💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › HNS › issue047.… captured on 2021-12-03 at 14:04:38.

View Raw

More Information

-=-=-=-=-=-=-

HNS Newsletter
Issue 47 - 22.01.2001
http://net-security.org
 
This is a newsletter delivered to you by Help Net Security. It covers weekly 
roundups of security events that were in the news the past week. Visit Help 
Net Security for the latest security news - http://www.net-security.org.

Subscribe to this weekly digest on:
http://www.net-security.org/text/newsletter

Archive of the newsletter in TXT and PDF format is available here:
http://www.net-security.org/news/archive/newsletter

Current subscriber count to this digest: 1805

Table of contents:
 
1) General security news
2) Security issues
3) Security world
4) Featured articles
5) Security software
6) Defaced archives



General security news
---------------------
 
----------------------------------------------------------------------------

WORLD FOR WORMS
The Kakworm virus was responsible for more helpdesk calls than the Love Letter 
virus during 2000, even though Love Letter caused major business disruption 
during May, according to antivirus software supplier Sophos.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.co.uk/news/2001/2/ns-20225.html


HONEYNET CHALLENGE
"One of the primary goals of the Honeynet Project is to find order in chaos by 
letting the attackers do their thing, and allowing the defenders to learn from 
the experience and improve. The latest challenge, inspired by the Honeynet 
Project's founder Lance Spitzner, is the Forensic Challenge. Only this time, 
we're opening it up to anyone who wants to join in... The best 20 submissions 
will win a copy of "Hacking Exposed", Second Edition (courtesy of Foundstone)".
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://project.honeynet.org/challenge/


MANY INDIAN WEB SITES HACKED IN 2000
Some 635 Indian Web sites were hacked during the year 2000 - reflecting the 
low awareness level of Internet security amongst Indian companies - according 
to Dewang Mehta, president of the National Association of Software and Service 
Companies. Companies spend only 0.8 percent of their total IT spending on 
Internet security annually as against the world average of 5.5 percent. Since 
95 percent of the sites hacked are hosted abroad, Indian firms believed that 
Web hosting companies would take care of the security aspects, which 
generally does not happen, added Mehta.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.newsbytes.com/news/01/160515.html


IT COMPANIES CREATE PRIVATE COMPUTER SECURITY NETWORK
Today, a group of more than 20 information technology companies - including 
Intel, AT&T, Microsoft, IBM and Hewlett Packard will announce a major milestone 
in their efforts to create a private network for sharing information on computer 
security weaknesses and cyber-attacks. The details of the announcement 
center on a mechanism the industry is crafting to share information on cyber
attacks, vulnerabilities and security practices that can be used to better 
respond to deliberate intrusions into computer networks.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.computeruser.com/news/01/01/16/news1.html


COMPUTER CRIME INVESTIGATOR'S TOOLKIT: PART III
While one doesn't have to be a master programmer to be a computer crime 
sleuth, being able to read code helps generate insight. If you find a Perl script 
useful for checking the aging of passwords, for example, understanding how 
the program works goes a long way toward implementing the tool properly. 
And, you learn during the process how to develop your own tools. Some 
investigators may prefer C or C++ as a starting point. That preference has 
some merit since quite a few computer security tools are available written 
in those languages. But the most important skill is to learn a code and then 
build on that knowledge. More common ground exists between languages 
than you might realize.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://securityportal.com/articles/feature20010116.html


SECURITY SOFTWARE MARKET SET TO GROW
The worldwide security software market is due to grow at a compound rate 
of 21.7% through to 2004, when revenue will be over $6.7bn, according to a 
recent study. The report from Gartner Dataquest, "Internet and E-commerce 
drive Security Software Growth", also points to increasing focus by large 
companies such as IBM/Tivoli and HP on security in their core offerings. 
Apparently 31% of the security software market in 1999 was Anti-Viral 
software. Of this, Network Associates has 43.8% market share, followed 
by Symantec with 33.8%, and Trend Micro at 11.9%.
Link: http://www.netimperative.com/technology/newsarticle.asp?ArticleID=7513&ChannelID=3&ArticleType=1


LINUX FIREWALL - THE TRAFFIC SHAPER
The firewall is a fundamental component of all computer security strategies. 
However, the simple firewall is not only restricted to safeguarding the user's 
valuable information - it can also optimize the user's bandwidth. This article, 
by Jeroen Wortelboer and Jan Van Oorschot will discuss how Linux firewalls 
can be used to shape traffic to optimize quality of Internet service and to 
reduce vulnerability to DoS attacks.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.securityfocus.com/focus/linux/articles/trafshap.html


TRACKING NETWORK TRAFFIC IN 3D
The vital monitoring of networks can now be done in 3-D. High Tower Software, 
an offshoot of NASA, recently launched a 3-D tool that lets operators not only 
see where a problem might be, but also see the whole network and what could 
be affected if a component or device breaks down. The lack of trained IT staff 
puts a lot of pressure on companies to interpret data emanating from network 
monitoring systems. "Even network personnel who understand these issues have 
a hard time figuring out what is going wrong," said Robert Angelino, the head of 
software engineering.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.telekomnet.com/writer_telekomnet/1-16-01_hightower.asp


U.S. POST OFFICE UNVEILS SECURE INTERNET SYSTEM
The U.S. Postal Service unveiled a new service that allows government agencies 
to send and receive sensitive documents such as birth certificates and medical 
records over the Internet in a secure manner. An electronic version of Certified 
Mail, the new service uses a system of passwords and ID cards embedded with 
computer chips to provide proof that the document arrived safely in the hands 
of its intended recipient.
Link: http://www.reuters.com/news_article.jhtml;$sessionid$DUZS4RAAACHZ0CRBADLSFEYKEEANMIV2?type=internet&Repository=INTERNET_REP&RepositoryStoryID=%2Fnews%2FIDS%2FInternet%2FNET-TECH-POSTAL-DC_TXT.XML


FIGHT RAGES OVER DIGITAL RIGHTS
Critics say content owners and digital rights management companies are 
discouraging the growth of digital music by taking liberties with their control 
of copyrights. The Digital Millennium Copyright Act was enacted in 1998 to 
encourage content owners to begin moving their businesses online. At the 
center of the act were precautions set up to allow copyright holders to 
protect their work by making it against the law for consumers to illegally 
post and share materials.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.wired.com/news/politics/0,1283,41183,00.html


STARTING FROM SCRATCH
Of all people, security experts are the most likely to keep their own systems 
backed up, and verify that the backups haven't been overwritten, right? Wrong, 
says Carole Fennelly. In this week's Unix Security, Carole reveals how 
complacency caused her to lose her home directory and email, and shows 
you how you can prevent the same thing from happening to you.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.sunworld.com/unixinsideronline/swol-01-2001/swol-0112-unixsecurity.html


A LOOK AT SYSTEM V INITIALIZATION
System V method of initialization is one of the most widely used across most 
Linux distributions. It definitely eases the system administrators job. There's a 
lot more than autoexec.bat and config.sys here. We've written this article for 
novice users. It explains the concept of runlevels, initialization scripts and the 
significance of /etc/rc.d.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.freeos.com/articles/3243/


SECURE LINUX DISTRIBUTIONS
If there is one question I hate, it's "Which Linux distribution is the most secure?" 
followed by "Which firewall is best?" People ask these questions in all innocence, 
and very few realize the complexity behind them. If I'm in a bad mood I'll usually 
say, "Whichever one works best for you with the fewest problems." While 
essentially a correct answer, it is mostly useless. To actually answer the 
question properly, I usually need to spend the better part of an hour asking 
the other person questions: what their requirements are, how much they can 
spend, what the current installation has, and so on. After getting this information 
I can usually make a recommendation; sometimes the answer is clear, and other 
times it isn't too clear.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://securityportal.com/closet/closet20010117.html


RUNNING SNORT ON IIS WEB SERVERS: PART I
In 1998, Martin Roesch developed Snort for Unix platforms as a "lightweight 
intrusion detection system." In the summer of 2000, Mike Davis created the 
first Win32 port of Snort, bringing a great tool to a whole new world of Windows 
users and bringing a world of Windows users to a different understanding of 
security. Now in this, the first of a series of articles on Snort for Microsoft 
platforms, Mark Burnett introduces the reader to Snort for IIS Web Servers. 
This article will discuss various aspects of SNort, including: the development 
of Snort, the installion and use of Snort, and strategies for the most effective 
implementation of Snort on IIS servers.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.securityfocus.com/focus/microsoft/iis/mssnort.html


WHO�S THAT KNOCKING ON THE FIREWALL?
Open Door Networks Monday began shipping its firewall advisor software, Who�s 
There? Firewall Advisor, which Open Door bills as "essential for understanding 
the ever-increasing access attempts from the Net", is compatible with Open 
Door�s DoorStop firewall software and Symantec�s Norton Personal Firewall. 
The software does not work with Intego�s NetBarrier.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.insanely-great.com/news/01/486.html


MALAYSIAN POLICE TRACKING DEFACERS
Malaysian police have traced attackers who broke into Parliament's home page 
in December to Brazil and France and are seeking help from police there to 
capture them.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.cnn.com/2001/ASIANOW/southeast/01/16/malaysia.hackers.ap/index.html


LOS ALAMOS EMPLOYEE DENIES HACKING
Claiming he's being used as a scapegoat, 21-year-old MagicFX has reportedly 
denied hacking into six company Web sites before he was hired last year at 
the Los Alamos National Laboratory.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.computeruser.com/news/01/01/16/news6.html


UPDATE ON ETISALAT CASE
The Public Prosecutor's office has begun its investigation into allegations that 
a 21-year-old Briton hacked into Emirates Telecommunications Corp's (Etisalat) 
Internet system last June.Lee Ashurst was charged with the "misuse of 
equipment, services or facilities provided by Etisalat" after he was allegedly 
traced as one of the hackers who caused widescale disruptions to the service, 
causing it to crash.
Link: http://www.gulf-news.com/Articles/news.asp?ArticleID=7046


GERMAN WATCHDOG TO PROBE ONLINE BANK SECURITY
Germany's banking watchdogs said they have launched a security check at 
some of Europe's largest Internet banks and brokers as the threat from hackers 
or electronic theft increases. The check of banks' electronic defenses will be 
run by a three-part team including the German central bank the Bundesbank, 
the Federal Banking Regulatory Agency BAKred, and the Interior Ministry's 
special unit for computer security BSI.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.timesofindia.com/today/19info31.htm


REMOTE DESKTOP USING VNC
X-terminals allowed you to work off another machine while sitting on your 
machine. VNC allows you to do the same and also adds the ability to go 
beyond your local network to access a desktop over the Internet. Use it 
from your Windows machine to access and administer your Linux box or 
even the other way round!
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.freeos.com/articles/3292/


MAFIABOY PLEADS GUILTY ON 55 CHARGES
The trial of the 16-year-old Montrealer known as "Mafiaboy" had been set to 
begin on 66 charges relating to attacks last year on several major Web sites, 
as well as security breaches of other sites at institutions such as Yale and 
Harvard universities. The court had just convened when prosecutor Louis 
Miville-Deschenes announced that the youth had pleaded guilty to most 
of the charges.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.cnn.com/2001/TECH/computing/01/18/mafiaboy.ap/index.html


PANDA SOFTWARE SLAMMED
Antivirus company Panda Software has been suspended from an industry group 
for withholding information about a new virus it claimed was "more deadly than 
the Love Bug" (they were speaking about Little Davinia).
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.vnunet.com/News/1116640


EFF ON DECSS: HACKERS' RIGHTS AT STAKE
The Electronic Frontier Foundation is asking a federal appeals court to overturn 
a ruling that banned a Web site from posting and linking to a software program 
that can crack DVD security, saying the decision did "great violence" to the 
First Amendment.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.com/zdnn/stories/news/0,4586,2676657,00.html


SOFTWARE REVIEW: ARKEIA BACKUP
This document is a review of the Arkeia backup software combined with the 
Ecrix rakpak dual 66G drive, discussion of the features, security, usage, 
documentation, and support.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.linuxsecurity.com/feature_stories/feature_story-74.html


OPENHACK III BOWED BUT NOT BROKEN
The battle has begun, and the first salvo was a fierce one, as a cascade of 
denial-of-service attacks swept over the Openhack III site in its first four 
days of operation. As of midday Thursday, no one had succeeded in any of 
the four hacking goals, although eWEEK Labs saw creative DoS attacks 
directed against the Champaign, Ill., site, along with heavy usage.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.com/eweek/stories/general/0,11011,2676675,00.html

----------------------------------------------------------------------------




Security issues
---------------

All vulnerabilities are located at:
http://net-security.org/text/bugs


----------------------------------------------------------------------------

MEDIA PLAYER 7 AND IE JAVA VULNERABILITY
There is a security vulnerability in Windows Media Player 7 exploitable thru IE 
and java which allows reading local files and browsing directories which in turn 
allows executing arbitratrary programs. This may lead to taking full control over 
user's computer.
Link: http://www.net-security.org/text/bugs/979586134,83134,.shtml


YAHOO! INSTANT MESSENGER TRANSMISSIONS
"When being warned by my firewall that some packet contents may contain 
sensitive data when connecting to Yahoo! servers with the popular, Yahoo! 
Instant Messenger, I found to my amazement my username and password 
combination where being sent to the server in plain text."
Link: http://www.net-security.org/text/bugs/979594691,35290,.shtml


PHP ADVISORY - APACHE MODULE BUGS
[1] PHP supports a configuration mechanism that allows users to configure PHP 
directives on a per-directory basis. Under Apache, this is usually done using 
.htaccess files. Due to a bug in the Apache module version of PHP, remote 
'malicious users' might be able to create a special HTTP request that would 
cause PHP to serve the next page with the wrong values for these directives. 
In certain (fairly rare) situations, this could result in a security problem. 
[2] PHP supports the ability to be installed, and yet disabled, by setting the 
configuration option 'engine = off'. Due to a bug in the Apache module version 
of PHP, if one or more virtual hosts within a single Apache server were configured 
with engine=off, this value could 'propagate' to other virtual hosts. Because 
setting this option to 'off' disables execution of PHP scripts, the source code 
of the scripts could end up being sent to the end clients. 
Link: http://www.net-security.org/text/bugs/979594708,42917,.shtml


HTML.DROPPER (INTERESTING)
Internet Explorer 5.5 and accompanying mail and news client afford us the 
unique ability to dictate which icons and file extensions we require. Specifically, 
we are able to manufacture an email message to appear as one thing when in 
fact it is not.
Link: http://www.net-security.org/text/bugs/979781821,21006,.shtml


NEW MAILING LIST MOBILEBUGS
It is dedicated to discussion of cellular phone and network security aspects. To 
subscribe to this list, send a message to majordomo@developers.of.pl with the 
following in the body of the message: subscribe mobileBugs.
Link: http://www.net-security.org/text/bugs/979781840,31202,.shtml


INN TEMPORARY DIRECTORY CONFIGURATION
"It's recently come to our attention that some repackagers of INN have 
mistakenly shipped INN packages configured to use the system temporary 
directory (either /tmp or /var/tmp) for create temporary files. INN expects 
its configured temporary directory to only be writeable by the news user 
and does not take sufficient precautions when creating temporary files to 
be able to use world-writeable temporary directories. This configuration 
could be exploited to gain access to the news account."
Link: http://www.net-security.org/text/bugs/979781859,46967,.shtml


CRYPTANALYSIS OF THE RSA SECURID ALGORITHM
Recently, I.C. Wiener published a reverse engineering effort of the RSA SecurID 
algorithm. There were few speculations on the security ramifications of the 
algorithm in I.C. Wiener's posting, so this note is an effort to touch upon 
areas of concern. We have verified that I.C. Wiener's released version of the 
proprietary algorithm is accurate by comparing it with our own prior reverse 
engineering of the same algorithm.
Link: http://www.net-security.org/text/bugs/979874843,29493,.shtml


SHOUTCAST SERVER BUFFER CRASHES SERVER
The following information is being released by PA Networks to expose a potential 
problem with the Shoutcast server for Linux version v1.7.1 for Shoutcast 
Distributed Network Audio Server. During testing of new streams the following 
was discovered. 
Software Needed To Perform This Overflow:
Winamp (Any Version)
DSP Plugin for Audio Streaming
Microsoft Netshow Tools (Audio MP3 Codecs Only)
Shoutcast Server for Linux v1.7.1
Normally the Winamp client uses the DSP plugin to encode MP3 files and send a 
single stream to a DNAS Server (Shoutcast) for distribution to listeners. By 
entering a string in the description past the visible field the server will overflow 
causing the shoutcast server to crash. This has been tested and verified on the 
Linux version only so we do not know if the Win32 version of DNAS is also affected.
Link: http://www.net-security.org/text/bugs/979874858,39730,.shtml


LICENSING FIREWALL-1 DOS ATTACK
"I have identified a denial of service attack that can be launched against 
Firewall-1 that has identical results to the IP fragmentation attack identified 
by Lance Spitzner."
Symptoms: Firewall CPU hits 100% utilization, console locks up, a reboot only 
temporarily solves the problem. 
Vulnerable: All versions of Firewall-1 4.1 on Solaris 2.x using a limited-IP license
Link: http://www.net-security.org/text/bugs/979874948,44992,.shtml


PATCH FOR ORACLE INTERNET DIRECTORY
Several potential buffer overflow vulnerabilities have been discovered in the 
Oracle Internet Directory executables 'oidldapd' and 'oidmon'. These 
vulnerabilities were originally found in Oracle Internet Directory (OID) 
2.0, Release 2.0.6, on Linux. (Note: OID 2.0.6 on LINUX was a beta release.)
Link: http://www.net-security.org/text/bugs/979957423,83735,.shtml


ENCRYPTED FILE SYSTEM WIN 2000 FLAW
"I have found a major problem with the encrypted filesystem (EFS) in Windows 
2000 which shows that encrypted files are still very available for a thief or 
attacker."
Link: http://www.net-security.org/text/bugs/979957507,70469,.shtml

----------------------------------------------------------------------------




Security world
--------------

All press releases are located at:
http://net-security.org/text/press

----------------------------------------------------------------------------

HNC DELIVERS FRAUD DETECTION - [18.01.2001]

HNC Software Inc. announced the availability of a new fraud detection service 
for stored value cards. The service delivers fraud protection from both Falcon,
the leading payment card fraud detection system, and eFalcon, the leading 
real-time payment fraud detection service. WildCard Systems, a provider of 
high-quality e-payment solutions, is the first stored value card provider to 
use the service.

Press release:
< http://www.net-security.org/text/press/979780431,85413,.shtml >

----------------------------------------------------------------------------

INTRUSION.COM ANNOUNCES NEW JOINT VENTURE - [18.01.2001]

Intrusion.com, Inc., a leading provider of enterprise security solutions for the 
information-driven economy, today announced an agreement to establish a 
joint venture with Shanghai Video and Audio Electronics Co., Ltd. This new 
venture, Shanghai SVA Intrusion.com Joint Venture, will manufacture, market, 
distribute and sell Intrusion.com SecureCom platform solutions, and will be the 
authorized reseller of selected Intrusion.com software products in China (PRC 
Mainland) under an exclusive multi-year licensing agreement.

Press release:
< http://www.net-security.org/text/press/979780474,55331,.shtml >

----------------------------------------------------------------------------

FLAGSHIP MOBILE VPN-BASED SOFTWARE RELEASED - [18.01.2001]

Roam Secure, Inc., a Washington, D.C. based mobile VPN (virtual private network) 
software solutions company, announced its first product, OnRoad, that provides 
advanced Internet mobility, security and networking features and allows both 
wireless and wired communications in a VPN.

Press release:
< http://www.net-security.org/text/press/979780559,93861,.shtml >

----------------------------------------------------------------------------

DIGITAL CERTIFICATES FOR GOVERNMENT AGENCIES - [18.01.2001]

E-business security pioneer Cylink Corporation announced the deployment of its 
NetAuthority(tm) public key infrastructure solution as the certificate authority 
for the U.S. Postal Service's NetPost.Certified, a new Internet-based service 
designed to secure and authenticate electronic correspondence between 
government agencies.

Press release:
< http://www.net-security.org/text/press/979780817,6686,.shtml >

----------------------------------------------------------------------------

VIRUSMD.COM BIDS TO LEAD MEDICAL RECORDS ENCRYPTION - [18.01.2001]

In its bid to lead the new $3.8 billion dollar gold rush for medical records privacy 
and encryption, the VirusMD sofware corporation today hired two Board-Certified 
physicians to join its consulting team. In order to protect the security and 
confidentiality of electronic health information, Congress has passed The 
Health Insurance Portability and Accountability Act, also known as HIPAA.

Press release:
< http://www.net-security.org/text/press/979780923,36108,.shtml >

----------------------------------------------------------------------------

SELLING 'NETWORK VAULT' TECHNOLOGY - [18.01.2001]

CyberArk Software, Ltd., makers of the industry's first "network vault" for 
securing corporate data and e-business, announced today that Global 
Technology Associates (GTA), a U.K.-based IT security consulting firm, 
will begin reselling Cyber-Ark's PrivateArk solution. GTA is a respected 
authority in the Internet and network security arena and assesses 
corporate security needs and provides leading-edge security solutions.

Press release:
< http://www.net-security.org/text/press/979780999,85255,.shtml >

----------------------------------------------------------------------------

NO FEAR FROM MELISSA-X WORM - [20.01.2001]

Sophos Anti-Virus, a world leader in corporate anti-virus protection, has 
announced that users practising safe computing have nothing to fear from 
the Melissa-X virus. However, users without the latest version of their 
anti-virus software may be unable to detect the virus.

Press release:
< http://www.net-security.org/text/press/979957211,47193,.shtml >

----------------------------------------------------------------------------

SECURITY BIOMETRICS' BOARD OF DIRECTORS GROWS - [20.01.2001]

Mr. George Gould, President of Security Biometrics, Inc. (www.sigbio.com) is 
pleased to announce the appointment of Robert M. Egery as a director to 
the company. "We are delighted to see Egery joining our team at this exciting 
time for SBI," says Gould. "His expertise and industry exposure will serve us all 
very well in the near and distant future."

Press release:
< http://www.net-security.org/text/press/979957634,24064,.shtml >

----------------------------------------------------------------------------

SYMANTEC ON NEW MELISSA VARIANT - [20.01.2001]

Researchers at the Symantec AntiVirus Research Center are warning computer 
users of Melissa.W, a variant of the damaging Melissa virus that uses Microsoft 
Outlook to e-mail itself as an attachment.

Press release:
< http://www.net-security.org/text/press/979957704,68834,.shtml >

----------------------------------------------------------------------------




Featured articles
-----------------

All articles are located at:
http://www.net-security.org/text/articles

Articles can be contributed to staff@net-security.org

Below is the list of the recently added articles.

----------------------------------------------------------------------------

TECHNIQUES TO VALIDATE HOST-CONNECTIVITY

This paper will attempt to describe techniques used to discover heavily filtered 
and firewalled hosts, that will not answer to standard PING responses. It is 
assumed that the reader has a firm knowledge of the major internet protocols 
(TCP,IP,UDP,ICMP). Most other protocols will not be discussed but techniques 
described here can be applied to many protocols.

Read more:
< http://www.net-security.org/text/articles/index-download.shtml#host >

----------------------------------------------------------------------------

WHAT'S SO SPECIAL ABOUT "DAVINIA"? THE TRUTH ABOUT THE RECENTLY 
DISCOVERED INTERNET-WORM by Kaspersky Lab

"Davinia" spreads via e-mail using the popular MS Outlook e-mail program. The 
worm uses a very sophisticated way of penetrating into a user's computer. This 
process consists of two parts...

Read more:
< http://www.net-security.org/text/articles/viruses/davinia.shtml >

----------------------------------------------------------------------------




Security Software
-------------------

All programs are located at:
http://net-security.org/various/software

----------------------------------------------------------------------------

ABI-CODER 3.5

This free file encryption software uses a 192-bit Triple DES algorithm. It allows 
you to encrypt files and folders with a click of the mouse. ABI-CODER is easy 
to use and comes with great help files as well as hints to guide you along the 
way. Included is a self-decryption tool. Version 3.5 includes a new 128-bit 
Blowfish encryption algorithm.

Info/Download:
< http://www.net-security.org/various/software/978804005,99349,windows.shtml >

----------------------------------------------------------------------------

LINUX IDS 0.9.12-2.2.18

The Linux Intrusion Detection System is a patch which enhances the kernel's 
security. When it's in effect, many system administration operations can be 
made impossible even for root. You can turn the security protection on or off 
on the fly and you can hide sensitive processes and prevent anyone from using 
ptrace or any other capability on your system. LIDS can also provide raw device 
and I/O access protection. Changes: The file that acls inherit has had several 
bugs removed. Multiplatform support has been added to the makefile.

Info/Download:
< http://www.net-security.org/various/software/979669522,23787,linux.shtml >

----------------------------------------------------------------------------

WEBPASSWORD 1.0

WebPassword is a program which protects your Web pages with a password. 
Once you have password-protected your page, no one will be able to view its 
content without having a correct password, either in their browser or as an 
original HTML source. In a Web browser, the content of a password-protected 
page may be viewed only after a valid password is entered. In a text viewer, 
the content of an encoded page appears as a block of JavaScript data in an 
HTML page.

Info/Download:
< http://www.net-security.org/various/software/978809296,27689,windows.shtml >

----------------------------------------------------------------------------

FWLOGWATCH-0.1.2

Fwlogwatch analyzes the ipchains, netfilter, or iptables packet filter logfiles 
and generates text and HTML summaries. Features realtime anomaly alerting 
capability, an interactive report generator, and the ability to cut off attacks 
by adding firewall rules. Changes: Some remaining problems in realtime 
response mode were fixed.

Info/Download:
< http://www.net-security.org/various/software/979836008,28948,linux.shtml >

----------------------------------------------------------------------------

DEVICELOCK ME 1.0

DeviceLock Me gives network administrators control over which users can 
access what removable devices (floppies, Magneto-Optical disks, CD-ROMs, 
ZIPs, and so on) on a local computer. Once DeviceLock Me is installed, 
administrators can control access to floppies, CD-ROMs, or any other device, 
depending on the time and date. DeviceLock Me enhances access control for 
Windows System Administrators and helps control removable disk usage. It can 
protect network and local computers against viruses, Trojans, and other 
malicious programs often introduced by removable disks. Network administrators 
can also use DeviceLock Me to flush a storage device's buffers. Remote control 
is also available.

Info/Download:
< http://www.net-security.org/various/software/978809487,99994,windows.shtml >

----------------------------------------------------------------------------

CRYPT EDIT 4.0

Crypt Edit is a multidocument word processor with enhanced cryptographic 
features. It can easily save texts in HTML, DOC, RTF, ASCII, WRI, Unicode, 
and PRT (Protected Text Format with three security levels) formats. Encrypt 
and decrypt binary files with compression, and create desktop shortcuts for 
your documents. Insert OLE objects and pictures in GIF, JPEG, BMP, EMF, or 
WMF format. The program includes an email client with an address book, a 
spelling checker, a built-in Clipboard viewer, various converters (Lowercase, 
Uppercase, ROT-13, OEM, and so on), a character map, and an autoformat 
tool. The new version is now nag-free donationware.

Info/Download:
< http://www.net-security.org/various/software/978809762,78481,windows.shtml >

----------------------------------------------------------------------------

UNRM-0.92

unrm is a small linux utility which can, under some circumstances, recover 
almost 99% of your erased data (similar to DOS's undelete). Changes: Fixed 
a bug that allowed only 6 digit inode numbers to be dumped, and added a few 
variables containing the common used program locations (mount,debugfs).

Info/Download:
< http://www.net-security.org/various/software/979836106,61006,linux.shtml >

----------------------------------------------------------------------------

DATA ENCRYPTION TOOLKIT 1.0

Data Encryption Toolkit is a comprehensive program for data encryption. This 
program allows you to use five well-known, highly secure encryption algorithms. 
DET will help you to encrypt single files, groups of files, or entire folders, 
including all subfolders, quickly and easily. You can work with encrypted 
folders as simply as with usual folders (except entering the unlocking password). 
All encryption and decryption actions can be done on fly. The program can be 
integrated into any Windows shell and all its functions are available from the 
context menu. Besides encryption, the program has some additional features. 
DET is fast, and easy to setup and to use.

Info/Download:
< http://www.net-security.org/various/software/978809844,49850,windows.shtml >

----------------------------------------------------------------------------




Defaced archives
------------------------

[14.01.2001] - Rockwell Software, Inc.
Original: http://www.rsbizware.com/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/14/www.rsbizware.com/

[14.01.2001] - #2 McHammer Official Site
Original: http://www.mchammer.com/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/14/www.mchammer.com/

[14.01.2001] - National Centre for Radio Astrophysics, India
Original: http://dual2.gmrt.ncra.tifr.res.in/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/14/dual2.gmrt.ncra.tifr.res.in/

[14.01.2001] - Northern Plains Region Homepage - Natural Resources
Original: http://www.np.nrcs.usda.gov/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/14/www.np.nrcs.usda.gov/

[15.01.2001] - National Aeronautics and Space Administration
Original: http://uta7400.jpl.nasa.gov/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/15/uta7400.jpl.nasa.gov/

[16.01.2001] - Newspaper Association of America
Original: http://www.naa.org/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/16/www.naa.org/

[16.01.2001] - Presidency of The Islamic Republic of Iran
Original: http://web.president.gov.ir/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/16/web.president.gov.ir/

[16.01.2001] - Ministry of Trade and Industry, Israel
Original: http://www.tamas.gov.il/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/16/www.tamas.gov.il/

[16.01.2001] - President Administration (Bulgaria)
Original: http://www.president.bg/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/16/www.president.bg/

[19.01.2001] - Ministry of Education and Science (Bulgaria)
Original: http://asclep.muvar.acad.bg/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/19/asclep.muvar.acad.bg/

[19.01.2001] - USAF Pararescue
Original: http://www.specialtactics.com/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/19/www.specialtactics.com/

[19.01.2001] - Australian Institute of Marine Science
Original: http://www.aims.gov.au/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/19/www.aims.gov.au/

[19.01.2001] - US Department of the Interior, Alaskan Office
Original: http://www.ak.doi.gov/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/19/www.ak.doi.gov/

[19.01.2001] - National Cemetary Administration, Department of Veterans Affairs
Original: http://www.cem.va.gov/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/19/www.cem.va.gov/

[19.01.2001] - Swindon Borough Council, UK
Original: http://www.swindon.gov.uk/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/19/www.swindon.gov.uk/

----------------------------------------------------------------------------


Questions, contributions, comments or ideas go to:
 
Help Net Security staff
 
staff@net-security.org
http://net-security.org