tests=NEWSBITS,DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: 

August 13, 2002

Princeton removes dean who hacked Yale Web site A Princeton University
dean will be removed from his job and offered another at the school
after accessing Yale University's admissions Web site without
authorization, Princeton's president said Tuesday.  Stephen LeMenager,
associate dean and director of admissions, had been on paid
administrative leave.  He has said he accessed the site to see how
secure it was. 
http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3857890.htm
http://www.usatoday.com/tech/news/2002-08-13-princeton-hacking_x.htm
http://www.cnn.com/2002/TECH/internet/08/13/yale.princeton.hacking.otsc/ind=
e=20 x.html

Glitch blacks out FBI=92s Web sites The FBI accidentally pulled the plug
on its own Web sites on Tuesday morning.  A misconfiguration in the
bureau=92s domain name setup meant that many visitors to FBI.gov could
not get through.  As of 2 p.m.  ET, the FBI=92s configuration problem
had been fixed.  The apparent error also wiped out the online presence
of the FBI=92s high-tech crime unit, the National Infrastructure
Protection Center, at NIPC.gov.  http://www.msnbc.com/news/793610.asp
http://zdnet.com.com/2100-1105-949564.html
http://news.zdnet.co.uk/story/0,,t269-s2120788,00.html

China to permit hearing on theft of Lucent software In a surprising
twist to a high-profile espionage case, the Chinese government will
allow federal prosecutors from New Jersey to travel to Beijing and
interview witnesses about the theft of a Lucent Technologies computer
program.  The development is a rarity, say legal scholars and attorneys
with the U.S.  Justice Department. 
http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3849979.htm

Yahoo yields to Chinese Web laws Yahoo on Tuesday defended its decision
to sign off on voluntary content limitations in China, a move that
critics say opens the door to online censorship by the Web portal.  The
agreement, called the "Public Pledge on Self-Discipline for the China
Internet Industry," essentially ensures that Internet companies in China
will abide by the country's pre-existing regulations.  Although these
regulations are controversial, including requirements that companies
monitor and restrict information deemed "harmful," the pledge does not
broaden existing laws, according to Yahoo. 
http://news.com.com/2100-1023-949643.html

Norwegians scramble for tech savvy DeCSS judge The trial of the teenage
Norwegian programmer accused of creating the DeCSS "piracy tool" has
been delayed until December 9 this year.  Jon Johansen, who created
DeCSS as a utitlity to play DVDs on PCs running on Linux, was due to
stand trial for creating the DeCSS programme this summer.  But the trial
has been put back so that a "technically savvy" judge could be
appointed, Greplaw reports. 
http://www.theregister.co.uk/content/4/26658.html

U.S.  vulnerable to data sneak attack A group of hackers couldn't
single-handedly bring down the United States' national data
infrastructure, but a terrorist team would be able to do significant
localized damage to U.S.  systems, according to a recent war games
simulation.  The United States Naval War College worked with Gartner
Research to conduct a "Digital Pearl Harbor" simulation last month,
testing U.S.  responses to attacks on telecommunications, the Internet,
financial systems and the power grid.  The analysts found that it would
be possible to inflict some serious damage to the nation's data and
physical infrastructure systems, but it would require a syndicate with
significant resources, including $200 million, country-level
intelligence and five years of preparation time. 
http://zdnet.com.com/2100-1105-949605.html
http://news.com.com/2100-1017-949605.html

U.S.  computer systems vulnerable to attack? The U.S.  government is the
world's largest technology consumer -- at least if you measure it in
terms of dollars spent.  The Bush administration had budgeted more than
$50 billion for tech spending in the next fiscal year.  But past
administrations have also invested billions in systems that many
officials in Washington seem to agree have never worked. 
http://www.cnn.com/2002/TECH/industry/08/13/government.computers/index.html

White-Hat Hate Crimes on the Rise When hackers broke into Ryan Russell's
server and plastered his private e-mails and other personal files on the
Internet last week, Russell tried to shrug it off as a harmless prank. 
But Russell, editor of Hack Proofing Your Network and an analyst with
SecurityFocus.com, also seemed shaken by the incident.  "There's a group
out there whose goal in life is to show they're smarter than you and
they have the tools to do it," said Russell, a "white-hat" hacker who
goes by the nickname "BlueBoar."
http://www.wired.com/news/culture/0,1284,54400,00.html

A Site to Despise Untrained Spies The American Civil Liberties Union has
launched a website for people to protest the Bush administration's
citizen informant program, which would enlist civilians nationwide to
report suspicious behavior by their fellow Americans.  The ACLU charges
that the Terrorist Information and Prevention System (TIPS), which is
expected to launch this fall, is a massive invasion of privacy. 
http://www.wired.com/news/politics/0,1283,54492,00.html

Spammers can't spell "cat" New ideas - new weapons, if you will - are
sorely needed if we are serious about eradicating spam before we're all
too old to care.  Existing spam filters appear to be causing many
legitimate e-mail senders and recipients more grief than does junk
e-mail - witness the nightmarish tale from the online magazine TidBITS
that we chronicled here two weeks ago. 
http://www.nwfusion.com/columnists/2002/0812netbuzz.html

Most of your company is missing! There are two types of companies. 
Those that have already experienced a serious data loss and those that
will.  Unfortunately, most companies think their existing data storage
and backup plans fully protect them from data loss.  All to often,
companies discover that a large amount of vital corporate information
was left unprotected.  http://zdnet.com.com/2100-1107-949556.html

Evolving firewalls Firewalls have evolved considerably since their
inception.  Learn about the various generations of firewalls and target
the one that best suits your company.  Webopedia.com defines a firewall
as "a system designed to prevent unauthorised access to or from a
private network." Although technically accurate, this definition tells
us only what a firewall does and doesn't address the more important
question of how it does it.  For administrators who are continually
focused on keeping their networks secure, it is helpful to take a closer
look at the way firewalls function and how they have evolved in recent
years to better protect our corporate networks. 
http://techupdate.zdnet.co.uk/story/0,,t481-s2120765,00.html

Rental car companies may be tracking you via GPS A flurry of lawsuits
filed in the last few months claims a Budget Rent a Car licensee in
Tucson, Arizona, used satellite technology to track renters who took
cars out of state - and penalized them thousands of dollars under a
policy that charged $1 per mile if the car was taken beyond the
boundary.  The suits allege invasion of privacy and fraud, among other
claims. 
http://www.nandotimes.com/technology/story/497792p-3969319c.html

Wristwatches are 'LoJack for kids' Richard Winn of Pinegrove, Pa.,
doesn't think of himself as paranoid, but with so many abductions in the
news lately, he wants to protect his daughters, ages 6 and 9.  So he
bought them special wristwatches that will track their locations 24
hours a day.  "You hope like heck you're not over-paranoid and you're
not too fearful of your child being dragged away," Winn says.  "But you
know the opportunity exists."
http://www.usatoday.com/tech/techreviews/products/2002-08-12-gps-device_x.htm


------------------------ Yahoo! Groups Sponsor ---------------------~-->
4 DVDs Free +s&p Join Now
http://us.click.yahoo.com/pt6YBB/NXiEAA/RN.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:32 PDT