💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › HWA › hwa-hn25.… captured on 2022-01-08 at 15:59:48.

View Raw

More Information

⬅️ Previous capture (2021-12-03)

-=-=-=-=-=-=-

    [ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ]
  =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
  ==========================================================================
  =                       <=-[ HWA.hax0r.news ]-=>                         =
  ==========================================================================
    [=HWA'99=]                         Number 25 Volume 1 1999 July 18th  99
  ==========================================================================
    [                     61:20:6B:69:64:20:63:6F:75:                    ]
    [               6C:64:20:62:72:65:61:6B:20:74:68:69:73:              ]
    [              20:22:65:6E:63:72:79:70:74:69:6F:6E:22:!              ]        
  ==========================================================================



          "software doesn't kill data -- people do."
                                 
                                 - Drew Ulricksen from zdnn 




     HWA.hax0r.news is sponsored by Cubesoft communications www.csoft.net
     and www.digitalgeeks.com thanks to p0lix for the digitalgeeks bandwidth
     and airportman for the Cubesoft bandwidth. Also shouts out to all our
     mirror sites! tnx guys. 
     
     http://www.csoft.net/~hwa
     http://www.digitalgeeks.com/hwa

     
     HWA.hax0r.news Mirror Sites:
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~
     http://www.csoft.net/~hwa/ 
     http://www.digitalgeeks.com/hwa.
     http://members.tripod.com/~hwa_2k
     http://welcome.to/HWA.hax0r.news/
     http://www.attrition.org/~modify/texts/zines/HWA/
     http://packetstorm.harvard.edu/hwahaxornews/     * DOWN *
     http://archives.projectgamma.com/zines/hwa/.  
     http://www.403-security.org/Htmls/hwa.hax0r.news.htm

   
               
     
        
  
   SYNOPSIS (READ THIS)
   --------------------
   
   The purpose of this newsletter is to 'digest' current events of interest
   that affect the online underground and netizens in general. This includes
   coverage of general security issues, hacks, exploits, underground news
   and anything else I think is worthy of a look see. (remember i'm doing
   this for me, not you, the fact some people happen to get a kick/use
   out of it is of secondary importance).

    This list is NOT meant as a replacement for, nor to compete with, the
   likes of publications such as CuD or PHRACK or with news sites such as
   AntiOnline, the Hacker News Network (HNN) or mailing lists such as
   BUGTRAQ or ISN nor could any other 'digest' of this type do so.

    It *is* intended  however, to  compliment such material and provide a
   reference to those who follow the culture by keeping tabs on as many
   sources as possible and providing links to further info, its a labour
   of love and will be continued for as long as I feel like it, i'm not
   motivated by dollars or the illusion of fame, did you ever notice how
   the most famous/infamous hackers are the ones that get caught? there's
   a lot to be said for remaining just outside the circle... <g>
   
   

   @HWA

   =-----------------------------------------------------------------------=

                     Welcome to HWA.hax0r.news ... #25

   =-----------------------------------------------------------------------=


    
    We could use some more people joining the channel, its usually pretty
    quiet, we don't bite (usually) so if you're hanging out on irc stop
    by and idle a while and say hi...   

    *******************************************************************
    ***      /join #HWA.hax0r.news on EFnet the key is `zwen'       ***
    ***                                                             ***
    *** please join to discuss or impart news on techno/phac scene  ***
    *** stuff or just to hang out ... someone is usually around 24/7***
    ***                                                             ***
    *** Note that the channel isn't there to entertain you its for  ***
    *** you to talk to us and impart news, if you're looking for fun***
    *** then do NOT join our channel try #weirdwigs or something... ***
    *** we're not #chatzone or #hack                                ***
    ***                                                             ***
    *******************************************************************


  =-------------------------------------------------------------------------=
  
  Issue #25

  =--------------------------------------------------------------------------=
  [ INDEX ]
  =--------------------------------------------------------------------------=
    Key     Intros                                                         
  =--------------------------------------------------------------------------=
 
    00.0  .. COPYRIGHTS ......................................................
    00.1  .. CONTACT INFORMATION & SNAIL MAIL DROP ETC .......................
    00.2  .. SOURCES .........................................................
    00.3  .. THIS IS WHO WE ARE ..............................................
    00.4  .. WHAT'S IN A NAME? why `HWA.hax0r.news'?..........................
    00.5  .. THE HWA_FAQ V1.0 ................................................

  =--------------------------------------------------------------------------=
    Key     Content 
  =--------------------------------------------------------------------------=

    01.0  .. GREETS ..........................................................
     01.1 .. Last minute stuff, rumours, newsbytes ...........................
     01.2 .. Mailbag .........................................................
    02.0  .. From the Editor.................................................. 
    03.0  .. AVP releases Bo2K detection July 12th............................
    04.0  .. More info on Bo2k................................................
    05.0  .. Defcon Wrapups...................................................
    06.0  .. l0pht announces Antisniff .......................................
    07.0  .. Bruce Schneier: PPTPv2 'sucks less' .............................
    08.0  .. 1000 copies of Freedom Beta2 Released ...........................
    09.0  .. DefCon Web Page Defaced on Opening Day of Con ...................
    10.0  .. Capture the Flag Logs Available .................................
    11.0  .. Mitnick Sentencing Delayed, Again ...............................
    12.0  .. Short explanation of NT related acronyms by StEa|_th.............
    13.0  .. BO2K Defcon Presentation on RealVideo ...........................
    14.0  .. Defcon News Roundup .............................................
    15.0  .. Computer Experts Will Form the Frontline of Sweden's Defense ....
    16.0  .. Canadians Plan a Information Protection Centre ..................
    17.0  .. Y2K Commission May Be Renamed Security Commission ...............
    18.0  .. Tempest Exporter Arrested .......................................
    19.0  .. NcN'99 Con in Mallorca Spain Announced ..........................
    20.0  .. Rhino 9 Calls it Quits ..........................................
    21.0  .. Hotwired and away, 6 yr old fires up toy car and heads for the highway..
    22.0  .. Want a 90 gigabyte `HD' for $895? think its impossible? read on..
    23.0  .. Sony finished the Glasstron.VR headset............................
    24.0  .. NIST Offers Security Accreditation ...............................
    25.0  .. Spanish Civil Guard Arrest Electronic Intruder.................... 
    26.0  .. 303.org Needs A Home .............................................
    27.0  .. CyberCop Sting Now Shipping (Check this out)......................
    28.0  .. cDc Issues Public Apology About Infected BO2K ....................
    29.0  .. California Golf Course Computers Attacked ........................
    30.0  .. Selling your privacy..............................................
    31.0  .. Geek Pride 99 ....................................................
    32.0  .. Woz Speaks on Pirates of Silicon Valley ..........................
    33.0  .. Project Gamma Down for a while due to server relocation...........
    34.0  .. CERT ADVISORY CA-99-08............................................
    35.0  .. CODE NAME JANUS - new version of windows..........................
    36.0  .. ANOTHER ONE ON BO2K ..............................................
    37.0  .. BUG IN AMAVIS VIRUS SCANNER.......................................
    38.0  .. E-COMMERCE IS SECURE..............................................
    39.0  .. GAO REPORT ON US NAVY ............................................
    40.0  .. GEEKS IN SPACE....................................................
    41.0  .. DOD to use Netscape's PKI ........................................
    42.0  .. Federal Computer Week: FBI turns on new computer crime fighting system 
    43.0  .. NMRC: Netware 5 Hijack Vulnerability .............................
    44.0  .. CNet: IBM offers privacy consulting services .....................
    45.0  .. mod_ssl 2.3.6 Bug Fixes ..........................................
    46.0  .. Clinton authorizes National Infrastructure Assurance Council......
    47.0  .. Federal Computer Week: GSA makes last awards for security services pact
    48.0  .. Federal Computer Week: Army awards $248 million ID contract.......
    49.0  .. Denial of Service Vulnerability in IBM AIX........................
    50.0  .. Trinux revisited by www.securityportal.com........................
    51.0  .. ComputerWorld: Crypto Expert - Most encryption software is insecure 
    52.0  .. Y2K Villains come in all shapes and sizes.......................... 
    53.0  .. 3Com eyes new wireless standard for PALM...........................
    54.0  .. Intel creates Net-specific unit.................................... 
    55.0  .. Bugtraq: JavaScript used to bypass cookie settings in Netscape ....
    56.0  .. Granny Hacker From Heck <sic> visits defcon (part #1)""............
    57.0  .. Carolyn's ("Granny Hacker") profile on Antionline..................
    58.0  .. HP Security advisory (July 7th) HPSBUX9907-100    
    59.0  .. Microsoft Security Bulletin (MS99-024): Patch for Unprotected IOCTLs
    60.0  .. ZDNET: DOes the media cause hacking? (No Marilyn Manson does - Ed)
   
    
    =--------------------------------------------------------------------------=   
    
    RUMOURS .Rumours from around and about, mainly HNN stuff (not hacked websites)
    
    AD.S  .. Post your site ads or etc here, if you can offer something in return
             thats tres cool, if not we'll consider ur ad anyways so send it in.
             ads for other zines are ok too btw just mention us in yours, please
             remember to include links and an email contact. Corporate ads will
             be considered also and if your company wishes to donate to or 
             participate in the upcoming Canc0n99 event send in your suggestions
             and ads now...n.b date and time may be pushed back join mailing list
             for up to date information.......................................
             Current dates: Aug19th-22nd Niagara Falls...    .................
    Ha.Ha .. Humour and puzzles  ............................................
              
              Hey You!........................................................
              =------=........................................................
              
              Send in humour for this section! I need a laugh and its hard to
              find good stuff... ;)...........................................

    SITE.1 .. Featured site, .................................................
     H.W   .. Hacked Websites  ...............................................
     A.0   .. APPENDICES......................................................
     A.1   .. PHACVW linx and references......................................
 
  =--------------------------------------------------------------------------=
     
     @HWA'99

     
 00.0 (C) COPYRIGHT, (K)OPYWRONG, COPYLEFT? V2.0
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

          THE OPINIONS OF THE WRITERS DO NOT NECESSARILY REFLECT THE
          OPINIONS OF THE PUBLISHERS AND VICE VERSA IN FACT WE DUNNO
          WTF IS GONNA TAKE RESPONSIBILITY FOR THIS, I'M NOT DOING IT
          (LOTS OF ME EITHER'S RESOUND IN THE BACKGROUND) SO UHM JUST
          READ IT AND IF IT BUGS YOU WELL TFS (SEE FAQ).
     
          Important semi-legalese and license to redistribute:
     
          YOU MAY DISTRIBUTE THIS ZINE WITHOUT PERMISSION FROM MYSELF
          AND ARE GRANTED THE RIGHT TO QUOTE ME OR THE CONTENTS OF THE
          ZINE SO LONG AS Cruciphux AND/OR HWA.hax0r.news ARE MENTIONED
          IN YOUR WRITING. LINK'S ARE NOT NECESSARY OR EXPECTED BUT ARE
          APPRECIATED the current link is http://welcome.to/HWA.hax0r.news
          IT IS NOT MY INTENTION TO VIOLATE ANYONE'S COPYRIGHTS OR BREAK
          ANY NETIQUETTE IN ANY WAY IF YOU FEEL I'VE DONE THAT PLEASE EMAIL
          ME PRIVATELY current email cruciphux@dok.org
     
          THIS DOES NOT CONSTITUTE ANY LEGAL RIGHTS, IN THIS COUNTRY ALL
          WORKS ARE (C) AS SOON AS COMMITTED TO PAPER OR DISK, IF ORIGINAL
          THE LAYOUT AND COMMENTARIES ARE THEREFORE (C) WHICH MEANS:
     
          I RETAIN ALL RIGHTS, BUT I GIVE YOU THE RIGHT TO READ, QUOTE
          AND REDISTRIBUTE/MIRROR. - EoD
     
     
          Although this file and all future issues are now copyright, some of
         the content holds its  own copyright and these are printed and
         respected. News is news so i'll print any and all news but will quote
         sources when the source is known, if its good enough for CNN its good
         enough for me. And i'm doing it for free on my own time so pfffft. :)
     
         No monies are made or sought through the distribution of this material.
         If you have a problem or concern email me and we'll discuss it.
     
         cruciphux@dok.org
     
         Cruciphux [C*:.]



 00.1 CONTACT INFORMATION AND MAIL DROP
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


     Wahoo, we now have a mail-drop, if you are outside of the U.S.A or
    Canada / North America (hell even if you are inside ..) and wish to
    send printed matter like newspaper clippings a subscription to your
    cool foreign hacking zine or photos, small non-explosive packages
    or sensitive information etc etc well, now you can. (w00t) please
    no more inflatable sheep or plastic dog droppings, or fake vomit
    thanks.

    Send all goodies to:

	    HWA NEWS
	    P.O BOX 44118
	    370 MAIN ST. NORTH
	    BRAMPTON, ONTARIO
	    CANADA
	    L6V 4H5

    WANTED!: POSTCARDS! YESH! POSTCARDS, I COLLECT EM so I know a lot of you are
    ~~~~~~~  reading this from some interesting places, make my day and get a
             mention in the zine, send in a postcard, I realize that some places
             it is cost prohibitive but if you have the time and money be a cool
             dude / gal and send a poor guy a postcard preferably one that has some
             scenery from your place of residence for my collection, I collect stamps
             too so you kill two birds with one stone by being cool and mailing in a
             postcard, return address not necessary, just a  "hey guys being cool in
             Bahrain, take it easy" will do ... ;-) thanx.



    Ideas for interesting 'stuff' to send in apart from news:

    - Photo copies of old system manual front pages (optionally signed by you) ;-)
    - Photos of yourself, your mom, sister, dog and or cat in a NON
      compromising position plz I don't want pr0n. <g>
    - Picture postcards
    - CD's 3.5" disks, Zip disks, 5.25" or 8" floppies, Qic40/80/100-250
      tapes with hack/security related archives, logs, irc logs etc on em.
    - audio or video cassettes of yourself/others etc of interesting phone
      fun or social engineering examples or transcripts thereof.
    
    
    Stuff you can email:
    
    - Prank phone calls in .ram or .mp* format
    - Fone tones and security announcements from PBX's etc
    - fun shit you sampled off yer scanner (relevant stuff only like #2600 meeting activities)
    - reserved for one smiley face ->        :-)            <-
    - PHACV lists of files that you have or phac cd's you own (we have a burner, *g*)
    - burns of phac cds (email first to make sure we don't already have em)
    - Any and all telephone sounds/tones/beeps/trunk drops/line tests/etc in .ram etc format or .mp*
    

    If you still can't think of anything you're probably not that interesting
    a person after all so don't worry about it <BeG>

    Our current email:

    Submissions/zine gossip.....: hwa@press.usmc.net
    Private email to editor.....: cruciphux@dok.org
    Distribution/Website........: sas72@usa.net

    @HWA



 00.2 Sources ***
      ~~~~~~~~~~~

     Sources can be some, all, or none of the following (by no means complete
    nor listed in any degree of importance) Unless otherwise noted, like msgs
    from lists or news from other sites, articles and information is compiled
    and or sourced by Cruciphux no copyright claimed.

    News & I/O zine ................. <a href="http://www.antionline.com/">http://www.antionline.com/</a>
    Back Orifice/cDc..................<a href="http://www.cultdeadcow.com/">http://www.cultdeadcow.com/</a>
    News site (HNN) .....,............<a href="http://www.hackernews.com/">http://www.hackernews.com/</a>
    Help Net Security.................<a href="http://net-security.org/">http://net-security.org/</a>
    News,Advisories,++ .(lophtcrack)..<a href="http://www.l0pht.com/">http://www.l0pht.com/</a>
    NewsTrolls .(daily news ).........<a href="http://www.newstrolls.com/">http://www.newstrolls.com/</a>
    News + Exploit archive ...........<a href="http://www.rootshell.com/beta/news.html">http://www.rootshell.com/beta/news.html</a>
    CuD Computer Underground Digest...<a href="http://www.soci.niu.edu/~cudigest">http://www.soci.niu.edu/~cudigest</a>
    News site+........................<a href="http://www.zdnet.com/">http://www.zdnet.com/</a>
    News site+Security................<a href="http://www.gammaforce.org/">http://www.gammaforce.org/</a>
    News site+Security................<a href="http://www.projectgamma.com/">http://www.projectgamma.com/</a>
    News site+Security................<a href="http://securityhole.8m.com/">http://securityhole.8m.com/</a>
    News site+Security related site...<a href="http://www.403-security.org/">http://www.403-security.org/</a>
    News/Humour site+ ................<a href="http://www.innerpulse.com/>http://www.innerpulse.com</a>
    News/Techie news site.............<a href="http://www.slashdot.org/>http://www.slashdot.org</a>
    
    

    +Various mailing lists and some newsgroups, such as ...
    +other sites available on the HNN affiliates page, please see
     http://www.hackernews.com/affiliates.html as they seem to be popping up
     rather frequently ...

    
    http://www.the-project.org/ .. IRC list/admin archives
    http://www.anchordesk.com/  .. Jesse Berst's AnchorDesk

    alt.hackers.malicious
    alt.hackers
    alt.2600
    BUGTRAQ
    ISN security mailing list
    ntbugtraq
    <+others>

    NEWS Agencies, News search engines etc:
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    http://www.cnn.com/SEARCH/
    <a href="http://www.cnn.com/SEARCH/">Link</a>
    
    http://www.foxnews.com/search/cgi-bin/search.cgi?query=hack&days=0&wires=0&startwire=0
    <a href="http://www.foxnews.com/search/cgi-bin/search.cgi?query=hack&days=0&wires=0&startwire=0">Link</a>
    
    http://www.news.com/Searching/Results/1,18,1,00.html?querystr=hack
    <a href="http://www.news.com/Searching/Results/1,18,1,00.html?querystr=hack">Link</a>
    
    http://www.ottawacitizen.com/business/
    <a href="http://www.ottawacitizen.com/business/">Link</a>
    
    http://search.yahoo.com.sg/search/news_sg?p=hack
    <a href="http://search.yahoo.com.sg/search/news_sg?p=hack">Link</a>
    
    http://www.washingtonpost.com/cgi-bin/search?DB_NAME=WPlate&TOTAL_HITLIST=20&DEFAULT_OPERATOR=AND&headline=&WITHIN_FIELD_NAME=.lt.event_date&WITHIN_DAYS=0&description=hack
    <a href="http://www.washingtonpost.com/cgi-bin/search?DB_NAME=WPlate&TOTAL_HITLIST=20&DEFAULT_OPERATOR=AND&headline=&WITHIN_FIELD_NAME=.lt.event_date&WITHIN_DAYS=0&description=hack">Link</a>
    
    http://www.zdnet.com/zdtv/cybercrime/
    <a href="http://www.zdnet.com/zdtv/cybercrime/">Link</a>
    
    http://www.zdnet.com/zdtv/cybercrime/chaostheory/ (Kevin Poulsen's Column)
    <a href="http://www.zdnet.com/zdtv/cybercrime/chaostheory/">Link</a>
    
    NOTE: See appendices for details on other links.
    


    http://news.bbc.co.uk/hi/english/sci/tech/newsid_254000/254236.stm
    <a href="http://news.bbc.co.uk/hi/english/sci/tech/newsid_254000/254236.stm">Link</a>
    
    http://freespeech.org/eua/ Electronic Underground Affiliation
    <a href="http://freespeech.org/eua/">Link</a>
    
    http://ech0.cjb.net ech0 Security
    <a href="http://ech0.cjb.net">Link</a>

    http://axon.jccc.net/hir/ Hackers Information Report
    <a href="http://axon.jccc.net/hir/">Link</a>
    
    http://net-security.org Net Security
    <a href="http://net-security.org">Link</a>  
    
    http://www.403-security.org Daily news and security related site
    <a href="http://www.403-security.org">Link</a>
    

    Submissions/Hints/Tips/Etc
    ~~~~~~~~~~~~~~~~~~~~~~~~~~

    All submissions that are `published' are printed with the credits
    you provide, if no response is received by a week or two it is assumed
    that you don't care wether the article/email is to be used in an issue
    or not and may be used at my discretion.

    Looking for:

    Good news sites that are not already listed here OR on the HNN affiliates
    page at http://www.hackernews.com/affiliates.html

    Magazines (complete or just the articles) of breaking sekurity or hacker
    activity in your region, this includes telephone phraud and any other
    technological use, abuse hole or cool thingy. ;-) cut em out and send it
    to the drop box.


    - Ed

    Mailing List Subscription Info   (Far from complete)         Feb 1999
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~   ~~~~~~~~~~~~~~~~~~~         ~~~~~~~~

    ISS Security mailing list faq : http://www.iss.net/iss/maillist.html


    THE MOST READ:

    BUGTRAQ - Subscription info
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~

    What is Bugtraq?

    Bugtraq is a full-disclosure UNIX security mailing list, (see the info
    file) started by Scott Chasin <chasin@crimelab.com>. To subscribe to
    bugtraq, send mail to listserv@netspace.org containing the message body
    subscribe bugtraq. I've been archiving this list on the web since late
    1993. It is searchable with glimpse and archived on-the-fly with hypermail.

    Searchable Hypermail Index;

          http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html

          <a href="http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html">Link</a>

    About the Bugtraq mailing list
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    The following comes from Bugtraq's info file:

    This list is for *detailed* discussion of UNIX security holes: what they are,
    how to exploit, and what to do to fix them.

    This list is not intended to be about cracking systems or exploiting their
    vulnerabilities. It is about defining, recognizing, and preventing use of
    security holes and risks.

    Please refrain from posting one-line messages or messages that do not contain
    any substance that can relate to this list`s charter.

    I will allow certain informational posts regarding updates to security tools,
    documents, etc. But I will not tolerate any unnecessary or nonessential "noise"
    on this list.

    Please follow the below guidelines on what kind of information should be posted
    to the Bugtraq list:

    + Information on Unix related security holes/backdoors (past and present)
    + Exploit programs, scripts or detailed processes about the above
    + Patches, workarounds, fixes
    + Announcements, advisories or warnings
    + Ideas, future plans or current works dealing with Unix security
    + Information material regarding vendor contacts and procedures
    + Individual experiences in dealing with above vendors or security organizations
    + Incident advisories or informational reporting

    Any non-essential replies should not be directed to the list but to the originator of the message. Please do not "CC" the bugtraq
    reflector address if the response does not meet the above criteria.

    Remember: YOYOW.

    You own your own words. This means that you are responsible for the words that you post on this list and that reproduction of
    those words without your permission in any medium outside the distribution of this list may be challenged by you, the author.

    For questions or comments, please mail me:
    chasin@crimelab.com (Scott Chasin)


    
    Crypto-Gram
    ~~~~~~~~~~~

       CRYPTO-GRAM is a free monthly newsletter providing summaries, analyses,
      insights, and commentaries on cryptography and computer security.

      To subscribe, visit http://www.counterpane.com/crypto-gram.html or send a
      blank message to crypto-gram-subscribe@chaparraltree.com.� To unsubscribe,
      visit http://www.counterpane.com/unsubform.html.� Back issues are available
      on http://www.counterpane.com.

       CRYPTO-GRAM is written by Bruce Schneier.� Schneier is president of
      Counterpane Systems, the author of "Applied Cryptography," and an inventor
      of the Blowfish, Twofish, and Yarrow algorithms.� He served on the board of
      the International Association for Cryptologic Research, EPIC, and VTW.� He
      is a frequent writer and lecturer on cryptography.


    CUD Computer Underground Digest
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    This info directly from their latest ish:

    Computer underground Digest��� Sun� 14 Feb, 1999�� Volume 11 : Issue 09
�����
��������������������� ISSN� 1004-042X

������ Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
������ News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
������ Archivist: Brendan Kehoe
������ Poof Reader:�� Etaion Shrdlu, Jr.
������ Shadow-Archivists: Dan Carosone / Paul Southworth
������������������������� Ralph Sims / Jyrki Kuoppala
������������������������� Ian Dickinson
������ Cu Digest Homepage: http://www.soci.niu.edu/~cudigest



    [ISN] Security list
    ~~~~~~~~~~~~~~~~~~~
    This is a low volume list with lots of informative articles, if I had my
    way i'd reproduce them ALL here, well almost all .... ;-) - Ed


    Subscribe: mail majordomo@repsec.com with "subscribe isn".



    @HWA


 00.3 THIS IS WHO WE ARE
      ~~~~~~~~~~~~~~~~~~
 
      Some HWA members and Legacy staff
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      cruciphux@dok.org.........: currently active/editorial
      darkshadez@ThePentagon.com: currently active/man in black
      fprophet@dok.org..........: currently active/IRC+ man in black
      sas72@usa.net ............. currently active/IRC+ distribution
      vexxation@usa.net ........: currently active/IRC+ proof reader/grrl in black
      dicentra...(email withheld): IRC+ grrl in black
      eentity ...( ''      ''   ): Currently active/IRC+ man in black


      Foreign Correspondants/affiliate members
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
       Qubik ............................: United Kingdom 
       D----Y ...........................: USA/world media
       HWA members ......................: World Media
       
      
      
      Past Foreign Correspondants (currently inactive or presumed dead) 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
       
       N0Portz ..........................: Australia           
       system error .....................: Indonesia           
       Wile (wile coyote) ...............: Japan/the East      
       Ruffneck  ........................: Netherlands/Holland 

       
       Please send in your sites for inclusion here if you haven't already
       also if you want your emails listed send me a note ... - Ed

      Spikeman's site is down as of this writing, if it comes back online it will be
      posted here.
      http://www.hackerlink.or.id/  ............ System Error's site (in Indonesian) 
       

       *******************************************************************
       ***      /join #HWA.hax0r.news on EFnet the key is `zwen'       ***
       *******************************************************************

    :-p


    1. We do NOT work for the government in any shape or form.Unless you count paying
       taxes ... in which case we work for the gov't in a BIG WAY. :-/

    2. MOSTLY Unchanged since issue #1, although issues are a digest of recent news
       events its a good idea to check out issue #1 at least and possibly also the
       Xmas issue for a good feel of what we're all about otherwise enjoy - Ed ...


    @HWA



 00.4 Whats in a name? why HWA.hax0r.news??
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                             
      
      Well what does HWA stand for? never mind if you ever find out I may
     have to get those hax0rs from 'Hackers' or the Pretorians after you.

     In case you couldn't figure it out hax0r is "new skewl" and although
     it is laughed at, shunned, or even pidgeon holed with those 'dumb
     leet (l33t?) dewds' <see article in issue #4> this is the state
     of affairs. It ain't Stephen Levy's HACKERS anymore. BTW to all you
     up  and comers, i'd highly recommend you get that book. Its almost
     like  buying a clue. Anyway..on with the show .. - Editorial staff


     @HWA

00.5  HWA FAQ v1.0 Feb 13th 1999 (Abridged & slightly updated again)
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    Also released in issue #3. (revised) check that issue for the faq
    it won't be reprinted unless changed in a big way with the exception
    of the following excerpt from the FAQ, included to assist first time
    readers:

    Some of the stuff related to personal useage and use in this zine are
    listed below: Some are very useful, others attempt to deny the any possible
    attempts at eschewing obfuscation by obsucuring their actual definitions.

    @HWA   - see EoA  ;-)

    !=     - Mathematical notation "is not equal to" or "does not equal"
             ASC(247)  "wavey equals" sign means "almost equal" to. If written
             an =/= (equals sign with a slash thru it) also means !=, =< is Equal
             to or less than and =>  is equal to or greater than (etc, this aint
             fucking grade school, cripes, don't believe I just typed all that..)

    AAM    - Ask a minor (someone under age of adulthood, usually <16, <18 or <21)

    AOL    - A great deal of people that got ripped off for net access by a huge
             clueless isp with sekurity that you can drive buses through, we're
             not talking Kung-Fu being none too good here, Buy-A-Kloo maybe at the
             least they could try leasing one??

   *CC     - 1 - Credit Card (as in phraud)
             2 - .cc is COCOS (Keeling) ISLANDS butthey probably accept cc's

    CCC    - Chaos Computer Club (Germany)

   *CON    - Conference, a place hackers crackers and hax0rs among others go to swap
             ideas, get drunk, swap new mad inphoz, get drunk, swap gear, get drunk
             watch videos and seminars, get drunk, listen to speakers, and last but
             not least, get drunk.
   *CRACKER - 1 . Someone who cracks games, encryption or codes, in popular hacker
                 speak he's the guy that breaks into systems and is often (but by no
                 means always) a "script kiddie" see pheer
              2 . An edible biscuit usually crappy tasting without a nice dip, I like
                  jalapeno pepper dip or chives sour cream and onion, yum - Ed

    Ebonics - speaking like a rastafarian or hip dude of colour <sic> also wigger
              Vanilla Ice is a wigger, The Beastie Boys and rappers speak using
              ebonics, speaking in a dark tongue ... being ereet, see pheer

    EoC    - End of Commentary

    EoA    - End of Article or more commonly @HWA

    EoF    - End of file

    EoD    - End of diatribe (AOL'ers: look it up)

    FUD    - Coined by Unknown and made famous by HNN <g> - "Fear uncertainty and doubt",
            usually in general media articles not high brow articles such as ours or other
            HNN affiliates ;)

    du0d   - a small furry animal that scurries over keyboards causing people to type
             weird crap on irc, hence when someone says something stupid or off topic
             'du0d wtf are you talkin about' may be used.

   *HACKER - Read Stephen Levy's HACKERS for the true definition, then see HAX0R

   *HAX0R - 1 - Cracker, hacker wannabe, in some cases a true hacker, this is difficult to
            define, I think it is best defined as pop culture's view on The Hacker ala
            movies such as well erhm "Hackers" and The Net etc... usually used by "real"
            hackers or crackers in a derogatory or slang humorous way, like 'hax0r me
            some coffee?' or can you hax0r some bread on the way to the table please?'

            2 - A tool for cutting sheet metal.

    HHN    - Maybe a bit confusing with HNN but we did spring to life around the same
             time too, HWA Hax0r News.... HHN is a part of HNN .. and HNN as a proper
             noun means the hackernews site proper. k? k. ;&

    HNN    - Hacker News Network and its affiliates http://www.hackernews.com/affiliates.html

    J00    - "you"(as in j00 are OWN3D du0d) - see 0wn3d

    MFI/MOI- Missing on/from IRC

    NFC   - Depends on context: No Further Comment or No Fucking Comment

    NFR   - Network Flight Recorder (Do a websearch) see 0wn3d

    NFW   - No fuckin'way

   *0WN3D - You are cracked and owned by an elite entity see pheer
   *OFCS  - Oh for christ's sakes

    PHACV - And variations of same <coff>
            Phreaking, Hacking, Anarchy, Cracking, Carding (CC) Groups Virus, Warfare

          Alternates: H - hacking, hacktivist
                      C - Cracking <software>
                      C - Cracking <systems hacking>
                      V - Virus
                      W - Warfare <cyberwarfare usually as in Jihad>
                      A - Anarchy (explosives etc, Jolly Roger's Cookbook etc)
                      P - Phreaking, "telephone hacking" PHone fREAKs ...
                     CT - Cyber Terrorism

   *PHEER -  This is what you do when an ereet or elite person is in your presence
            see 0wn3d

   *RTFM  - Read the fucking manual - not always applicable since some manuals are
            pure shit but if the answer you seek is indeed in the manual then you
            should have RTFM you dumb ass.

    TBC   - To Be Continued also 2bc (usually followed by ellipses...) :^0

    TBA   - To Be Arranged/To Be Announced also 2ba

    TFS   - Tough fucking shit.

   *w00t  - 1 - Reserved for the uber ereet, noone can say this without severe repercussions
            from the underground masses. also "w00ten" <sic>

            2 - Cruciphux and sAs72's second favourite word (they're both shit stirrers)

    *wtf  - what the fuck, where the fuck, when the fuck etc ..

    *ZEN  - The state you reach when you *think* you know everything (but really don't)
            usually shortly after reaching the ZEN like state something will break that
            you just 'fixed' or tweaked.
            
     @HWA            
     
     
                            -=-    :.    .:        -=-
                            
                            
                            

 01.0 Greets!?!?! yeah greets! w0w huh. - Ed
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

     Thanks to all in the community for their support and interest but i'd
     like to see more reader input, help me out here, whats good, what sucks
     etc, not that I guarantee i'll take any notice mind you, but send in
     your thoughts anyway.


       * all the people who sent in cool emails and support
       
     FProphet       Pyra                TwstdPair      _NeM_
     D----Y         Dicentra            vexxation      sAs72
     Spikeman       p0lix  
     
     & Kevin Mitnick (watch yer back)                       
    
     
     Ken Williams/tattooman of PacketStorm, hang in there Ken...:(
          
            
     
     kewl sites:

     + http://www.securityportal.com/ NEW
     + http://www.securityfocus.com/ NEW
     + http://www.hackcanada.com/
     + http://www.l0pht.com/
     + http://www.2600.com/
     + http://www.freekevin.com/
     + http://www.genocide2600.com/
     + http://www.packetstorm.harvard.edu/    ******* DOWN ********* SEE AA.A
     + http://www.hackernews.com/ (Went online same time we started issue 1!)
     + http://www.net-security.org/
     + http://www.slashdot.org/
     + http://www.freshmeat.net/
     + http://www.403-security.org/
     + http://ech0.cjb.net/

     @HWA


 01.1 Last minute stuff, rumours and newsbytes
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

       "What is popular isn't always right, and what is right isn't
         always popular..."
                           - FProphet '99
                           
       

    +++ When was the last time you backed up your important data?
     
     ++ The cDc presentation of Bo2k is available via realplayer here
        pnm://209.207.141.13:17070/defcon7.ram (may or may not work) B-P
        with all the bells and whistles and we b0w to the c0w.. enjoy...
        if anyone has any other feeds for realplayer etc of any of the defcon
        couverage please email in the urls! thanks. this applies to other cons
        too got footage? give us an url and we'll post it...
        
     ++ SDMI SPEC RESTRICTS CD COPYING (TECH. 3:00 am)
        http://www.wired.com/news/news/email/explode-infobeat/technology/story/20716.html

        The new spec designed to control digital music piracy wasn't
        supposed to apply to existing CDs. But one such scheme made
        its way into the final version anyway. By Chris Oakes.
   
     ++ SAN JOSE TOP TECH TOWN (BUS. 9:00 am)
        http://www.wired.com/news/news/email/explode-infobeat/business/story/20732.html

        There are other pretenders to the throne, but Silicon Valley
        still reigns supreme as home to high technology, according
        to a new survey. The surprise is who ranks No. 2.
        
     ++ LASERS POWER WIRELESS NET (TECH. 9:00 am)
        http://www.wired.com/news/news/email/explode-infobeat/technology/story/20731.html

        Lucent Technologies debuts a wireless voice and data network
        that uses lasers and amplifiers to bounce signals to
        rooftop antennas.   
     
     ++  ONSALE, EGGHEAD.COM TO MERGE (BUS. 7:30 am)
         http://www.wired.com/news/news/email/explode-infobeat/business/story/20729.html

         Bigger is better as major competitors eye the computer
         retailing industry. Also: AT&T loses again on cable
         access.... Amazon.com buys into discount sports retailer...
         And more.
       
    ++  Y2K MILITARY MINUTIAE ON TRACK (TECH. 3:00 am)
        http://www.wired.com/news/news/email/explode-infobeat/technology/story/20723.html

        US troops need not worry about Army-issued T-shirts or combat
        boots come 1 January 2000 -- the Department of Defense says
        its logistics computers are all systems go. Declan McCullagh
        reports from Fairfax, Virginia.
 
        
    ++ DR. ROBOT, REPORT TO THE OR (TECH. 3:00 am)
       http://www.wired.com/news/news/email/explode-infobeat/technology/story/20711.html
     
       A new heart surgery procedure using remote-controlled
       robotics could help heart surgery patients to heal faster
       and feel less pain. By Kristen Philipkoski.

     
      Thanks to myself for providing the info from my wired news feed and others from whatever
      sources, also to Spikeman for sending in past entries.... - Ed
      
     @HWA

 01.2 MAILBAG - email and posts from the message board worthy of a read
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
           Reply-To: "WHiTe VaMPiRe" <whitevampire@mindless.com> 
     From: "WHiTe VaMPiRe" <whitevampire@mindless.com> 
     To: "BHZ" <bhz@net-security.org>, <submit@hackernews.com>, <news@darktide.com>, 
             "HWA Staff" <hwa@press.usmc.net> 
     Subject: News Submission 
     Date: Wed, 14 Jul 1999 18:02:10 -0400 
     Organization: Gamma Force -- Project Gamma 
     MIME-Version: 1.0 
     Content-Type: text/plain; 
         charset="iso-8859-1" 
     Content-Transfer-Encoding: 7bit 
     X-Priority: 3 
     X-MSMail-Priority: Normal 
     X-Mailer: Microsoft Outlook Express 5.00.2014.211 
     X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2014.211 
     
     
     -----BEGIN PGP SIGNED MESSAGE-----
     Hash: SHA1
     
     
     Greetings,
     
     
         "Darkridge Security Solutions, the organization providing the hosting
     for Project Gamma, will be relocating their networks. This move could take
     up to a period of one to two weeks. Project Gamma will most likely go down
     July 14. We will be back up as soon as possible. We will continue to update
     the site until it is no longer accessible."
     
     
         I would appreciate it if you people would be kind enough to post
     something regarding this on your Web sites.  For more information view,
     http://www.projectgamma.com/news/071499-1803.html
     
     
     Regards,
         __      ______   ____
        /  \    /  \   \ /   / WHiTe VaMPiRe\Rem
        \   \/\/   /\   Y   /  whitevampire@mindless.com
         \        /  \     /   http://www.gammaforce.org/
          \__/\  /    \___/    http://www.projectgamma.com/
               \/ "Silly hacker, root is for administrators."
     
     
     
     -----BEGIN PGP SIGNATURE-----
     Version: PGPfreeware 6.5.1 for non-commercial use <http://www.pgp.com>
     
     
     iQA/AwUBN40Iz9/q8ZpxA8pfEQKVLwCgxE/unm8/YURl7HgYxtLKq0FugPcAn0Nv
     XJYMWPVRB9sQ3kdJ999Qo17C
     =9/i+
      -----END PGP SIGNATURE-----
      
      
       ================================================================
       
       
      @HWA


 02.0 From the editor.
      ~~~~~~~~~~~~~~~~

     #include <stdio.h>
     #include <thoughts.h>
     #include <backup.h>

     main()
     {
      printf ("Read commented source!\n\n");

     /*
      * Well while people are still recovering from DefCon and
      * the cDc Bo2k release we're chugging along looking for news
      * but we can't always find everything so if you find an
      * article from your local favourite web site remember to mail
      * us the url so we can include the story in the newsletter...
      *
      * hwa@press.usmc.net
      *
      */
      printf ("EoF.\n");
      }

      

      Congrats, thanks, articles, news submissions and kudos to us at the
     main address: hwa@press.usmc.net complaints and all nastygrams and
     mai*lbombs can go to /dev/nul nukes, synfloods and papasmurfs to
     127.0.0.1, private mail to cruciphux@dok.org

     danke.

     C*:.


     @HWA

03.0 AVP releases Bo2K detection July 12th
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
     From www.avp.com;
     
     
     Win32.BO, (Back Orifice Trojan)
                  This trojan can be detected and removed with AntiViral Toolkit Pro
     This trojan is an network administration utility itself that allows to control remove computers on the
     network.  "Back Orifice is a remote administration system which allows a user to control a computer
     across a tcpip connection using a simple console or gui application. On a local lan or across the
     internet, BO gives its user more control of the remote Windows machine than the person at the
     keyboard of the remote machine has"

     The only feature makes this utility to be classified as malicious trojan software - the silent installing
     and execution. When this program runs, it installs itself into the system and then monitors it without
     any requests or messages. If you already have it installed on the computer, you cannot to find this
     application in task list. The trojan also does not manifest its activity in any way.

     The trojan is distributed in a package of several programs and documentation. All programs in
     package were written in C++ and compiled by Microsoft Visual C++ compiler. The date stamp on
     EXE files that we got says that all files in package were compiled at the end of July - first week of
     August 1998. All the programs in package have Portable Executable formats and can be run under
     Win32 only.

     The main executable in package is the BOSERVE.EXE file that might be found with different names
     on infected computer. This is the trojan itself. It is the "server" part of the trojan that might be called
     by clients from remote computer.

     The second file is the BOCONFIG.EXE utility that can configure the server as well as attach it to
     other executable files in the same style as viruses do that. While attaching (infecting) the host file is
     moved down and the trojan code is placed at the top of file. When "infected" files are run, the trojan
     extracts the original file image and spawns it without any side effects.

     There are two "client" parts of the trojan (console and window), they operate with "server" from
     remote computer. Two other executable files in package are used by trojan while
     compressing/decompressing files on "server".

     When the trojan is executed on the computer, it first of all detects its status: is it original trojan code
     or attached to some host file, i.e. modified by the BOCONFIG.EXE utility. In this case the trojan
     locates customized options in the host file and reads them.

     The trojan then initializes the Windows sockets, creates the WINDLL.DLL file in the Windows
     system directory (this file is stored as a resource in the trojan), then gets several KERNEL32.DLL
     APIs addresses for future needs, search for trojan process already run and terminates is (upgrades
     the trojan process), copies itself to the Windows system directory and registers this copy in the
     system registry as the auto-run service:

     HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices

     Creates a TCP/IP datagram socket, assigns a port number 31337 (by default) to this socket and
     opens this port for listening. The trojan then runs standard Windows DispatchMessage loop, i.e.
     stays in Windows memory as a process with hidden attribute (it has no active window and is not
     visible in task manager).

     The main trojan routine then listens for commands from remote client. The commands go in
     encrypted form and starts with the 

     "*!*QWTY?" (without " character) ID-string.

     Depending on the command the trojan is able to perform a set of actions:

     Gets and sends computer name, user name and system info: processor  type, memory size,
     Windows OS version, installed drives and free space on them,

     Shares selected drives

     List disk contents or searches for specific file

     Sends/receives files (reads and writes them), as well as deleting,   copying, renaming and running
     them (including updating itself)

     Created/deletes directories

     Compressed/decompresses files

     Logoffs current user

     Halts the computer

     Enumerates and sends active processes

     Enumerates and connects to network resources

     Terminates selected process

     Gets and sends cashed passwords (passwords that were used), then looks for ScreenSaver
     password (decrypts and sends them)

     Displays message boxes

     Access the system registry

     Opens and redirects other TCP/IP sockets

     Supports HTTP (protocols and emulations) Web-server, so one may access the trojan by Web
     browser

     Plays sound files

     Hooks, stores and sends keyboard input while the user is logging, (see below):

     While installing into the system the trojan creates the WINDLL.DLL file (it keeps this file image in its
     resources). In case of need the trojan loads this DLL into the memory and initializes it, the DLL then
     hooks keyboard and console (device console) input and stores hooked data to the
     BOFILEMAPPINGKEY and BOFILEMAPPINGCON files that are then available for main trojan
     routine.

     The trojan is also possible to expand its abilities by using plug-ins. They can be send to the "server"
     and installed as trojan's plug-in. The features and main functions (including possible malicious ones)
     are on its author responsibility.
     
     @HWA
    
04.0 Back Orifice 2000 Makes Big Waves at Defcon 
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
     From HNN http://www.hackernews.com/

      contributed by Scores 
      Amidst pounding techno music, smashing guitars,
      communist imagery, and spinning logos, the Cult of the
      Dead Cow released BO2K at last weekend's Defcon 7
      conference. 

      The Cult of the Dead Cow
      http://www.cultdeadcow.com
      
      Back Orifice 2000
      http://www.bo2k.com
      
      Microsoft - Security Bulletin. (This is rather funny actually)
      http://www.microsoft.com/security/bulletins/bo2k.asp
      
      CNN
      http://www.cnn.com/TECH/computing/9907/07/nthack.idg/index.html
      
      Phoz.dk - A BO2K Mirror     
      http://phoz.dk/bo2k/
      
      http://home10.inet.tele.dk/uddeler/phoz_dk/speech.mp3
      Full speech of the cDc presentation from DefCon (9M)
      
      Microsoft advisory;
      
      What Customers Should Know About BackOrifice 2000

      BackOrifice 2000; (BO2K) is a malicious program that is expected to be released on or about July 10, 1999. 
      Customers can protect themselves by following normal safe computing practices.

      Although the software has not yet been released, Microsoft is closely monitoring the situation and is committed 
      to providing information that will let customers understand and protect themselves against it when it becomes 
      available.  Following are frequently asked questions about the program.
      
      What is BO2K?
      BO2K is a program that, when installed on a Windows computer, allows the computer to be remotely controlled by
      another user.  Remote control software is not malicious in and of itself; in fact, legitimate remote control 
      software packages are available for use by system administrators.  What is different about BO2K is that it is
      intended to be used for malicious purposes, and includes stealth behavior that has no purpose other than to make 
      it difficult to detect.
      
      What's the danger from it?
      
      When BO2K is installed on a computer, the attacker can do anything that the user at the keyboard could do.  This 
      includes running programs, creating or deleting files, sending and receiving data, and so on.

      How would it get onto my computer?
      
      Like any computer program, BO2K must be installed on the target machine.  BO2K cannot be injected onto your machine.
      There are only two ways it can be installed: By giving the attacker physical access to your logged-on computer.  If
      the attacker learns your password or you leave your logged-on workstation unattended, he or she can install BO2K on
      your machine.

      By tricking you into installing the software.  This is known as a Trojan horse technique.  The attacker might send 
      you an email attachment that claims to be a game but which really installs BackOrifice.
      
      How do I prevent having BO2K installed on my machine?
      
      You don't need to take any extraordinary precautions.  Just follow normal safe computing practices:

      o Never share your password, and always lock your computer when you walk away from it.
      o Never run software from untrusted sources.
      o Always keep your anti-virus and other security software up to date.
      
      If it's on my machine, how do I get it off?

      The makers of anti-virus and intrusion detection software are standing by awaiting its release, and are poised to 
      quickly develop software that will detect and remove BO2K.  Microsoft is working closely with them to assist in this 
      process.  When BO2K's predecessor was released, defenses were available within days, and the same is likely to happen
      with this release.

      Does BO2K exploit any security vulnerabilities in Windows or Windows&nbsp;NT?
      
      No.  Programs like BO2K could be written for any operating system; this one just happens to have been written to run 
      on Windows and Windows&nbsp;NT.  On any operating system, if you choose to run a program, it can do whatever you can
      do.  And if you can be tricked into running a destructive piece of software, it can abuse that capability by erasing 
      data, changing information, or allowing someone else to give it commands.

      Trojan horse software doesn't target technology, it targets the user.  If BackOrifice did in fact exploit security 
      vulnerabilities in Windows or Windows&nbsp;NT, Microsoft would promptly fix the vulnerability, and BackOrifice would 
      be stopped.  Instead, the makers of BackOrifice realized it is easier to target people and trick them into running 
      harmful software than it is to target the technology.

      Is BO2K like the Melissa virus?
      
      Only in the sense that both were Trojan horse programs that performed malicious actions, and neither exploited any 
      security vulnerabilities in Microsoft products.

      What is Microsoft doing about BO2K?

      o Microsoft is closely monitoring the situation, and is committed to helping customers have a safe, enjoyable computing
        experience.

      o Microsoft security experts are standing by, and when the software is released, they will determine exactly how it works
        and what measures can be taken to protect against it
      o Microsoft has worked with other members of the security community&#151;especially anti-virus vendors, intrusion detection
        software vendors, and makers of mobile code security products&#151;and is working closely to ensure that software to detect
        and remove BO2K is available as soon as possible.
      o Microsoft will provide information to customers about the program as more details are known.
  
      -=-
      
      CNN;
      
      New and improved Back
      Orifice targets Windows NT 

      July 7, 1999
      Web posted at: 10:36 a.m. EDT (1436 GMT)

      by Tom Spring 

      (IDG) -- In the consumer world, folks like Ralph Nader fight for consumer rights by
      helping pass tough consumer protection laws. Then there's the PC world. For us, there's
      a  self-proclaimed equivalent:Groups of (mostly teenaged) Hackers basking in the glow of
      computer monitors, who release nasty computer bugs under the guise of strong-arming software
      makers to get tough on privacy and security. 

      "We want to raise awareness
      to the vulnerabilities that exist within the Windows operating system. We
      believe the best way to do this is by pointing out its weaknesses," says a
      member of the hacker group the Cult of the Dead Cow who goes by the
      pseudonym Sir Dystic. 

      The Cult of the Dead Cow created and released the program Back Orifice
      last year to the general public at the Las Vegas hacker and security
      conference DEF CON. The program allows its users to remotely control
      victims' desktops, potentially undetected. 

      At this year's conference, on July 9, Sir Dystic says the cult will outdo itself
      and release Back Orifice 2000. The program, he says, is smaller, nimbler,
      and twice as nefarious. 

      Computer security experts question the Cult of the Dead Cow's intent. Releasing a
      hacking tool like Back Orifice 2000 in the name of safeguarding computer privacy is a
      bit like the American Medical Association infecting cattle with the deadly e. coli bacteria
      to inspire food companies to sell healthier meats. 

      New and Improved

      Unlike earlier versions that affected consumers and small businesses, Back
      Orifice 2000 hits large organizations because it runs on Windows NT systems, which are
      more used by businesses. Also, the updated program is modular, so users can add
      additional functions. For example, they could hide files or activate a computer's microphone
      for real-time audio monitoring, according to Cult of the Dead Cow. 

      Back Orifice 2000 will also be more difficult to detect via network monitoring programs,
      according to Sir Dystic. This is because the program can communicate back
      to the sender by using a variety of different protocols, making it hard to
      identify. The group also says it will make the source code available for Back
      Orifice 2000, which will likely spawn multiple strains of the program in the
      hacker community, experts say. 

      Another purported function is real-time keystroke-logging, which can record
      and transmit a record of every keystroke of an infected computer. Also, the
      recipient can view the desktop of a targeted computer in real time. 

      It should be noted that PC World Online has no independent confirmation
      that new Back Orifice 2000 program actually lives up to the claims of Cult
      of the Dead Cow. 
      
      (hahahaha - nice story, harumph - Ed)
      
      
      NAI Provides Detection Utility 


      contributed by nvirB 
      Network Associates is claiming that they have already
      written a detection utility. This utility claims to be able
      to detect if BO2K is running on your system and is part
      of the NAI Total Virus Defense Suite. 

      A statement released by cDc says that "While Network
      Associates (and other AV vendors) may well protect
      against the specific version of BO2K released at Defcon,
      cDc has said all along that we expect untold mutations
      of the software to be created in a matter of days, and
      seriously doubt they will be able to provide effective
      detection (for all of them)." 

      Network Associates
      http://www.networkassociates.com/asp_set/anti_virus/introduction/back_orifice.asp
      
      SANTA CLARA, Calif., July 10, 1999 � Network
     Associates� (Nasdaq: NETA) Anti-Virus Emergency
     Response Team (AVERT), a division of NAI Labs,
     today advised computer users and network
     administrators to protect their PCs against a new
     Trojan horse called Back Orifice 2000.  Released
     into the wild today, Back Orifice 2000 allows
     hackers to take control of a person�s PC over the
     Internet, but only if the victim has been tricked into
     installing the Back Orifice software on the local
     machine. Users who click on an infected email
     attachment enable the Back Orifice installation, thus
     placing all control over their PCs into the remote
     hacker�s hands.  Network Associates is the first
     anti-virus vendor to make available comprehensive
     protection against the Trojan: the complete Total
     Virus Defense line of virus security products has
     been updated to detect the new Back Orifice
     software in email attachments, and its CyberCop
     intrusion detection products will be automatically
     updated to check for the Back Orifice client
     throughout a network of machines.  

     Symptoms:      

     Back Orifice 2000, the latest in a string of Remote
     Access Trojans (RATs), is a Windows 9x and NT
     program that acts as a hack tool.  When executed,
     Back Orifice turns a user�s system into an open
     client, giving virtually unlimited remote access to the
     system over the Internet.  Anyone remotely running
     the other half of the Back Orifice software can then
     control the user�s computer to do anything they
     could do while sitting in front of it, including reading
     and/or deleting all files on the computer. Back
     Orifice 2000 is virtually undetectable by the user,
     and has been reported as spreading via several
     benign email attachments such as screen savers. 

     Pathology: 

     Back Orifice�s qualities are ever-changing, the result
     of it being open source code released at a hacker
     convention. 

     Risk Assessment: 

     Though Back Orifice 2000 is not technically a virus
     because it does not self-replicate or propagate, it
     has been assessed as a �Medium� threat by
     Network Associates� AVERT risk assessment
     team.  This assessment is due to Back Orifice�s
     destructive qualities, wide exposure, and availability,
     balanced by relatively few outbreaks at customer
     sites and widespread advance notice of the threat.  

     Cure: 

     Detection and cleaning for the Back Orifice 2000
     Trojan horse is now included in Network Associates
     Total Virus Defense suite and will soon be included
     in CyberCop Scanner via Network Associates�
     AutoUpdate feature. To avoid the risk of contracting
     Back Orifice, it is recommended that network
     administrators and users upgrade to the latest
     version of their Network Associates anti-virus
     software.  The most recent protection is available on
     Network Associates� website. 

     With headquarters in Santa Clara, Calif., Network
     Associates, Inc. is dedicated to providing leading
     enterprise network security and management
     software.  AVERT (Anti-Virus Emergency Response
     Team), the anti-virus research division of NAI Labs,
     currently employs more than 85 virus researchers
     and maintains labs on five continents worldwide.  In
     addition to studying new and existing security
     threats, AVERT serves as a global resource for virus
     information and provides rapid, follow-the-sun support
     for virus emergencies worldwide.  Virus Alerts are
     issued as a service to customers from Network
     Associates, the leader in anti-virus detection and
     cleaning technology.  For more information, Network
     Associates can be reached at (408) 988-3832. 

                  
      @HWA

      
     
05.0 Defcon Wrapups
     ~~~~~~~~~~~~~~
     
     http://www.thestandard.net/articles/mediagrok_display/0,1185,5491,00.html?home.mg
     
     What Do Hackers Really Want? 

     It's hard to get a clear picture of what the hackers who met at DefCon in Las Vegas
     over the weekend really wanted. Matt Richtel's New York Times report on the
     drumming of a National Security Council senior director indicated that they wanted
     the government to be more careful in securing its own Web sites. But they also
     wanted to hack into those sites. Oh, and they don't want the government to rely on
     Microsoft (MSFT) software to protect those sites. 

     Bruce Meyerson's AP report in the Washington Post said that members of the
     Cult of the Dead Cow released the cracking software Back Orifice 2000 because they
     wanted to expose security flaws in Microsoft Windows NT software so that Microsoft
     could fix it - presumably so that Microsoft's customers could feel more secure. 

     So ... some hackers want Microsoft's customers to be more secure, while other
     hackers don't want the government to use any Microsoft software. 

     Bob Sullivan's report on MSNBC suggested that they wanted to get together to share
     knowledge about how to commit crimes that none of them will ever actually perpetrate.
     Polly Sprenger's report for Wired suggested that they wanted to get together to watch
     teenage dancers, or maybe to settle online grudges by fighting them out in inflatable
     sumo-wrestler costumes. The Wall Street Journal headlined its Web and print editions
     with a come-on about feds and recruiters invading the conference. But instead of
     summer-movie-like action, John Simons' account yawned over routine conference
     activities: seminars, panels and talking heads. Make that talking feds. Simons
     reported that DefCon organizers regularly broke into panel discussions for a rollicking
     game of "Spot the Fed," which invited attendees to pick out the ubiquitous
     undercover agent in the audience. Winners - both the eagle-eyed attendee and the
     bagged agent - got T-shirts. 

     Sounded like a pretty regular convention, once you got past the black T-shirts and
     tattoos of circuitry. But the real story may happen this week as NT administrators
     watch for evidence of damage from the harmful new program, nicknamed BO2K. If it
     hits hard, the hackers will have proven their point. Which is, well ... something about
     Microsoft. 
     
     -=-
     
      Defcon Stories Cover the Web 

      contributed by Bronc Buster 
      Defcon articles will be popping up around the net for
      next several days or weeks. With over 70 media outlets
      represented at Defcon you can expect to see a lot of
      places that will run stories covering the con. We will link
      to the best of them. 

      Time - Hackers Take Microsoft to School
      http://cgi.pathfinder.com/time/digital/daily/0,2822,27824,00.html
      
      Wired - Covers Day one of Defcon
      http://www.wired.com/news/news/politics/story/20667.html
      
      Wired- Broad overview of the Con
      http://www.wired.com/news/news/email/explode-infobeat/technology/story/20671.html
      
      The Standard- Nice RoundUp of a lot of articles
      http://www.thestandard.net/articles/mediagrok_display/0,1185,5491,00.html?home.mg (above)
      
      ZD Net- Special Report on Defcon
      http://www.zdnet.com/zdnn/special/defcon7.html
      
      ZD Net - Defcon I
      http://www.zdnet.com/zdnn/stories/news/0,4586,2288137,00.html
      
      User Friendly - Wicked funny BO2K related cartoon
      http://www.userfriendly.org/cartoons/archives/99jul/19990711.html
      
      Time;
      
      Hackers Take Microsoft to School
      
     The makers of BackOrifice 2000, one of the
     most powerful hacker tools ever released,
     claim it's for our own good

     FROM WEDNESDAY, JULY 7, 1999
     It's the kind of thing bellboys have nightmares about �
     an entire hotel full of hackers, messing with the
     computers, screwing up the phones and generally
     raising hell. That's the scene at DEF CON, an annual
     hacker convention held at the Alexis Park Hotel in Las
     Vegas. At last year's DEF CON a hacker group called
     the Cult of the Dead Cow released a program called
     BackOrifice that can completely take control of a
     computer over the Internet. This Friday DEF CON 1999
     kicks off, and the Cult of the Dead Cow is back with a
     new version of BackOrifice that's more dangerous than
     ever. Should we be grateful?

                 A little disingenuously, the Cult of the
                 Dead Cow released the original
                 BackOrifice as "a remote
                 administration tool," a simple way of
     operating a computer running Windows 95 or 98 from a
     distance over an ordinary Internet connection. While
     it's possible to imagine scenarios in which having that
     kind of power would be useful � and there are
     legitimate applications that perform similar functions �
     such a tool is obviously very much open to abuse.
     Say, for example, allowing a hacker (or, as malicious
     hackers are sometimes called, a cracker) to take over
     a machine, read your personal information, send e-mail
     under your name and then erase your hard drive.
     Fortunately, BackOrifice has certain weaknesses. It
     can only take over machines on which BackOrifice has
     actually been installed, and once installed, it's not that
     hard to detect and remove.

     According to its creators, the new version of
     BackOrifice slated for release on Saturday is more
     powerful than ever. It's tougher to detect, gives the user
     a greater degree of control over the infected computer,
     and works on Windows NT, the heavy-duty version of
     Windows used by most large businesses. While the
     original version of BackOrifice was a threat to small
     businesses and private users, BackOrifice 2000, as it's
     called, will affect a much broader and more vital sector
     of the world's computers.



     So why does the Cult of the Dead Cow claim they're
     doing it all for our own good � and why do some
     computer programmers agree? To quote from the
     Cult's press release, "BackOrifice 2000 could bring
     pressure on [Microsoft] to finally implement a security
     model in their Windows operating system. Failure to
     do so would leave customers vulnerable to malicious
     attacks from crackers using tools that exploit
     Windows' breezy defenses." In other words, don't
     blame us, blame Microsoft for making a shoddy
     product � now maybe they'll improve it. As one poster
     on a hacking bulletin board wrote, "I feel better
     knowing that at least these holes will be known
     publicly and raise some sense of awareness rather
     than in a closed private environment where exploitation
     could continue unfettered."

     Not everybody agrees, but you can bet that Microsoft
     � currently at work on a new version of Windows
     largely based on NT � will be downloading a copy of
     BackOrifice 2000 and studying it closely. As the Cult
     of the Dead Cow � which claims to be one of the few
     hacker groups out there to include a female member
     � puts it, "Information is a virus. And we intend to
     infect all of you."
     
      
     
     @HWA

06.0 l0pht announces Antisniff 
     ~~~~~~~~~~~~~~~~~~~~~~~~~
     
     contributed by Weld Pond 
     L0pht Heavy Industries announced at Defcon a
     revolutionary new proactive tool that will assist IT
     Managers in protecting their networks. Antisniff will be
     able to scan for NIC cards that have been placed into
     promiscuous mode. While this will enable Admins to
     determine what machine may have been compromised it
     will also allow intruders to find a company's IDS system.
     L0pht will release full details on how this product works
     to the public in the form of a white paper. They hope to
     have the white paper and the software ready to
     distribute within a few weeks. 

     NY Times
     http://www.nytimes.com/techweb/TW_Hacker_Think_Tank_To_Unleash_Anti_Sniff_Tools.html
     
     L0pht Heavy Industries  
     http://www.l0pht.com
     
     NYTimes;
     
     July 9, 1999


     Hacker Think Tank To Unleash Anti-Sniff
     Tools

     Filed at 9:31 a.m. EDT

     By Rutrell Yasin for InternetWeek, CMPnet

     A Boston-based hacker think tank on Friday will
     unveil software that can detect whether or not
     Sniffer-type analyzers are being used to probe
     enterprise networks.

     L0pht Heavy Industries will introduce AntiSniff
     1.0 at DefCon, an annual hackers' convention.

     A typical way for hackers -- both black-hat and
     ethical -- to gain access to an organization's
     network is to use analyzers that can sniff or probe for passwords for
     networked systems.

     While many scanning tools can probe networks to expose potential
     vulnerabilities, they don't give IT managers a clear sense of whether or
     not systems have been compromised or broken into, said L0pht's chief
     scientist, who goes by the name Mudge.

     AntiSniff is designed to help IT managers be more proactive in thwarting
     security threats, Mudge told a gathering of security managers and experts
     today at The Black Hat Briefings.

     "Don't play reactive," Mudge said. "There are new ways to look for [new
     attack] patterns."

     L0pht said it plans to release all technical details for AntiSniff to the
     public .

     But the monitoring software carries a doubled-edge sword.

     While it can be used by "good guys" to thwart network intruders, it can
     also be used by the "bad guys" to sniff out a company's network intrusion
     systems, Mudge said. 

     (c) 1999 CMP Media Inc. 

     @HWA

 07.0 Bruce Schneier: PPTPv2 'sucks less' 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
      From HNN http://www.hackernews.com/  

      contributed by Dr. Mudge 
      A security paper released by Bruce Schneier of
      Counterpane Systems, and Mudge, from L0pht Heavy
      Industries covers the new version of Microsoft PPTP.
      The paper says that while the VPN product, that ships
      free with NT, is better than a previous version it still has
      serious problems. (The good info is down in the middle
      of the ZD article.) 

      ZD Net
      http://www.zdnet.com/zdnn/stories/news/0,4586,2290399,00.html
      
      Cryptanalysis of Microsoft'9s PPTP Authentication
      Extensions (MS-CHAPv2)   
      http://www.counterpane.com/pptp.html
       
      ZDNet; (reprinted from last issue)
      
      
      --------------------------------------------------------------
      This story was printed from ZDNN,
      located at http://www.zdnet.com/zdnn.
      --------------------------------------------------------------
      
      Security expert blasts shoddy software
      By Robert Lemos, ZDNN
      July 8, 1999 2:00 PM PT
      URL: http://www.zdnet.com/zdnn/stories/news/0,4586,2290399,00.html
      
      LAS VEGAS -- Security experts and so-called "white-hat" hackers meeting at the Black Hat
      Security Conference lambasted current corporate security and the companies that make security
      products that are anything but. 
      
      "Do hackers have root [control] of all your systems? Well, yes, they do," said Mudge (an
      old-school hacker who does not give out his real name), the head of L0pht Heavy Industries -- a
      collection of hackers bent on improving the Internet's security -- during a Thursday keynote. The
      security "firm" accepts contracts from companies to break into systems as well as to write security
      products. 
      
                            Mudge's comments hit on a common theme at security conferences --
                            that, in the rush to beat competitors to market, product security plays
                            second fiddle to adding new (and possibly insecure) features. 
      
                            The solution: Don't let software vendors hide behind licenses that
                            stipulate that software is sold "as is." 
      
                            Liability the key
      "We need to hold all these software vendors liable," said Mudge. "But as soon as you say the
      word 'liability,' software lobbyists hit Washington to prevent any legislation." Instead, the security
      world needs to design incentives for software makers to test and certify their security, he said. 
      
      Mudge testified in front of the Senate last year to garner support for better security and to criticize
      the Digital Millennium Copyright Act, which was a piece of legislation that would have had the
      unintended consequence of making it illegal to test security products. 
      
      Rebecca Bace, president of security penetration testing firm Infidel Inc., agreed with his criticism
      of the software industry. "We really need methods to push for software quality," she said. She
      pointed out examples of major security flaws in many products from Microsoft Corp.
      (Nasdaq:MSFT), including SiteServer 3.0, Windows NT and demo code that ships with IIS 4.0. 
      
      Microsoft a popular topic
      In fact, pounding on Microsoft's insecurities became a common theme at the conference as well. 
      
      On Wednesday, Mudge and noted cryptographer Bruce Schneier, president of Counterpane
      systems, published a paper critical of Microsoft's software for creating virtual private networks.
      VPNs use encryption to create secure channels across insecure networks like the Internet. 
      
      However, Microsoft's protocol -- known as PPTP and included free with Windows NT --
      creates virtual private networks that can be hacked, said both Mudge and Schneier. 
      
      "If security actually matters, (Microsoft's product) is unacceptable," said Schneier, who is
      frequently contacted by companies to test the security of encryption software. 
      
      A year ago, Mudge and Schneier released a paper on the original Microsoft PPTP software. At
      that time, Schneier called Microsoft "security charlatans" and pointed out that the encrypted
      network created by the software could be easily broken. 
      
      Schneier: PPTP 'sucks less'
      Today, the situation is a bit better, he admitted, adding that Microsoft fixed the most major issues.
      "It sucks less," he said. "Before you had something that was completely broken, but now it's a bit
      better." 
      
      Microsoft could not be reached for comment by press time. However, a Microsoft Network
      administrator at the conference, who asked to remain anonymous, pointed out that other operating
      systems have just as many problems. 
      
      "Every distribution of Linux, and Sun's Solaris, have all had just as many security holes," he said,
      adding that like Windows 2000's much-criticized code bloat (it's up to 40 million lines), Linux and
      Solaris have been growing bigger. 
      
      During his keynote, Mudge relented to some degree as well. "I use Microsoft as an example,
      because everyone knows them," he said. "Others have these problems as well." 
      
      Until we get them fixed, we can look forward to more break-ins, Web defacements, and perhaps
      worst of all, viruses, said Infidel's Bace. "Melissa and ExploreZip only begin to scratch the tip of
      the iceberg," she said.      
      
      -=-
      
      
                                                         Press Release
      
                                                               June 1, 1998
      
        CONTACTS:
        Bruce Schneier
        Counterpane Systems
        612.823.1098 (voice)
        612.823.1590 (fax)
        schneier@counterpane.com (email) 
                                                                       Lori Sinton
                                                                       Jump Start Communications, LLC
                                                                       408.289.8350 (voice)
                                                                       408.289.8349 (fax)
                                                                       lori@jumpstartcom.com (email) 
      
      
                   SECURITY FLAWS FOUND IN MICROSOFT'S IMPLEMENTATION OF
                                POINT-TO-POINT-TUNNELING PROTOCOL (PPTP)
      
            Companies using Microsoft products to implement their Virtual Private Networks (VPNs) may find that their networks are not so private
      
      MINNEAPOLIS, MN, June 1, 1998. Counterpane Systems today announced that it has discovered flaws in Microsoft's implementation of a communications
      protocol used in many commercial VPNs. These flaws lead to password compromise, disclosure of private information, and server inoperability in VPNs running
      under Windows NT and 95. 
      
      "PPTP is an Internet protocol designed to provide the security needed to create and maintain a VPN over a public Transmission Control Protocol/Interface Protocol
      (TCP/IP) network. This raises serious concerns as most commercial products use Microsoft's Windows NT version of the protocol. While no flaws were found in
      PPTP itself, several serious flaws were found in the Microsoft implementation of it. 
      
      "Microsoft's implementation is seriously flawed on several levels," according to Bruce Schneier, President of Counterpane Systems. "It uses weak authentication and
      poor encryption. For example, they use the user's password as an encryption key instead of using any of the well-known and more secure alternatives," explained
      Schneier. 
      
      "VPN implementations using PPTP products require management control software at both ends of the tunnel, as well as a cryptographic analysis of the system," said
      Wray West, Chief Technology Officer of Indus River Networks, a supplier of remote access VPNs. "Most implementors do not have the specific in-house
      cryptographic expertise to discern the subtleties that are often the root of security breaches in today's commercial servers. They rely on their vendors and information
      security providers to build robust, secured products," observed West. 
      
      According to the team that did the cryptanalysis, there are at least five major flaws in this implementation. They are: 
      
           password hashing -- weak algorithms allow eavesdroppers to learn the user's password 
           Challenge/Reply Authentication Protocol -- a design flaw allows an attacker to masquerade as the server 
           encryption -- implementation mistakes allow encrypted data to be recovered 
           encryption key -- common passwords yield breakable keys, even for 128-bit encryption 
           control channel -- unauthenticated messages let attackers crash PPTP servers 
      
      A host of additional attacks were identified including bit flipping, packet resynchronization, passive monitoring of Microsoft's PPTP, and PPP (point-to-point
      protocol) packet negotiation spoofing�all further compromise the intended security of any VPN. The cryptanalysis work on Microsoft's implementation of PPTP
      was conducted by Bruce Schneier of Counterpane Systems and expert hacker Peter Mudge. 
      
      According to Mark Chen, CTO of VeriGuard, Inc, a Menlo Park based computer security company, "The flaws in this implementation are quite amateurish." Chen
      continued, "A competent cryptographic review would have prevented the product from shipping in this form." 
      
      "This should serve as a caution to VPN implementors and users," said David Wagner, graduate student of University of California at Berkeley. "There are a lot of
      corporate security officers out there who will be very glad the 'good guys' found this first," continued Wagner. Last year, Wagner, along with Bruce Schneier and
      John Kelsey of Counterpane Systems, discovered a major flaw in the privacy protection used in cell phones. 
      
      Counterpane Systems is a Minneapolis, MN-based consulting firm providing expert consulting in cryptography and computer security issues. The firm has consulted
      for clients on five continents. Counterpane's president, Bruce Schneier, invented the Blowfish encryption algorithm, which remains unbroken after almost four years
      of public testing. Blowfish has been incorporated into dozens of products, including Symantec's Your Eyes Only and McAfee's PCCrypto. Schneier is also the
      author of five books on cryptography and computer security, including Applied Cryptography, the definitive work in this field. He has written dozens of magazine
      articles, presented papers at major international conferences, and lectured widely on cryptography, computer security, and privacy. 
      
      -=-
      
      @HWA
      
 08.0 1000 copies of Freedom Beta2 Released 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/

      contributed by Dov Smith 
      Zero-Knowledge Systems released 1000 copies of Freedom Beta2 this past weekend at Defcon 7, the
      computer industry's most eccentric annual conference.Freedom is an Internet privacy technology that will
      allow users to communicate over the internet in complete anonymity. Zero-Knowledge hopes to
      introduce an open beta of Freedom later this summer. 

      Zero Knowledge Systems 
      http://www.zks.net/clickthrough/click.asp?partner_id=542
      
      @HWA
      
 09.0 DefCon Web Page Defaced on Opening Day of Con 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      (As reported last week while HNN were at the Con HNN picks up the story - Ed)
      
      contributed by Code Kid 
      As Kevin Poulsen was giving the opening speech at Defcon 7, people from the group known as ADM Crew
      where defacing the main Defcon web page. 

      C|Net
      http://www.news.com/News/Item/0,4,0-38970,00.html?st.ne.lh..ni
      
      HNN Cracked Pages Archive      
      http://www.hackernews.com/archive/crackarch.html
      
      Hackers attack their own kind 
     By Tim Clark
     Staff Writer, CNET News.com
     July 9, 1999, 4:25 p.m. PT 

     update On the opening day of its annual hacker convention in Las Vegas, somebody hacked DefCon's Web site. 

     Instead of describing DefCon's seventh annual "computer underground party for hackers," the bogus page declared the show had
     been taken over by the ADM Crew and renamed to ADM Con. 

     "Can't make it to DefCon?" reads one entry. "No problem, Delta Airlines is willing to sell you expensive business class tickets for
     twice their value." 

     Jeff Moss, creator and producer of the DefCon event, took the hack good-naturedly. 

     "It's funny, it happens, I'm an unhappy client [of the service that hosts the page]", Moss told a press conference late this
     afternoon. "All we can tell is that ADM is a European hacker group. They weren't very malicious, they were cracking jokes and
     zapping me because the conference was held at place they couldn't come to." 

     The hacked page also spoofs the most anticipated news from the real event, tomorrow's scheduled release of a new version of
     Back Orifice. 

     "Cult of the Dead Cow will announces [sic] new remote administration tools for kids!" the bogus site claims. Back Orifice is a
     potentially destructive Trojan horse for opening security holes in computer networks running Microsoft's Windows NT operating
     systems. 

     "The president and vice president will be there for autographs and more," according to the hacked page, which links to the official
     White House Web site. 

     So far no one has publicly claimed responsibility for the hack, but a note in the page's HTML source reads: "This is an
     anonymous member of the ADM Crew. Well, I couldn't make it to DefCon this year, you know how expensive everything is these
     days...so sorry, but it looks like revamping this site was really too tempting for me." 

     The author adds what he or she calls the ADM motto: "You're lucky we're whitehats," which is a reference to being "friendly," not
     nefarious, hackers. There's also a hint of a German connection, citing the private annual ADM party in Berlin August 6 to 8. 

     A time stamp on the page indicates the hack was posted around 12:45 p.m. PT. As of 5:30 p.m. PT, the hacked version
     remained in place. 

     Moss said the hackers broke into the DefCon page about two weeks ago and compromised the Web server at the commercial
     hosting service where DefCon has had its page for five years. But the page wasn't changed until today. 

     "I'm not quite sure how it happened," Moss added, saying he was busy protecting the Web site for a parallel Black Hat show that
     just ended and didn't guard his own site. 

     The hacked ADM Con page indicates it will soon be mirrored at Attrition.org's hacked Web pages archive, to be retained for
     posterity. 

      
      @HWA
      
 10.0 Capture the Flag Logs Available from DefCon
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/

      contributed by Ron Gula 
      The folks at Security Wizards took their Dragon IDS to
      Defcon and let people pound on it for three days. They
      have posted over 200MB of logs from the contest up on
      their web site. There is some neat stuff in there. They
      plan to have TCPDUMP versions up soon. 

      Security Wizards
      http://www.securitywizards.com
      
      (Check out these logs people w1tn3ss the tekn1q... - Ed)
      
      @HWA
      
 11.0 Mitnick Sentencing Delayed, Again 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 
      
      From HNN http://www.hackernews.com/

      contributed by Code Kid 
      Kevin Mitnick had been scheduled to be sentenced on
      July 12th. That hearing has now been postponed until
      July 26th. The issue is restitution. The prosecution
      wants $1.5 million while the defense wants $5,000. The
      defense claims that there is no way that Kevin will be
      able to earn 1.5mil, especially since he will be banned
      from touching a computer. 

      ZD Net
      http://www.zdnet.com/zdnn/filters/bursts/0,3422,2292504,00.html
      
      Free Kevin 
      http://www.freekevin.com
      
      03:21p
      Mitnick sentencing postponed
      LOS ANGELES -- The sentencing of convicted hacker Kevin Mitnick was postponed until Monday July 26,
      after talks broke down on the issue of restitution. The government is asking for Mitnick to be 
      responsible for restitution on the order of $1.5 million, while the defense is asking for payments 
      on the order of $5,000, based on his projected earnings potential during his supervised release. He
      will not be able to use a computer during that three year-period. -- Kevin Poulsen, ZDNN 
      
      @HWA
      
 12.0 Short explanation of NT related acronyms by StEa|_th
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      From http://www.403-security.com/
      
 
       Small Orology by StEa|_th
      
      
      Active Server 
      A collection of server-side tecdhnologies that are delivered with Windows
      NT. These technologies provide a consistent server-side component and
      scripting model and an integrated set of system services for component
      application management, database access, transactions, and messaging. 
      ADO 
      Active Data Object. A set of object-based data access interfaces optimized
      for Internet-based, data centric applications. ADO is based on a published
      specification and is included with Microsoft Internet Information Server and
      Microsoft Visual InterDev. 
      ASP 
      Active Server Pages. A Server side scripting enviorment that runs ActiveX
      scripts and ActiveX components on a server. Developers can combine
      scripts and components to create Web-based applications. 
      CGI 
      Common Gateway Interface script. A program that allows a server to
      communicate with users on the Internet. For example, when a user enters
      information in a form on a Web page, a CGI script interpets the information
      and communications it to a database program on the server. 
      COM 
      Component Object Model. The object-oriented programming model that
      defines how objects interact within a single application or between
      applications. In COM, client software accesses an object through a pointer
      to an interface--a related set of funcations called methods--on objects. 
      DAO 
      Data Access Object. 
      DNS 
      Domain Name System. A protocol and system used throughout the Internet
      to map Internet Protocal (IP) addresses to user-friendly names. Sometimes
      referred to as the BIND service in BSD UNIX, DNS offers a static,
      hierarchical name service for TCP/IP hosts. The network administrator
      configures the DNS with a list of host names and IP addresses allowing
      users of workstations configured to query the DNS to specify remote
      systems by host name rather than IP address. 
      DSN 
      Data Source Name 
      FTP 
      File Transfer Protocal 
      IDC 
      Internet Database Connector 
      IIS 
      Internet Information Server 
      ISAPI 
      Internet Server Application Procedural Interface 
      ODBC 
      Open Database Connection 
      RDO 
      Remote Data Object 
      
      Copyright 1999(c) www.security.org
     
 13.0 BO2K Defcon Presentation on RealVideo 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

      From HNN http://www.hackernews.com/

      contributed by Kill-9 
      If you missed the pounding techno, and the flashing
      lights of the BO2K presentation at Defcon 7 it has been
      made available on RealVideo. 

      Uberspace
      http://www.uberspace.com

      Defcon Pics
      And if you missed Defcon completely you can get a
      small feel of what it was like from this picture archive. 

      Defcon Picture Archive
      http://www.303.org/pics/Defcon7/
      
      @HWA
      
      
 14.0 Defcon News Roundup 
      ~~~~~~~~~~~~~~~~~~~ 

      From HNN http://www.hackernews.com/

      contributed by Space Rogue 
      There are Defcon and BO2K news articles all over the
      web. Most of them are full of FUD. We don't have time
      to list them all but these two are definitely worth
      reading. 

      MSNBC - Ignore Defcon at Your Own Risk
      http://www.msnbc.com/news/289125.asp

      ZD Net - Back Orifice Is Your Friend         
      http://www.zdnet.com/zdnn/stories/comment/0,5859,2292276,00.html
      
      MSNBC;
      
      Should you care about DEF CON?
               It�s more than fun, games, and irreverence; 
               hacker convention offers up annual warning
                                                                      MSNBC

               July 12 � You might be inclined to dismiss last
               weekend�s DEF CON conference as a collection of
               angst-ridden, troublemaking youths. And many of
               the hackers will help you to that conclusion � the
               extremist positions, the relentless electronic
               pranking, the irreverent insults, the blue hair. But
               make no mistake: These are not adolescent punk
               rockers who will soon grow out of a phase and go
               to work for IBM. Scratch below the surface, and
               you�ll find a crowd of geniuses, many playing the
               part of guardian angel of the information age.
               Ignore them, and their anything-but-sugar-coated
               message, at your own peril.
               
                     WE ALL KNOW that using the Internet you can
     connect to information on computers all around the world.
     But that also means almost any computer around the world
     can connect to you. Feel invaded? This is just the beginning.
     Soon, your pager, your cell phone, your VCR, your car, your
     watch � they�ll all be connected. And that means they can
     all be invaded.
            Computer security isn�t sexy, and it doesn�t sell, but
     someday you�ll think about it as much as you think about
     locking the front door. 
            It�s already that important to hackers, who live and
     breathe computer security. Their ranks run a confusing
     continuum from stodgy, conservative Army M.P. types who
     would never hurt a fly unless ordered, to reckless geniuses
     who aim to steal thousands of credit card numbers. For the
     record, hackers like to call those who engage in criminal
     activity �crackers� and reserve the term hacker for
     well-intentioned people out only to find out how things work.
     Careful how you use those terms; hackers now have the
     hypervigilance of any extremist special interest group. 


           In between the two extremes are several shades of
     gray, such as:
       Groups that hunt for computer vulnerabilities, then publish
     them to embarrass software companies such as Microsoft
     into fixing their products. 
       Groups that write tools to enable well-intentioned and
     ill-minded hackers alike, such as the Cult of the Dead Cow
     and its Back Orifice product. 
       Groups that perform criminal but relatively harmless
     hacks, such as defacing a Web page.
            All these groups find their home once a year at DEF
     CON.
            They dressed in black, swallowed caffeine straight (at
     least I think it was caffeine), stayed up all night, talked about
     rebellion a lot, held hacking competitions and tried to keep
     each other from breaking too many things. 
            Most of the attention was centered on the release of
     Back Orifice 2000, the best publicity stunt in the history of
     hacking. As far as the general public is concerned,
     platitudes aside, BO is a bad thing. That only reinforces the
     image of hackers as bad people, teen-agers bent on
     destruction, geniuses gone bad, screwing with the world�s
     information infrastructure. They could steal your credit card,
     filch money from your bank account, even start a cyberwar.
     Advertisement


           This image is unfortunate and serves to obscure the
     very real issues hackers seek to expose. It isn�t necessarily
     wrong; just incomplete. Let me try to fill it in.
            
     HACKERS IN REAL LIFE
            When he�s not at DEF CON, HackerDude�s hair isn�t
     blue. And far from being reckless and emotionally unstable,
     HackerDude is Bill Smith, overly fastidious network
     administrator at Newbie Inc. Newbie�s 500 employees,
     whose job is to sell Plexiglass, hate computers. They get
     frustrated when computers crash, lose data, or when they�re
     hard to use. And so Newbie workers tend to be careless.
     They put their login password on a sticky note on their
     computer monitor. They put their corporate computer
     dial-in number on a notebook and leave it in a hotel room.
            Mr. Smith, or HackerDude, can�t stand this. It�s his
     job to keep Newbie�s computers safe; that makes Newbie
     Inc. employees the enemy. 
            Meanwhile, employees think Mr. Smith is just an
     annoying Nervous Nellie, or even an obstacle. 
            And so the network administrator goes on preaching
     and getting frustrated. He can only pick up after his clients�
     mistakes for so long. He knows someone out there with bad
     intentions will eventually break in, with disastrous
     consequences, and he�ll lose his job � in fact, a �white hat�
     hack, which exposes the vulnerabilities but doesn�t result in
     any damage or theft, might be the best thing that could
     happen. 
            He�s unpopular, annoying and preaching a religion no
     one wants to hear. 

     
            Cut to Vegas in the summer: 3,000 like-minded
     computer security nuts � some hackers, some crackers,
     some in between. But all of them have a respect for
     technology, they share in the extreme rhetoric of free
     speech, and none of them leaves his password on sticky
     notes (OK, almost none of them). And they all hate �stupid
     people,� or put more elegantly, the fact that graphic
     interfaces have tricked people into thinking computers are
     easier and safer to use than they really are.
            At DEF CON, for perhaps the only time all year, Mr.
     Smith, a.k.a. HackerDude, doesn�t feel alone. 
            
     THEIR MESSAGE
            See, there�s one thing everyone in the security business
     � hackers, crackers, virus writers, anti-virus companies:
     Security doesn�t sell. Regular computer users are annoyed
     by logins and passwords, by firewalls, by extra dialog
     boxes. In the battle of security vs. features, in the consumer
     marketplace, security always loses. 
            This is sacrilege to a hacker, who knows what�s
     possible, just like it�s sacrilege for a doctor to watch
     someone leave a public bathroom without washing their
     hands.
            But hackers take no Hippocratic oath (the physician�s
     pledge to do no harm, respect privacy, etc.), and they have
     discovered that while one e-mail complaint to Microsoft
     might get little attention, defacing a government Web page
     can garner a front-page story. So armed with
     self-righteousness, an extra helping of sarcasm, caffeine,
     free time and sometimes good intentions, they set out to
     break things to force other companies to fix them.
            
     WHAT THEY DO AT DEFCON
            At DEF CON, sure, you�ll hear seminars on the
     simplest ways to bring down a Web server (and almost
     constant giggling with each PowerPoint slide). But you�ll
     also hear from law enforcement agencies (and even the
     White House), which have learned to take hacker groups
     seriously. 
            Like all conferences, you�ll hear a lot of
     locker-room-style banter about the year�s dirtiest deeds. 
            But talk to the right people, and you�ll get an earful
     from groups such as L0pht Heavy Industries, trying to raise
     awareness that the most devastating hacks are inside jobs,
     even though silly Web page defacements get all the
     attention. 
            Even the Cult of the Dead Cow, which does its best to
     maintain its reckless, bad boy image in public, has a softer
     side. Sir Dystic, author of the original Back Orifice, is
     working on a tool called CDC Protector that will allow Net
     users to execute Trojan horse programs without threat of
     infecting their machines. The Trojan will be �quarantined� in
     its own memory space. 
            Of course, it got little of the attention that Back Orifice
     2000 received at DEF CON. Why? The raucous release
     ceremony, the cult following, the chance to flog Microsoft in
     public are just too irresistible for the group. (�This is just so
     much fun,� said one member to me).
            
     DON�T BE CONFUSED
            I was told again and again that real criminals don�t go
     to DEF CON; they don�t show their faces in a place where
     they know federal agents are lurking, and they don�t need to
     learn how to hack. 

            But that doesn�t mean DEF CON doesn�t attract those
     who live very near the edge, and that there isn�t a lot of
     information handed out with a wink and a disingenuous
     disclaimer like, �Don�t use this for illegal purposes.�
            But it�s just as easy to find �reformed� computer
     intruders, those who have grown out of the thrill of breaking
     into Web sites. This creates an uneasy tension over some
     gatherings, as the more �conservative� hackers slip in points
     of perspective (albeit, gently) whenever possible. Like
     �Attitude Adjuster,� a former virus writer who said he�s
     alarmed at the power that virus writers have today.
            DEF CON is a gathering in transition, I�m told. It might
     be getting too big for its britches. This year it drew perhaps
     3,000 attendees; it�s so large that a big Las Vegas PR firm
     was hired to usher press around � hardly the thing for an
     underground group. There�s even been a bit of an
     embarrassment for the Cult of the Dead Cow � 48 hours
     after the release ceremony, the tool wasn�t available on the
     group�s Web site. Copies of it were being distributed
     around the Net, but at least some are infected with the CIH
     virus.
            
     NOT ALL BAD OR ALL GOOD
            Just like in real life, all hackers aren�t bad, or good, or
     neutral. But they are smart, often annoying, they�re starting
     to get our attention, and they do have an important message:
     neglect computer security, and something bad will eventually
     happen to you. 
     
        They might even be the ones to do it.
        
        
     @HWA
     
 15.0 Computer Experts Will Form the Frontline of Sweden's Defense 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

      From HNN http://www.hackernews.com/
      

      contributed Maxim Glory 
      Swedish minister of defense, Bj�rn von Sydow, wants to
      introduce military units consisting of "computer freaks",
      able to defend Sweden in the event of a computer
      based attack, as well as launching a preemptive strike
      at the enemy if necessary. They will be a different kind
      of soldier, not your average grunt, but they can still
      play an important military role, said Bj�rn von Sydow.
      According to SVT-text these "soldiers" will be recruited
      through the obligatory military service. 

      Spray - Sorry, Swedish Only 
      http://www.spray.se/nyheter/index.jsp?cat=6&nr=7
      
      @HWA
      
 16.0 Canadians Plan a Information Protection Centre 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

      From HNN http://www.hackernews.com/

      contributed by dis-crete 
      The Canadian government is planning a national
      Information Protection Centre to co-ordinate its cyber
      security defenses. The provinces involved in the
      initiative are Ontario, Quebec, Manitoba, Alberta and
      British Columbia. The national Information Protection
      Centre will be used as a means to spread information,
      protect government systems, and to help the private
      sector against viruses and attempts to break into
      computer systems. 

      The Globe and Mail     
      http://www.globeandmail.com/gam/National/19990712/UCOMPM.html
      
     National centre planned to fight computer hackers
     Manitoba leads bid to protect nation's networks

     RICHARD MACKIE
     The Globe and Mail
     Monday, July 12, 1999

     Toronto -- Canadian governments plan to step up efforts to protect their computer systems against increasing
     attempts to break into them, with plans to establish a national Information Protection Centre to co-ordinate the
     defences.

     The need for the centre is growing rapidly as access to so-called hacker technology spreads and as
     governments' reliance on computers expands, said Robert Garigue, chief technology and information officer
     for Manitoba, which is leading the organization of the new centre.

     The other provinces involved in the initiative are Ontario, Quebec, Alberta and British Columbia.

     There is also rising pressure on governments to assure customers and citizens that the data on government
     computer systems is secure, said Scott Campbell, head of Ontario's information technology systems.

     Governments want to increase the use of computers to deliver services, he said. But potential customers "are
     saying we have to tackle the privacy issue and the security issue if we're going to fundamentally move forward
     aggressively on electronic service delivery."

     He said "no one's going to play ball" if governments can't guarantee the security of data and transactions
     delivered electronically.

     The national Information Protection Centre will also help strengthen the defences of computer systems in the
     private sector against viruses and attempts to break in to acquire data or damage the systems, Mr. Garigue
     said.

     The centre would provide a single location where those responsible for the security of individual computer
     systems could report illicit attempts to enter their systems, learn whether an attempt was part of a larger
     pattern, and obtain assistance in defending their systems.

     Its creation is the extension of an agreement among the chief information-technology officers of several
     provinces that each province should establish its own information-protection centre. The agreement was
     extended into a nationwide pact, which included the federal government, in May.

     A report by Mr. Garigue and his Manitoba officials last month marked a shift in the concept of information
     protection, making it a focus of each government's information-technology organization rather than an
     afterthought to be dealt with through technology such as virus scanners and firewalls.

     Mr. Campbell said because government computers are linked to the Internet, there would be limited benefits if
     the provinces and the federal government each had its own information-protection centre.

     "We live in a network-centred world. One security problem in one part of the country is a security problem in
     another part of the country. If something is in Alberta in the morning, it's in Ontario in the afternoon."

     @HWA 
     
 17.0 Y2K Commission May Be Renamed Security Commission 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

      From HNN http://www.hackernews.com/

      contributed by Modify 
      The chairman of the Senate's Special Committee on the
      Year 2000 Technology Problem, Sen. Bob Bennett
      (R-Utah), and Senate Majority Leader Trent Lott
      (R-Miss.) have held informal discussions about the
      possibility of changing the committee's mission when its
      current authority expires Feb. 29, 2000. The new
      mission if adopted would direct the commission to focus
      on government computer security. 

      Federal Computer Week    
      http://www.fcw.com/pubs/fcw/1999/0705/fcw-newsy2k-7-5-99.html
      

      JULY 5, 1999 
 
 
      Y2K panel to shift to security
 
      BY DIANE FRANK (diane_frank@fcw.com)
 
      With agencies nearing completion of fixing
      computers to avoid the Year 2000 problem, Senate
      leaders are considering shifting the focus of the
      special Year 2000 oversight committee to what
      many government officials see as the next big threat
      to government computers: security breaches and
      cyberterrorism.
 
      Since its creation in April 1998, the Senate's Special
      Committee on the Year 2000 Technology Problem
      has studied the impact of the Year 2000 computer
      problem on government and the private sector and
      has recommended legislation and other action.
 
      The committee has focused on the potential impact
      of computer or network failures on banking,
      transportation, utilities and other components of the
      nation's critical infrastructure.
 
      The committee chairman, Sen. Bob Bennett (R-Utah), and Senate Majority
      Leader Trent Lott (R-Miss.) recognize that security vulnerabilities in networks
      and computer systems pose a similar threat, as they are subject to attacks
      from personnel within agencies or from outside cyber-terrorists, according to
      a committee spokesman.
 
      The senators have held informal discussions about the possibility of changing
      the committee's mission when its current authority expires Feb. 29, 2000, the
      committee spokesman said.
 
      "There are several similar issues and problems that will be faced," he said.
      "The kernel of the idea was generated internally by people here at the
      committee who were examining critical infrastructure."
 
      Several high-level federal groups and organizations, including the Critical
      Infrastructure Assurance Office and the National Infrastructure Protection
      Center at the FBI, also focus on computer security and the integrity of the
      nation's infrastructure against attacks.
 
      But the government would benefit from congressional attention, said Olga
      Grkavac, executive vice president of the Information Technology Association
      of America's Enterprise Solutions Division.
 
      "There really is a link between information infrastructure [and] critical
      infrastructure in [Year 2000 and security issues] and the hearing track record
      that the committee has built up," she said. "The experience the members now
      have would be a big plus."
 
      A Senate committee would bring an extra level of discussion to what other
      groups on security and critical infrastructure around the government have
      raised because the committee could focus on policy and legal questions that
      have come up, said Dean Turner, information security analyst with
      SecurityFocus.com. "The technology is there to do these things, now the
      policy and the law have to catch up with it," he said. 
 
      It is important for the committee to look at more than just instances of World
      Wide Web site hacking, Turner said. Even though that is the phenomenon
      creating the biggest stir right now, it is the least harmful type of attack out
      there. "I think that if that's what the committee is going to focus on, then they'll
      be wasting their time," he said.
 
      Much of the committee's initial focus should be to educate government and the
      public about the need for security, said Bill Larson, chief executive officer of
      security company Network Associates Inc.
 
      "I think people do not understand in government the potential for
      cyberterrorism and the amount of havoc that can be created," Larson said.
 
      The CIO Council probably would work closely with the new security
      committee if the Senate chooses to shift the Year 2000 committee's focus,
      said Ed Caffrey, liaison for the CIO Council's Security Committee and a
      member of the State Department's Systems Integrity Division. The CIO
      Council recently expanded the focus of its Security Committee to include
      critical infrastructure and privacy. The council and its committees serve as the
      coordinators between federal and state government and the private sector,
      Caffrey said. Because the Senate committee probably would serve the same
      function, it would make sense for the two groups to work together, he said.

      @HWA
      
 18.0 Tempest Exporter Arrested 
      ~~~~~~~~~~~~~~~~~~~~~~~~~ 

      From HNN http://www.hackernews.com/

      contributed by Silicosis 
      The FBI has arrested Shalom Shaphyr, for trying to
      covertly ship van-eck/tempest interception equipment
      to Vietnam. Tempest technology is used to intercept
      emissions from computer screens or other sources from
      several feet away. This type of equipment is barred
      from export without proper licensing by International
      Traffic in Arms Regulations. 

      iPartnership     
      http://www.ipartnership.com/topstory.asp
      
      iPARTNERSHIP Top Story

      House International Relations Committee Moves on SAFE Act
 
      7/13/99
      iDEFENSE 
      By Bill Pietrucha 
 
      The SAFE Act made it through the House International Relations Committee Tuesday afternoon, but it wasn't a completely
      safe trip. H.R. 850, the Security And Freedom through Encryption (SAFE) Act, breezed by on a 33 to 5 full committee vote
      but not before being buffeted by a number of amendments diluting the bill's original intention. 
 
      As introduced by Rep. Bob Goodlatte (R-Va.), the SAFE Act would allow Americans to use any type of encryption
      anywhere in the world and allow any type of encryption to be sold in the United States. The bill also would provide a level
      playing field in the global marketplace by permitting the export of generally available software, hardware, and other
      encryption-related computer products. 
 
      According to Goodlatte, the legislation also would prohibit the government from mandating a back door into people's
      computer systems, and states that the use of encryption alone cannot be the basis for establishing probable cause for a criminal
      offense or a search warrant. 
 
      "Encryption products are the deadbolt locks of the 21st century," Goodlatte said, "This important data scrambling technology
      safeguards our privacy in the digital age, making electronic commerce viable and preventing online crime. The American
      people deserve to have the strongest encryption technology available to protect themselves in the Information Age." 
 
      But International Relations Committee Chairman Benjamin Gilman (R-NY) managed to water down the bill, attaching and
      agreeing to a number of amendments. 
 
      Declaring the amendments would put the "safe" back into the SAFE Act, Gilman approved an amendment that would require
      consultations between the Commerce Secretary, the FBI director and the Drug Enforcement Agency top honcho before
      approving encryption exports to "any major drug-transit or major illicit drug producing country." 
 
      Gilman also approved other amendments prohibiting encryption product export if evidence existed that implicated the software
      in child abuse or child pornograpjhy activities, and extending the export license review period from 15 days to 30 days.
 
      Copyright � 1999 Infrastructure Defense, Inc. All rights reserved. 
      
      @HWA
      
 19.0 NcN'99 Con in Mallorca Spain Announced 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

      From HNN http://www.hackernews.com/

      contributed by Conde Vampiro 
      J.J.F. Hackers Team has announced the dates and
      location for 'No cON Name (NcN�99)' The con will be
      held in In Mallorca, Spain on 23-25 of July. Not much
      notice but a good excuse to go to Europe. 

      HNN Cons Page     
      http://www.hackernews.com/cons/cons.html
      
      @HWA
      
 20.0 Rhino 9 Calls it Quits - goodbye letter
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/
      
      contributed by desig 
      Rhino9, a security research team has decided to
      disband. Several members have taken full time jobs with
      a security company. The remaining members have
      decided that this is as good a time as any to close up
      shop. While the team is disbanding its members will
      remain active. 

      Rhino9      
      http://207.98.195.250/  (www.rhino9.org isn't resolving)
      
      From their site;
      
      Rhino9 is saying goodbye for now.

      3 members of Rhino9 have moved to a far off place to accept a position at a security company with
      a good future. The rest of Rhino9 just didnt seem to want to continue on without the other 3 members. 
      We have enjoyed everything we have done as a team and hope that we have been able to provide the
      community with some valuable resources.

      We want to thank everyone thats supported us over the years. A special thanks to Ken Williams of
      PacketStorm for excellent coverage of everything we did. Sorry to hear of your misfortune bro... JP is
      an ass. Thanks to L0pht for advice and tidbits of help over the years. Rhino9 has seen some rough
      times and some members come and go... but everyone seems to be doing well.

      To the community at large, thanks for everything and I'm sure this wont be the last you see of R9's 
      members.

      Although the team is officially disbanding, its members are still very active.

      Thanks Again,

      -The Rhino9 Security Research Team 

      
      @HWA
      
 21.0 Hotwired and away, 6 yr old fires up toy car and heads for the highway..
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      Contributed by eentity
      
      Seen at http://smog.cjb.net/
      From CNN: http://www.cnn.com/US/9907/13/ohio.boy.driver.ap/            
      
      
      6-year-old pilots toy car along Ohio highway
      
      July 13, 1999 
      Web posted at: 6:57 AM EDT (1057
      GMT) 

      FAIRFIELD, Ohio (AP) -- A
      6-year-old boy who slipped
      away from his day care center
      managed to hot-wire a toy
      vehicle and drive it for a mile
      along a bustling state highway,
      authorities said. 

      An alarmed motorist called police to say she was stunned to see little John T.
      Carpenter piloting the toy alongside regular-sized vehicles just outside
      Cincinnati. 

      Authorities said they were investigating how John got away from Kiddie
      Kampus Pre-School and Day Care Center on Friday. Police said his
      disappearance went undetected until officers contacted the center more than
      an hour later. 

      The boy apparently wandered away from the center, then came upon a mini
      Monster truck-type toy parked outside ReRuns for Wee Ones, a children's
      resale shop. 

      "I had the wires unhooked so no one could ride off in it, but he reconnected
      the wires without anyone seeing him, took off the price tag and rode away,"
      co-owner Trisha Taylor said Monday. 

      "I was just floored. I couldn't believe it. This kid is only 6, and he had to
      have lifted up that hood and knew which wires to put together," Taylor said. 

      John was unhurt and police returned him to his mother. 

      The Butler County Children Services Board said it will investigate and
      determine what action might be needed at Kiddie Kampus, said Jon Allen, a
      spokesman for the Ohio Department of Human Services. 

      An employee of Kiddie Kampus declined comment to The Cincinnati
      Enquirer. The boy's mother did not return messages left by the newspaper. 
     
      @HWA
 
 22.0 The TRANSFER CAPACITOR (TCAP) BASED 90 Gigabyte Storage Drive.
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      Contributed by eentity
      
      From http://smog.cjb.net/
      
      "Described as a "Poker Chip Sized" solid state disk drive, the
      new semiconductor could be seen in service by the end of 1999
      or early in the year 2000. The device can store over 90 billion
      characters of information, the capacity of 15 Digital Video
      Disks, or 112 ordinary CD-ROM's", the speed of access is said
      to be "limited by the computer it is connected to, reading a full 1
      million bytes of information could take as little as 10
      nanoseconds".
      Estimated price for the "Hard Drive" version of the 090b8:
      $895. 

      Read more @ accpc.  http://www.accpc.com/tcapstore.htm
      
      @HWA
      
 23.0 Sony finished the Glasstron.VR headset
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      Contributed by eentity
      from http://smog.cjb.net
      
 
      "PC Glasstron� is a unique head mounted display that creates a
      high resolution, virtual 30" image when connected to a notebook
      computer or video source. With built-in ear buds for stereo
      sound it has full multimedia capability making it ideal for both
      business and entertainment applications. Its internal dual LCD
      panels create an impressive, large screen, personal and private
      experience in a foldable, 1/4 lb. package (excluding
      sub-chassis). "

      Read and get them @ Sony http://www.ita.sel.sony.com/products/av/glasstron/.     
      
      @HWA
      
 24.0 NIST Offers Security Accreditation 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 
      
      From HNN http://www.hackernews.com/
      

      contributed by Space Rogue 
      The National Institute of Standards and Technology has
      announced the creation of The National Voluntary
      Laboratory Accreditation Program, an accreditation
      program for laboratories that test commercial
      information technology security products for compliance
      with federal and international standards. The NVLAP will
      evaluate laboratories for their accordance with the
      National Information Assurance Partnership's Common
      Criteria Evaluation and Validation Scheme. 

      Federal Computer Week
      http://www.fcw.com:80/pubs/fcw/1999/0712/web-nist-7-12-99.html
      
      

      JULY 12, 1999 . . . 18:10 EDT 


      NIST announces accreditation program for IT labs

      BY DIANE FRANK (dfrank@fcw.com)

      The National Institute of Standards and Technology today announced the
      creation of an accreditation program for laboratories that test commercial
      information technology security products for compliance with federal and
      international standards.

      The National Voluntary Laboratory Accreditation Program will evaluate
      laboratories for their accordance with the National Information Assurance
      Partnership's Common Criteria Evaluation and Validation Scheme. 

      NIST and the National Security Agency created the NIAP and the common
      criteria scheme to make it easier for federal agencies to choose commercial IT
      security products that meet certain standards. The NIAP Validation Body will
      review the test reports from the labs and issue certificates for the products.
      NIST will periodically assess the labs for reaccreditation.

      NIAP also is working toward a Common Criteria Mutual Recognition
      Agreement with similar organizations in five other countries to set a
      wider-reaching common standard for security products.

      @HWA
 
 
 25.0 Spanish Civil Guard Arrest Electronic Intruder 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 
      
      From HNN http://www.hackernews.com/
       
      contributed by Ldm-Beaudet 
      The Spanish Civil Guard (Police) have announced than a
      22 year old Spanish man has been arrested for breaking
      into the Home Office's network in order to steal data.
      The man, who's identity remains anonymous, broke
      through the computer's security and tried, without
      success to gain access to confidential information to
      one of his free e-mail addresses. The man has been
      arrested in the Murcie's area (South-east of Spain) as a
      result of operation 'Yankee' that lasted more than a
      year. The Civil Guard collaborated with the Los Angeles
      Justice Department in order to identify the owner of the
      e-mail address. 

      Yahoo News - French     
      http://www.yahoo.fr/actualite/19990714/multimedia/931944780-yaho069.140799.113344.html

      @HWA
 
 26.0 303.org Needs A Home 
      ~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/
       

      contributed by netmask 
      The rash of ISPs crumbling as soon as they get a letter
      threatening to sue is becoming a major issue. It does
      not matter if the threat is real or the allegations well
      founded most ISPs refuse to take a stand and buckle at
      the first hint of legal wranglings. 303.org and
      netcrimminals.org has succumbed to such an attack.
      They are desperately looking for someone to host either
      site. They need an ISP who supports free speech, and
      wants to do good for the community to host them.
      303.org provides useful, but sometimes controversial
      services and information for free, as well as a few text
      mirrors. Netcriminals.org is working to inform the public
      about alleged criminals such as JP from Antionline, CPM
      from Happy Hacker, and Spy King from Codex Data
      Systems. The site has great things coming for it, if it
      can find an ISP with a small pair of balls to host it. 

      Send mail to Netmask if you are interested in helping
      host either site or need more info. 
      
      mailto:netmask@303.org
 
 
      @HWA
 
 27.0 CyberCop Sting Now Shipping 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/      

      contributed by Space Rogue 
      Designed to silently trace and track bad guys, CyberCop
      Sting records and reports all intrusive activity. CyberCop
      Sting operates by creating a series of fictitious
      corporate systems. The Sting product creates a decoy,
      virtual TCP/IP network on a single server or workstation
      and can simulate a network containing several different
      types of network devices. Each virtual network device
      has a real IP address and can receive and send
      genuine-looking packets. Each virtual network node can
      also run simulated daemons, such as finger and FTP.
      Sting can also perform IP fragmentation reassembly and
      TCP stream reassembly on the packets destined to
      these hosts. (Hmmmm, how long before the
      underground figures out how to detect and avoid such
      a system?) 

      Yahoo PR News Wire
      http://biz.yahoo.com/prnews/990714/ca_ntwrk_a_1.html
      
      
      Wednesday July 14, 8:02 am Eastern Time

      Company Press Release
      
      SOURCE: Network Associates, Inc.
      
      Network Associates Ships CyberCop Sting - Industry's First 'Decoy' Server
      Silently Traces and Tracks Hacker Activity
      
      CyberCop Line is First in Security Industry to Scan, Monitor And Apprehend Intruders
      
      SANTA CLARA, Calif., July 14 /PRNewswire/ -- Network Associates, Inc. (Nasdaq: NETA - news) today
      announced the immediate availability of its CyberCop Sting software, a new ``decoy'' server that 
      silently traces and tracks hackers, recording and reporting all intrusive activity to security 
      administrators. CyberCop Sting, an industry first, is an integral component of the CyberCop intrusion
      protection software family which also includes CyberCop Monitor, a real-time intrusion detection 
      application that monitors critical systems and networks for signs of attack (see related release) and 
      CyberCop Scanner, the industry's most highly-rated network vulnerability scanner. CyberCop Sting 
      addresses the most unfulfilled need in intrusion protection products today by allowing IS managers to
      silently monitor suspicious activity on their corporate network and identify potential problems before
      any real data is jeopardized.
      
      CyberCop Sting operates by creating a series of fictitious corporate systems on a specially outfitted 
      server that combines moderate security protection with sophisticated monitoring technology. The Sting 
      product creates a decoy, virtual TCP/IP network on a single server or workstation and can simulate a 
      network  containing several different types of network devices, including Windows NT servers, Unix servers
      and routers. Each virtual network device has a real IP address and can receive and send genuine-looking 
      packets from and to the larger network environment. Each virtual network node can also run simulated daemons,
      such as finger and FTP, to further emulate the activity of a genuine system and avoid suspicion by would-be 
      intruders. While watching all traffic destined to hosts in its virtual network, Sting performs IP fragmentation
      reassembly and TCP stream reassembly on the packets destined to these hosts, convincing snoopers of the 
      legitimacy of the secret network they've discovered.
      
      ``More than 60 percent of all security breaches are caused by authorized employees or contractors already 
       inside the firewall,'' said Wes Wasson, director of product marketing for Network Associates. ``CyberCop
       Sting gives security administrators, for the first time ever, a safe way to observe and audit potentially
      dangerous activity on their networks before it becomes a problem.''
      
      CyberCop Sting provides a number of benefits for security administrators, including: 
      
          * Detection of suspicious activity inside network; Log files serve to
            alert administrators to potential attackers prying into reserved areas.
          * Ability to record suspicious activity without sacrificing any real
            systems or protected information.
          * Virtual decoy network can contain multiple "hosts" without the expense
            and maintenance that real systems require.
          * CyberCop Sting software's virtual hosts return realistic packet
            information.
          * CyberCop Sting logs snooper activity immediately, so collection of
            information about potential attackers can occur before they leave.
          * CyberCop Sting requires very little file space but creates a
            sophisticated virtual network.
      
      
      Network Associates' CyberCop Intrusion Protection suite is a collection of integrated security tools developed
      to provide network risk assessment scanning (Scanner), real-time intrusion monitoring (Monitor) and decoy trace-
      and-track capabilities (Sting) to enhance the security and survivability of enterprise networks and systems. The 
      suite is also enhanced by the development of technology and research derived from Network Associates' extensive 
      product line, and includes industry-first features such as AutoUpdate, modular construction, and Active Security
      integration to provide extensive product integrity. A Network Associates white paper on next-generation intrusion
      detection is available at http://www.nai.com/activesecurity/files/ids.doc.
      
      Pricing and availability
      
      CyberCop Sting is free with the purchase of CyberCop Monitor, Network Associates' new real-time intrusion 
      detection software. Sting is also available as part of the full CyberCop suite, which also includes CyberCop 
      Scanner, CyberCop Monitor and the CASL Custom Scripting Toolkit. The CyberCop Intrusion Protection
      suite is priced at $17 per seat for a 1,000 user license.
      
      With headquarters in Santa Clara, Calif., Network Associates, Inc. is a leading supplier of enterprise network 
      security and management software. Network Associates' Net Tools Secure and Net Tools Manager offer best-of-breed,
      suite-based network security and management solutions. Net Tools Secure and Net Tools Manager suites combine to 
      create Net Tools, which centralizes these point solutions within an easy-to-use, integrated systems management 
      environment. For more information, Network Associates can be reached at 408-988-3832 or on the Internet at 
      http://www.nai.com .
      
      NOTE: Network Associates, CyberCop, and Net Tools are registered trademarks of Network Associates and/or its 
      affiliates in the United States and/or other countries. All other registered and unregistered trademarks in 
      this document are the sole property of their respective owners. 
      
      SOURCE: Network Associates, Inc.

      (Interesting toy to play with i'd imagine, hone your skills on your own VPN first? hehe. btw the url on the
      white paper gives me a 404 error too so go figure... - Ed)  
      
            
      @HWA
      
 28.0 cDc Issues Public Apology About Infected BO2K 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/ 

      contributed by omega 
      32 original copies of BO2K where handed out at Defcon
      on CD. All with personalised signatures from cDc
      members. Unfortunatley some, if not all, where infected
      with the CIH virus. cDc has said that this was
      completley unintentional and have posted a public
      apology on thier website. 

      The Cult of the Dead Cow
      http://www.cultdeadcow.com
      
      ZD Net 
      http://www.zdnet.com/zdnn/stories/news/0,4586,2294628,00.html

      Copies of BO2K available on the official BO2K web site
      are not infected and are available for download. cDc
      has said that as of 9pmEST Thursday night that there
      has been over 50,000 downloads of the software from
      the official site. This demand has caused the web site
      to be unreachable at times. 

      BO2K 
      http://www.bo2k.com
      
      ZDNET;
      
      --------------------------------------------------------------
      This story was printed from ZDNN,
      located at http://www.zdnet.com/zdnn.
      --------------------------------------------------------------
      
      Back Orifice CDs infected with CIH virus
      By Luke Reiter, CyberCrime, and Joel Deane, ZDNN
      July 15, 1999 3:51 PM PT
      URL: http://www.zdnet.com/zdnn/stories/news/0,4586,2294628,00.html
      
      UPDATED 6:33 PM PT
      
      Cult of the Dead Cow confirmed Thursday that official CD-ROM versions of its controversial
      Back Orifice 2000 program are infected with the CIH virus.
      
      "There must have been a virus on the duplicating machine and we didn't know about it," cDc
      member DilDog said in a phone interview.
      
                            "This incident is unfortunate and we are doing what we can do to
                            rectify it. We can't apologize enough. 
      
                            "We screwed up," he said. 
      
                            cDc, which distributed 32 official CD-ROM versions of BO2K at the
                            DEF CON hacking convention last weekend, had previously denied
                            that its CD-ROMs were infected with Win95.CIH, a virus that
      reformats hard drives and, on some machines, can erase the BIOS information that the computer
      needs to operate. 
      
      Web version clean
      Although an embarrassing publicity snafu for the high-profile hacking group, the CIH incident
      doesn't affect cDc's method for mass distribution of BO2K -- the Web.
      
      Like its predecessor, Back Orifice, BO2K was released on the Web on Wednesday, where it is
      available for free download.
      
      PC Week Labs senior analyst Jim Rapoza, who downloaded and tested the Web-version of
      BO2K, confirmed that the Web version is virus-free. DilDog said that the Web version of the
      program is "absolutely clean." 
      
      DilDog said cDc mistakenly believed that only pirated copies of BO2K -- burned and distributed
      at DEF CON within 45 minutes of the hacking tool's splashy debut -- were infected with CIH.
      
      However, cDc changed its tuned after several anti-virus firms and ZDNN reported finding CIH on
      official CD-ROMs -- confirming that the executable files in the CD-ROM were infected.
      
      "We would like to thank various individuals profusely for pointing this out to us," DilDog said. 
      
      cDc member Count Zero, who gave ZDNN its CIH-infected BO2K CD-ROM with "Virus Free"
      written on the case, said the incident was not malicious. 
      
      "We are not perfect ... It was human error. Our error. We weren't trying to do anything
      malicious," he said. 
      
      'We do accept responsibility'
      DilDog said he couldn't explain exactly how the CD-ROMs were infected with CIH; however, it
      appears the infection occurred before DEF CON, during the duplication of the official BO2K
      CD-ROMs. 
      
      "On my way to DEF CON I burned one CD with a series of stuff I needed (including the
      executable files for BO2K). All of this stuff was scanned ... nothing contained anything bad," he
      said. "As a last minute thing, we decided to make some duplicates to hand out at DEF CON." 
      
      DilDog said he handed the master CD-ROM to a "third party ... a very trusted friend of mine"
      who burned 25 copies of BO2K, using his PC. Those copies were identified with white cDc
      labels. 
      
      "It appears that the machine that we used in the duplicates had a virus on it," DilDog said. "We do
      accept responsibility for not having scanned the final copies of the CDs, but the master from which
      they were all duplicated was scanned and had nothing on it. So it must have been one of those
      flash in the pan kind of things where we had a virus apparently on the duplication machine and we
      didn�t know about it." 
      
      By DilDog's count, 22 of those infected copies were handed out during BO2K's debut on
      Saturday. Within 45 minutes of the BO2K debut, cDc began hearing reports of infected BO2K
      copies from DEF CON attendees, who already had pirated copies of the official CD-ROMs. 
      
      Both Count Zero and DilDog said they mistakenly believed that the official CD-ROMs were virus
      free, and that only the pirated copies were infected. Count Zero said he then took one of the
      remaining official CD-ROMs and, without scanning, burned another 10 official copies of BO2K.
      "My error was I assumed that the original was virus free," Count Zero said. 
      
      Count Zero labeled those 10 new versions of BO2K with cDc stickers and wrote "Virus Free --
      Count Zero" on the CD-ROMs' jewel cases. He then handed out those 10 CD-ROMs. ZDNN
      received one of those "Virus Free" copies of BO2K, which Norton's Anti-Virus found contained
      CIH. 
      
      Believing its BO2K copies were virus free, DilDog said cDc discounted initial reports of CIH
      infection. "It was only one or two days ago, I guess, that we got word from people that it was our
      CDs," he said. 
      
      Since then, DilDog said, cDc has run virus scans on all its PCs, but every machine has tested
      clean. "We are really at a loss as to how it got on there," he said. "There must have been a virus on
      the duplicating machine and we didn't know about it." 
      
      ZDNN's Robert Lemos contributed to this story.
      
      @HWA
      
 29.0 California Golf Course Computers Attacked 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 
      
      From HNN http://www.hackernews.com/ 

      contributed by Weld Pond 
      The computer systems at the Ocean Trails golf course
      on the Palos Verdes Peninsula have been broken into.
      The devestating attack wiped out files ranging from
      payroll data to email. The intruders left a message for
      developers on a company computer terminal that read,
      "Got ya . . . !" 

      LA Times           
      http://www.latimes.com/excite/990713/t000062441.html
      
      
      
      Golf Course Struck by Landslide Gets Hit by Hackers 
                 Crime: Vandals putter around with computer at Ocean Trails, where last
              month part of the 18th hole fell into the Pacific. 
              By JEAN MERL, Times Staff Writer


            Computer vandals have hacked their way into the computer
             system at the Ocean Trails golf course on the Palos Verdes
        Peninsula, creating another setback for the seaside luxury course
        that lost part of its 18th hole last month in a landslide. 
             The weekend vandalism, which wiped out files ranging from
        payroll data to correspondence, "is devastating," said Kenneth
        Zuckerman, one of several members of the family of longtime
        landowners who have spent almost 15 years on the project. 
             "I think all the negative publicity associated with this project has
        somehow influenced someone whose head isn't screwed on right to
        do something malicious," Zuckerman said. 
             He said the hacker, or hackers, left a message for developers on
        a company computer terminal that read, "Got ya . . . !" 
             Zuckerman said he and the company's head accountant were
        working Sunday on a computer in offices at the golf course
        construction site in Rancho Palos Verdes when "she noticed things
        just seemed to have disappeared. We contacted our service
        company and they said it looked like somebody had hacked the
        system through our Internet connection. . . . Then the message
        appeared on the screen." 
             Zuckerman said he reported the incident to the Los Angeles
        County Sheriff's Department and the FBI. Deputies at the Lomita
        sheriff's station said they took a report on Sunday and forwarded
        copies to detectives and to investigators in a special unit set up to
        investigate computer crime. 
             A spokeswoman for the FBI's local office said she could not
        comment on whether the agency has received a report or opened
        an investigation. She said, however, that any such report would be
        reviewed for a possible violation of federal law. 
             The new course, with its $200 weekend greens fees and
        breathtaking ocean views, was nearing completion when a landslide
        on June 2 sent about half the 18th hole into the Pacific; a county
        sanitary sewer line running beneath the course also broke off in the
        slide. 
             Tests are still underway to determine the cause of the slide, but it
        has generated fresh controversy over development in the area,
        which has both ancient and active landslides. 
             The Rancho Palos Verdes City Council has scheduled a session
        for next Tuesday to discuss Ocean Trails. 
             Meanwhile, cracks developed in a roadway about 200 yards
        east of the course almost three weeks ago, raising further concerns
        about land stability in the area. 
             Public Works Director Dean Allison said the land beneath Palos
        Verdes Drive South--a major, scenic road on the
        peninsula--occurred with settling of a landfill beneath the road,
        which was built in the 1940s. The settling could have been caused
        by a leaking sewer line or by temporary irrigation to establish a
        newly restored native vegetation at Ocean Trails, Allison said. 
             Workers built a bypass around the faulty sewer line last week,
        the irrigation has stopped and the road has been patched, Allison
        said, adding that the city will continue to monitor the road but
        believes it has the problems solved. 
             Zuckerman, who says that the brief and light irrigation could not
        have been responsible for the roadway cracks, said the computer
        hackers made a lot of extra work for his employees but did nothing
        that will keep the course from opening. 
             "There were no secrets, nothing of value to anyone but
        ourselves, but it is a terrible thing to do to a business," Zuckerman
        said. "It means an awful lot of extra work for our already
        hard-working employees." 
             "We've bent over backwards to try to be very responsible here,
        and to have someone come along and do this is very discouraging,"
        Zuckerman said. 
             Sheriff's Det. Michael Gurzi of the department's expanding High
        Tech Crimes Detail said there has been a dramatic increase of
        incidents of computer vandalism. 
             Sometimes it is done to steal trade secrets or help with a hostile
        company takeover, but other times it is done just to inflict pain on
        the victim. 
             "If [the hackers] are not as sophisticated as they think they are,
        they can be traced," Gurzi said. "But if they really know what they
        are doing, sometimes they can disguise themselves." 
        
        @HWA

 30.0 Selling Your Privacy 
      ~~~~~~~~~~~~~~~~~~~~ 
      From HNN http://www.hackernews.com/ 

      contributed by Weld Pond 
      Do people want privacy or not? The most recent survey
      seems to indicate that most people are more than willing
      to give out personal information for a few trinkets,
      cents off at the grocery store or other doodads. Are
      consumers being swindled? Are they getting fair market
      value for thier personal info? 

      NY Times Syndicate
      http://199.97.97.16/contWriter/cnd7/1999/07/15/cndin/0987-0531-pat_nytimes.html

      AltaVista is the next company to do just that. By giving
      away free Internet access in exchange for personal
      information it reinforces the idea that it is ok to sell off
      your personal info. 

      ZD Net
      http://www.zdnet.com/zdnn/stories/news/0,4586,2294519,00.html
      
      
      NY Times Syndicate
      
      Privacy? Net Users Willing to Swap Data for Freebies  
      ALICE WANG  
      c.1999 Bloomberg News 

           HACKENSACK, N.J. - Most Internet users say collecting personal information in exchange for 
      free products and services doesn't violate their privacy as long as the policies are explained, a
      new survey has found.  The survey, conducted by Privacy & American Business and Opinion search Corp., 
      found that 86 percent of the Internet users it polled support such free offers. Fifty-three percent 
      say they would participate in an information-for-benefits program, provided the company explained how
      the information would be used. Companies such as Free-PC Inc. swap products and services for
      personal information and targeted advertising. Free-PC, an idealab Company based in Pasadena, California,
      gives Compaq Computer Corp.PCs, Internet access and e-mail to customers who fill out detailed
      questionnaires that are used to determine which advertisements appear on their computer screens.
      Many companies, such as Free-PC, use the information to sell advertising. Some sell the information itself, 
      which privacy advocates find alarming.
      `Some privacy advocates consider it a `dangerous threat to Net privacy' for Web sites to offer consumers 
       free products in exchange for personal information,'' Dr. Alan Westin, head of Privacy & American Business, 
       said in a statement. Westin's survey results suggest that such concerns may be overblown.
   
      No Surprise?
     The survey's findings ``aren't surprising,'' said Steve Chadima, vice president of marketing at Free-PC.
     The closely held company has received more than 1.25 million applications for its free machines. ``People know
     what they're getting in to,'' Chadima said. The company began shipping its first 10,000 free PCs at the end of June.
     Still, 82 percent of the Internet users polled say privacy policies matter when deciding whether to trade information 
     for freebies, the survey found. Only 14 percent said privacy policies wouldn't figure into their decision, as long
     as they got the benefit.
     Some companies, including International Business Machines Corp.,have made privacy matters an issue when advertising online.
     The world's largest computer company said in March it will withdraw ads from Internet sites without policies that safeguard
     privacy in response to consumer concerns about disclosing personal information.`Our privacy policy is very, very strict,'' 
     said Free PC's Chadima. ``We never give out personal information for any reason.'' Privacy & American Business, a non-profit think tank based in
     Hackensack, New Jersey, surveyed 457 Internet users drawn from a representative sample of 1,014 adults.
   -----
;   (The Bloomberg web site is at http://www.bloomberg.com)
  
      @HWA   
      
 31.0 Geek Pride 99 
      ~~~~~~~~~~~~~
      
      From HNN http://www.hackernews.com/


      contributed by Jordan 
      This isn't really a con but we thought it deserved
      mentioning. Geek Pride 99 will be held on October 1, 2
      and 3, 1999 Boston, Massachusetts. They have a pretty
      impresive line up of speakers. What is Geek Pride? I
      don't know but it sounds cool. 

      Geek Pride     
      http://www.geekpride.org/gp99/
      
      @HWA
      
 32.0 Woz Speaks on Pirates of Silicon Valley 
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 
      From HNN http://www.hackernews.com/

      contributed by Ryan 
      I know this is weeks old but Steve Wozniak is still
      updateing his web site with new comments on the made
      for TV drama "Pirates of Silicon Valley". In case you
      forgot the show tried to detail the events surronding
      the early days at Apple and Microsoft. Steve Wozniak
      has a unique perspective and I never tire of reading his
      comments. If you haven't visited the site since the
      show aired it is worth a second look. 

      woz.org     
      http://www.woz.org/woz/presponses/commets.html
      
      
       
      @HWA
      
 33.0 Project Gamma Down for a while due to server relocation
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      An affilliate member and mirror site and general alround good guys, Project Gamma are
      going to be down for a few days while their ISP sorts its shit out, this was received in
      our inbox from WHiTe VaMPiRe of Project Gamma;     
      
      Greetings,


     "Darkridge Security Solutions, the organization providing the hosting
     for Project Gamma, will be relocating their networks. This move could take
     up to a period of one to two weeks. Project Gamma will most likely go down
     July 14. We will be back up as soon as possible. We will continue to update
     the site until it is no longer accessible."


      I would appreciate it if you people would be kind enough to post
      something regarding this on your Web sites.  
      
      
      @HWA
      
34.0 CERT ADVISORY CA-99-08
     ~~~~~~~~~~~~~~~~~~~~~~

     From http://www.net-security.org/
     
     by BHZ, Saturday 17th July 1999 on 3:37 pm CET
     CERT released advisory on a buffer overflow vulnerability has been discovered in the
     Calendar Manager Service daemon, rpc.cmsd. The problem is - Remote and local
     users can execute arbitrary code with the privileges of the rpc.cmsd daemon,
     typically root. Under some configurations rpc.cmsd runs with an effective userid of    
     daemon, while retaining root privileges. Read the advisory below
     
     
     CERT Advisory CA-99-08-cmsd

         Originally released: July 16, 1999
         Source: CERT/CC
         
      Systems Affected
      
           * Systems running the Calendar Manager Service daemon, often named
             rpc.cmsd
             
      I. Description
      
         A buffer overflow vulnerability has been discovered in the Calendar
         Manager Service daemon, rpc.cmsd. The rpc.cmsd daemon is frequently
         distributed with the Common Desktop Environment (CDE) and Open
         Windows.
         
      II. Impact
      
         Remote and local users can execute arbitrary code with the privileges
         of the rpc.cmsd daemon, typically root. Under some configurations
         rpc.cmsd runs with an effective userid of daemon, while retaining root
         privileges.
         
         This vulnerability is being exploited in a significant number of
         incidents reported to the CERT/CC. An exploit script was posted to
         BUGTRAQ.
         
      III. Solution
      
         Install a patch from your vendor
         
         Appendix A contains information provided by vendors for this advisory.
         We will update the appendix as we receive more information. If you do
         not see your vendor's name, the CERT/CC did not hear from that vendor.
         Please contact your vendor directly.
         
         We will update this advisory as more information becomes available.
         Please check the CERT/CC Web site for the most current revision.
         
         Disable the rpc.cmsd daemon
         
         If you are unable to apply patches to correct this vulnerability, you
         may wish to disable the rpc.cmsd daemon. If you disable rpc.cmsd, it
         may affect your ability to manage calendars.
         
      Appendix A: Vendor Information
      
         Hewlett-Packard Company
         
         HP is vulnerable, patches in process.
                
         IBM Corporation
         
         AIX is not vulnerable to the rpc.cmsd remote buffer overflow.
                IBM and AIX are registered trademarks of International Business
                Machines Corporation.
                
         Santa Cruz Operation, Inc.
         
         SCO is investigating this problem. The following SCO product contains
                CDE and is potentially vulnerable:
                
                + SCO UnixWare 7
                  
                The following SCO products do not contain CDE, and are
                therefore believed not to be vulnerable:
                
                + SCO UnixWare 2.1
                + SCO OpenServer 5
                + SCO Open Server 3.0
                + SCO CMW+
                  
                SCO will provide further information and patches if necessary
                as soon as possible at http://www.sco.com/security.
                
         Silicon Graphics, Inc.
         
         IRIX does not have dtcm or rpc.cmsd and therefore is NOT vulnerable.
                
                UNICOS does not have dtcm or rpc.cmsd and therefore is NOT
                vulnerable.
                
         Sun Microsystems, Inc.
         
         The following patches are available:
                OpenWindows:
                
          SunOS version     Patch ID
          _____________     _________
          SunOS 5.5.1       104976-04
          SunOS 5.5.1_x86   105124-03
          SunOS 5.5         103251-09
          SunOS 5.5_x86     103273-07
          SunOS 5.3         101513-14
          SunOS 4.1.4       100523-25
          SunOS 4.1.3_U1    100523-25
      
                CDE:
                
          CDE version       Patch ID
          ___________       ________
          1.3               107022-03
          1.3_x86           107023-03
          1.2               105566-07
          1.2_x86           105567-08
      
                Patches for SunOS 5.4 and CDE 1.0.2 and 1.0.1 will be available
                within a week of the release of this advisory.
                
                Sun security patches are available at:
                
                http://sunsolve.sun.com/pub-cgi/show.pl?target=patches/patch-li
                cense&nav=pubpatches
           _________________________________________________________________
         
         The CERT Coordination Center would like to thank Chok Poh of Sun
         Microsystems, David Brumley of Stanford University, and Elias Levy of
         Security Focus for their assistance in preparing this advisory.
         ______________________________________________________________________
         
         This document is available from:
         http://www.cert.org/advisories/CA-99-08-cmsd.html.
         ______________________________________________________________________
         
      CERT/CC Contact Information
      
         Email: cert@cert.org
                Phone: +1 412-268-7090 (24-hour hotline)
                Fax: +1 412-268-6989
                Postal address:
                CERT Coordination Center
                Software Engineering Institute
                Carnegie Mellon University
                Pittsburgh PA 15213-3890
                U.S.A.
                
         CERT personnel answer the hotline 08:00-20:00 EST(GMT-5) / EDT(GMT-4)
         Monday through Friday; they are on call for emergencies during other
         hours, on U.S. holidays, and on weekends.
         
      Using encryption
      
         We strongly urge you to encrypt sensitive information sent by email.
         Our public PGP key is available from http://www.cert.org/CERT_PGP.key.
         If you prefer to use DES, please call the CERT hotline for more
         information.
         
      Getting security information
      
         CERT publications and other security information are available from
         our web site http://www.cert.org/.
         
         To be added to our mailing list for advisories and bulletins, send
         email to cert-advisory-request@cert.org and include SUBSCRIBE
         your-email-address in the subject of your message.
         
         Copyright 1999 Carnegie Mellon University.
         Conditions for use, disclaimers, and sponsorship information can be
         found in http://www.cert.org/legal_stuff.html.
         
         * "CERT" and "CERT Coordination Center" are registered in the U.S.
         Patent and Trademark Office
         ______________________________________________________________________
         
         NO WARRANTY
         Any material furnished by Carnegie Mellon University and the Software
         Engineering Institute is furnished on an "as is" basis. Carnegie
         Mellon University makes no warranties of any kind, either expressed or
         implied as to any matter including, but not limited to, warranty of
         fitness for a particular purpose or merchantability, exclusivity or
         results obtained from use of the material. Carnegie Mellon University
         does not make any warranty of any kind with respect to freedom from
         patent, trademark, or copyright infringement.
         
         Revision History
         July 16, 1999:  Initial release
      
      -----BEGIN PGP SIGNATURE-----
      Version: 2.6.2
      
      iQCVAwUBN49o/3VP+x0t4w7BAQEHXgP/RfdP8Nriz1X3wenCtQJmjkn2knggAP4K
      2/PsW6SGxU43NUw+GkXS0FFZew/wyw/zCh+O/kgfa0f7hN1+2znZn1gfDZGOGNLf
      OEkf5tuWikdJ1Iis3Lnl4mrVPOqpUX893bYtdVVyag/CZ6Yj24PjrZAfH1kIh5to
      TVwdlvIKXrA=
      =VxcL
      -----END PGP SIGNATURE-----
      

     @HWA 
     
35.0 CODE NAME JANUS
     ~~~~~~~~~~~~~~~
     
     From http://www.net-security.org/
     
     by BHZ, Saturday 17th July 1999 on 3:28 pm CET
     Microsoft will, till March 2000, release new operating system with Windows
     NT legacy - Windows 2000 Data Center Server (code name Janus). It will, as
     Microsoft officials say, be a good competitor to UNIX. Janus will have all advantages
     of UNIX, and it will have ability of transferring current job to one of other 8 processors,
     if the main one fails. 
     
     @HWA
     
     
36.0 ANOTHER ONE ON BO2K
     ~~~~~~~~~~~~~~~~~~~
     
     From http://www.net-security.org/
     
     
     by BHZ, Saturday 17th July 1999 on 3:15 pm CET
     As ISS interpreted Back Orifice 2000 as a "child play", other security vendors, like
     Data Fellows and Symantec Anti-Virus, immediately attacked that point of view. Their
     opinion is that open source of BO2K is a very big problem. Aled Miles, general
     manager at Symantec Anti-Virus said: "Anyone who calls BO2k child's play
     misunderstands the situation. If one person gets into someone else's computer and
     steals his or her data, that is a problem. It will probably not proliferate like Melissa,
     but that is not the point." Read the article below. 
     
     Hackers: BO2K 'child's play' remark draws fire
                                                                                                               
                                
     Fri, 16 Jul 1999 16:07:52 GMT 
     Will Knight 
    
     Computer security experts in the UK have attacked US firm, Internet Security Solutions (ISS) for describing Back Orifice 2000 (BO2K) as
     "child's play". 
    
     "That does seem a bit glib," says Paul Brette of Data Fellows Anti-Virus in the UK. "We are worried about the fact that it is open-source.
     We could see that being a big problem because polymorphic changes to the virus signature would be relatively easy to make and would
     make it more difficult to detect." 
    
     The BO2K virus was released by media-savvy hacking group Cult of the Dead Cow to coincide with the Def Con 7.0 computer security
     extravaganza held in Las Vegas last weekend. It is designed to enable remote access to Windows 95, 98 and NT operating systems. 
    
     The Cult's "Minister for Propaganda" Deth Vegetable published a press release describing BO2K as, "the most powerful application of its
     kind which puts the administrator solidly in control of any Microsoft network." 
    
     But Brette sees other reasons to be concerned by the release of BO2K, He is particularly worried by the fact that the Cult of the Dead Cow
     has been careful to remain anonymous, while giving away this "administrative tool" for free. "It makes you wonder what sort of motives they
     really have, what they could be hiding," he says. 
    
     Aled Miles, general manager at Symantec Anti-Virus believes BO2K is anything but child's play. "Anyone who calls BO2k child's play
     misunderstands the situation. If one person gets into someone else's computer and steals his or her data, that is a problem. It will probably not
     proliferate like Melissa, but that is not the point." 
    
     Strangely, Microsoft Window's Marketing Manager, Francess Fawcett, believes there is little cause for alarm, despite Symantec's reasoning.
     She believes the fact that ISS could decode it's source code in under 24 hours shows the simplicity of the program, and says they will not be
     treating it differently to any other virus." 
    
     A bizarre example of how well publicised Back Orifice has been is that ISS reportedly asked the Cult of the Dead Cow for a Beta version of
     the program. The response was that this would be supplied in return for, "one million dollars and a monster truck." 

     @HWA
     
37.0 BUG IN AMAVIS VIRUS SCANNER
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~ 
     From http://www.net-security.org/  
 
     by BHZ, Saturday 17th July 1999 on 3:04 pm CET
     Chris McDonough wrote to BugTraq about a problem in AMaViS virus scanner for
     Linux (http://satan.oih.rwth-aachen.de/AMaViS). Read about the exploit below.   
     
     The AMaViS incoming-mail virus scanning utility (available at 
     http://satan.oih.rwth-aachen.de/AMaViS/) for Linux has problems.

      I tried to contact the maintainer of the package (Christian 
      Bricart) on June 26, again several times over the course of 
      the last month, but I have not received anything from him 
      and the AMaViS website does not yet acknowledge the problem 
      or provide a fix.  However, on Jun 30, co-contributors to 
      the package (Juergen Quade and Mogens Kjaer) responded 
      quickly with an acknowledgement of the problem and a few 
      fixes.  Because the co-authors do not maintain the 
      downloadable package, however, the latest downloadable 
      version of AMaViS (0.2.0-pre4 and possibly earlier) still 
      has a bug which allows remote users to send arbitrary 
      commands as root to a Linux machine running the AMaViS 
      scripts.
      
      Exploit:
      
      Send a message with a virus-infected file attachment.  Use 
      something like "`/sbin/reboot`@dummy.com" as your reply-to 
      address in your MUA when sending the message.  When the 
      AMaViS box receives the message, it will go through its 
      scripts, find the virus, construct an email message to send 
      back to the sender of the virus-infected file... line 601+ 
      in the "scanmails" script:
      
      cat <<EOF| ${mail} -s "VIRUS IN YOUR MAIL TO $7" $2
      
                         V I R U S  A L E R T
      
        Our viruschecker found a VIRUS in your email to "$7".
                 We stopped delivery of this email!
      
          Now it is on you to check your system for viruses
      
        For further information about this viruschecker see:
                     http://aachalon.de/AMaViS/
              AMaViS - A Mail Virus Scanner, licenced GPL  
      EOF
      
      ... the $2 expands to a shell command (e.g. "/sbin/reboot") 
      which runs as root.
      
      To solve it, Juergen Quade created the following diff 
      file.  It represents the difference between his "secured" 
      and "insecure" scanmails shell script file.  I solved it 
      differently, using a procmail recipe, but this will work 
      too:
      
      --- scanmails.orig Wed Jun 30 12:54:02 1999
      +++ scanmails Wed Jun 30 12:54:15 1999
      @@ -122,6 +122,50 @@
      
      deliver=/usr/bin/procmail
      
      +
      ############################################################
      ###
      +# Chris McDonough informed us, that it is possible to 
      execute #
      +# programs by sending an email, wich contains a virus and 
      has #
      +# as return address something 
      like:                           #
      +# 
      `/sbin/reboot`@softing.com                            #
      +# 
      or                                                          
      #
      +# $(/sbin/reboot)
      @softing.com                           #
      +# The execution of the command (/sbin/reboot) is done by 
      the  #
      +# "mail" program. Therefore we parse the arguments in 
      order   #
      +# to substitute those characters to 
      nothing                   #
      +
      #                                                           
        #
      +# Wed Jun 30 11:47:55 MEST 
      1999                               #
      +
      ############################################################
      ###
      +
      +# substitute all "`","$(",")" to nothing
      +receiver=${7//\`/}
      +receiver=${receiver//\$\(/}
      +receiver=${receiver//\)/}
      +
      +sender=${2//\`/}
      +sender=${sender//\$\(/}
      +sender=${sender//\)/}
      +
      +if [ "$sender" != "$2" -o "$receiver" != "$7" ] ; then
      + cat <<EOF | ${mail} -s "Intrusion???" ${mailto}
      +
      ############################################################
      ###
      +# Chris McDonough informed us, that it is possible to 
      execute #
      +# programs by sending an email, wich contains a virus and 
      has #
      +# as return address something 
      like:                           #
      +# 
      \`/sbin/rebbot\`@softing.com                          #
      +# 
      or                                                          
      #
      +# \$\(/sbin/rebbot\)
      @softing.com                        #
      +# The execution of the command (/sbin/rebbot) is done by 
      the  #
      +# "mail" program. Therefore we parse the arguments in 
      order   #
      +# to substitute those characters to 
      nothing                   #
      +
      #                                                           
        #
      +# Wed Jun 30 11:47:55 MEST 
      1999                               #
      +
      ############################################################
      ###
      + $7 or $2 is not a valid Email address
      + (changed to $receiver and $sender)!
      +EOF
      +fi
      +#             
      +
      ################################################
      #                main program                  #
      #               --------------                 #
      @@ -171,8 +215,8 @@
      
      echo xxxxxxxxxxxxxxxxxx`date`xxxxxxxxxxxxxxxxxxxxxxx >
      ${tmpdir}/logfile
      echo ${scanscriptname} called $* >>${tmpdir}/logfile
      -echo FROM: $2 >>/${tmpdir}/logfile
      -echo TO: $7 >>/${tmpdir}/logfile
      +echo FROM: $sender >>/${tmpdir}/logfile
      +echo TO: $receiver >>/${tmpdir}/logfile
      
      ${metamail} -r -q -x -w ${tmpdir}/receivedmail > /dev/null 
      2>&1
      
      @@ -597,11 +641,11 @@
      
      ################### send a mail back to sender 
      ######################
      
      -cat <<EOF| ${mail} -s "VIRUS IN YOUR MAIL TO $7" $2
      +cat <<EOF| ${mail} -s "VIRUS IN YOUR MAIL TO $receiver" 
      $sender
      
                          V I R U S  A L E R T
      
      -  Our viruschecker found a VIRUS in your email to "$7".
      +  Our viruschecker found a VIRUS in your email to 
      "$receiver".
                  We stopped delivery of this email!
      
           Now it is on you to check your system for 
      viruses           
      @@ -614,12 +658,12 @@
      
      ############### send a mail to the addressee 
      ########################
      
      -cat <<EOF| ${mail} -s "VIRUS IN A MAIL FOR YOU FROM $2" $7
      +cat <<EOF| ${mail} -s "VIRUS IN A MAIL FOR YOU FROM 
      $sender" $receiver
      
                          V I R U S  A L E R T
      
         Our viruschecker found a VIRUS in a mail from 
      -     "$2"
      +     "$sender"
         to you.
         
         Delivery of the email was stopped!
         
      @HWA   
      
38.0 E-COMMERCE IS SECURE
     ~~~~~~~~~~~~~~~~~~~~
     
     From http://www.net-security.org/  
          
     by BHZ, Saturday 17th July 1999 on 3:04 pm CET
     IT vendors, analysts and lawyers gathered in London on Thursday to create an
     advisory document for the U.K. government about spreading e-commerce business.
     The main problem is that people are not aware that their credit card number is most
     likely to be stolen in a supermarket, then on the Internet. Frederick Wilson of Lloyds
     TSB banking group said: "There is no security problem, but only one problem - people
     don't understand. We have to convince customers it is secure".      
     
     @HWA
     
39.0 GAO REPORT ON US NAVY
     ~~~~~~~~~~~~~~~~~~~~~
     From http://www.net-security.org/  

     by BHZ, Saturday 17th July 1999 on 2:55 pm CET
     GAO (US General Accounting Office ), released a report about Y2K situation in US
     Navy. "Failure to address the year 2000 problem in time could severely degrade or
     disrupt the Navy's day-to-day and, more importantly, mission-critical operations" - the
     report says. US Navy answered that they will use some guidelines provided to them
     by GAO (for instance mission-critical systems must be fixed by 2000). 
      
     @HWA
     
40.0 GEEKS IN SPACE
     ~~~~~~~~~~~~~~
     From http://www.net-security.org/  

     by BHZ, Friday 16th July 1999 on 12:47 pm CET
     Slashdot (www.slashdot.org) announced Geeks in Space - their own radio shown. As
     they say it is a show dealing with "News for Nerds, Stuff that Matters". Show will be
     run by Rob Malda and Jeff Bates and it will cover stories from Slashdot site, Linux
     news , open source and "cool technologies". Show could be heard in Real Audio
     format (.rm) , MP3 instant play format (.mu3) and in normal MP3 file (.mp3). 
     
     
     @HWA
     
41.0 DOD to use Netscape's PKI     
     ~~~~~~~~~~~~~~~~~~~~~~~~~
     via http://www.securityportal.com/
     
     15 July 1999 
     http://jya.com/dod-pki2.htm 

     
     Date: Thu, 15 Jul 1999 10:15:02 -0400
     From: dlnews_sender@DTIC.MIL
     Subject: DOD EXECUTES PKI LICENSE OPTION
     To: DODNEWS-L@DTIC.MIL 
     
     = N  E  W  S      R  E  L  E  A  S  E 
     
     = OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE (PUBLIC AFFAIRS)
     = WASHINGTON, D.C. 20301 
     
     ==================================================== 
     
     No. 333-99 
     
     (703)607-6900 (media) 
     
     IMMEDIATE RELEASE 
     
     July 15, 1999 
     
     (703)697-5737(public/industry) 
     
     DOD EXECUTES PKI LICENSE OPTION 
     
     The Department of Defense has acquired a capability to provide public key infrastructure (PKI) services, as part of its near-term efforts to go "paperless" and
     enhance the security of its information systems. 
     
     The Defense Information Systems Agency through the Integrated-Computer Aided Software Engineering contract has executed the final option of a DoD-wide
     license with Netscape Communications Corporation.  The Netscape license provides the Department of Defense and the Intelligence Community with a site license
     for a number of Netscape server products as well as the professional version of the Netscape client software. 
     
     The Netscape software, specifically the Certificate Management System (CMS) 4.1, will be a part of the pilot DoD public key infrastructure.  The CMS 4.1 product
     provides functions such as issuing and managing digital certificates, encryption key recovery, support for Federal Information Processing Standard-compliant
     hardware cryptography, and support for the Digital Signature Standard. 
     
     The deployment of this product is part of the Department's efforts to transition to a paperless environment.  With PKI technology, DoD will be able to ensure the
     authenticity of digital signatures on contracting documents, travel vouchers, and other forms that obligate taxpayer funds, to authenticate users of information systems,
     and protect the privacy of transactions over networks.  DoD plans pilot programs in electronic commerce, as well as in the Global Command and Control and
     Combat Support Systems.  PKI technology is also employed in the Defense Travel System to assure the authenticity of electronic travel transactions. 
     
     Details on the products and license can be found on the Internet at http://dii-sw.ncr.disa.mil/Del/netlic.html.  Details on downloading the products can be found at
     http://netscape.intdec.com/disa/. 
     
     -END- 
       
     @HWA
     
42.0 Federal Computer Week: FBI turns on new computer crime fighting system   
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     via http://www.securityportal.com/


     http://www.fcw.com/pubs/fcw/1999/0712/web-fbi-7-15-99.html     
     
     JULY 15, 1999 . . . 18:05 EDT 


     FBI turns on new crime-fighting system

     BY L. SCOTT TILLETT (scott@fcw.com)

     FBI officials announced today that they have successfully rolled out a
     massive new computer system that state and local law enforcement officials
     will use to fight crime.

     The new system, the National Crime Information Center 2000 -- like the
     original NCIC, which the FBI had used since 1967 -- allows crime fighters to
     search through 17 databases when investigating crimes or questioning criminal
     suspects. The databases include information on stolen guns, deported felons,
     missing persons and stolen vehicles, for example.

     NCIC 2000 will allow law enforcement officials with special hardware and
     software to transmit suspects' fingerprints to confirm their identity and to see if
     the suspects are wanted for other crimes. It also will allow the officials to view
     mug shots to confirm identities -- a capability the original NCIC did not have.

     Law enforcement officers also can use NCIC 2000 to identify relationships
     among information in the databases. For example, under the old NCIC, if
     someone stole a car and a gun as part of the same crime and if a law
     enforcement officer later stopped the car thief on the highway, the officer
     could use the system to find out easily that the car had been stolen. But he
     would not necessarily know that the car thief might also have a stolen gun.
     NCIC 2000 shows the connection, keeping related information on a crime
     linked together, FBI spokesman Stephen Fischer said.

     The new NCIC 2000 also adds name-search functionality. For example, a
     search for the name "James" would return alternate spellings, such as "Jim" or
     "Jimmy," Fischer said.

     NCIC 2000 went online after years of escalating costs and congressional
     finger-wagging. System architects originally envisioned NCIC 2000 costing
     about $80 million, but the final price was $183.2 million, Fischer said. The
     discrepancy between the original cost and the actual cost came in part
     because contractors originally were "overly ambitious" when estimating the
     project, Fischer said.

     NCIC 2000 went live on July 11, but bugs in the system, as well as FBI
     attention on the capture of suspected railroad killer Angel Maturino Resendez,
     delayed the unveiling of the system, Fischer said. He added that bugs in NCIC
     2000 were fixed by Monday evening. The bugs related to connectivity with
     the National Instant Criminal Background Check System, which is used for
     approving gun purchases. That system draws on NCIC 2000 and other
     databases to approve or disapprove gun purchases.

     FBI officials will hold the formal ceremony unveiling NCIC 2000 next month
     in Clarksburg, W.Va. 

     @HWA  
     
     
43.0 NMRC: Netware 5 Hijack Vulnerability 
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 
     
     via http://www.securityportal.com/
     
     it is possible to hijack a client's NCP (Netware Core Protocol) session and
     issue calls to the NetWare server as admin. The requirements are that the connection
     is using the IPX protocol and you know the MAC address of the admin's station (In IPX,
     the station address is a concatenation of the network segment number and the MAC address)
 
     http://www.nmrc.org/news/spoofncp.txt

      _______________________________________________________________________________
      
                                Nomad Mobile Research Centre
                                       A D V I S O R Y
                                        www.nmrc.org
                                Jitsu-Disk  [jitsu@nmrc.org]
                              Simple Nomad [thegnome@nmrc.org]
                                          15Jul1999
      _______________________________________________________________________________
      
                                    Platform : Novell Netware
                                 Application : NDS/NCP
                                    Severity : High
      
      
      Synopsis
      --------
      
      Armed with the MAC address of the Administrator, an intruder can hijack an
      Admin's session and issue NCP calls as the the Admin on Netware servers.
      
      Tested configuration
      --------------------
      
      The bug was tested with the following configuration :
      
      Novell Netware 5, Service Pack 2 (with IPX configured)
      Latest Client Software for Windows 95/98
      
      Also confirmed on Netware 4.x.
      
      Bug(s) report
      -------------
      
      This is an old bug. We reported it to Novell over a year ago, and even released
      exploit code (see http://www.nmrc.org/pandora/). Since several people had
      problems using the exploit code and Novell still hasn't corrected (to our
      satisfaction) all of the problems with Netware 5, we've updated the exploit 
      code in the new Pandora v4, which is now in beta release. While Netware/IP is
      the recommended path for Netware 5, most organizations using Netware are still
      using Novell's proprietary IPX protocol for server access. IPX is required for
      this exploit to work.
      
      In essence, IPX fragmented requests/replies (NCP call 0x68) are not signed if
      the packet signature level is not set to 3. Setting it to 3 on the server side
      is good, but if the client is set at 1, it is possible to spoof or hijack a 
      portion of the client's session. If the target client is the Admin, we can tell 
      the server to make us security equivalent to the Admin. Please refer to the 
      details at http://www.nmrc.org/pandora/ncp.txt, especially sections 6 and 
      7, which detail how the attack works.
      
      The new Pandora Online utility will simply require you insert the MAC address 
      of the Admin's workstation into a dialog box, and Pandora will handle the rest
      of the sniffing required to make the attack work. As always, placement of your
      attack box is critical:
      
      ----------    ----------    ----------   -------------
      | Admin  |    | Attack |    | Router |   | Netware 5 |
      | Client |    |  Box   |    |        |   |   Server  |
      ----------    ----------    ----------   -------------
          |             |           |    |           |
          ---------------------------    -------------
      
      So here are the steps:
      
      0. Admin client is Packet Signature Level 1, and server is Packet Signature 
      Level 3.
      1. Attack box gets Admin's MAC address, and inserts it into the Pandora
      Online tool. Attacker has the option to adjust other parameters as needed, but
      the main one is the MAC address.
      2. Admin performs actions dealing with NDS that use fragmented packets (normal 
      administrator activity will give us the needed packets quickly).
      3. Attack box sends forged request to server, making us security equivalent to 
      Admin.
      4. Netware 5 server accepts forged packets.
      5. Admin client loses connection from server as its packet sequence is now out 
      of whack.
      6. Attacker adjusts security settings for self so that the attacker has full
      access to entire tree, and removes "equal to Admin", so s/he will not show up
      on a basic "who's equiv to me" investigation by Admin.
      
      Caveats:
      
      0. This attack will fail in a switched environment since sniffing is involved.
      1. This is a race. If the Admin client beats the attacker, the attacker must try 
      again.
      2. Obviously the attacker being on the same Ethernet segment as the Admin will 
      help considerably in an attack. In theory this should work if you are anywhere 
      in between the Admin client and the server, although you will need to use the 
      MAC address of the router interface the Admin's session is coming from. At best, 
      this may not work at all, but is still theoretically possible.
      3. In theory this could be adapted to a Netware/IP environment, as Novell's 
      TCP/IP stack is vulnerable to sequence number prediction. We have not explored
      adapting Pandora exploit code over to a pure IP environment, but will explore
      this possibility in future Pandora releases.
      
      Solution/Workaround
      -------------------
      
      Use Packet Signature Level 3 everywhere, and make sure clients cannot touch 
      their own signature settings. LAN Admins should never access a server unless
      using Level 3, and the security on the workstation should be restrictive enough 
      to prevent unauthorized adjustments (i.e. use a locked-down NT client with no 
      server services running, behind a locked door, although this simply places your 
      trust in Microsoft). Use switched Ethernet.
      
      Alternately, you can ask Novell to patch things. We did our part a year ago.
      
      Comments
      --------
      
      Simple Nomad had to leave Las Vegas right after Black Hat due to a minor 
      medical emergency at home, and missed DefCon. This advisory was one of the 
      things slated to be discussed during the DefCon presentation.
      
      As stated, Novell was contacted regarding this bug in June of 1998, 13 months
      ago. We got this to work in a lab setting. YMMV.
      
      The new Pandora v4 includes all of the Pandora v3 attacks against Netware 4 
      updated to work against Netware 5. It was developed with 100% freeware libraries 
      and compilers. We are proud that this code doesn't look like a normal 95/98/NT, 
      the GUI was developed on Linux. Pandora v4 is 100% freeware. Source code is 
      freely available.
      
      We always recommend using the latest versions of Netware with the latest 
      patches, and using the maximum security settings at all times on Netware 
      servers.
      
      _______________________________________________________________________________
          
      @HWA     


44.0 CNet: IBM offers privacy consulting services 
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
     via http://www.securityportal.com/
     
    - IBM has developed a process, using expert tools, to help customers develop privacy policies. 
      The consulting helps match the selected privacy policy with the appropriate systems and
      technology      



     C|Net http://news.com/News/Item/0,4,39283,00.html?st.ne.fd.tohhed.ni
     
     IBM offers privacy consulting services 
     By Sandeep Junnarkar
     Staff Writer, CNET News.com 
     July 16, 1999, 6:40 a.m. PT 
     URL: http://www.news.com/News/Item/0,4,39283,00.html 
     
     Riding the raging success of its e-commerce services, IBM today announced consulting services aimed at
     helping businesses implement privacy policies, procedures, and technology. 
     
     The services will also try to provide insight into how to build consumer trust in in the far-flung 
     networked world. 
     
     IBM's announcement comes at a time of growing concerns over privacy issues on the Internet. An increasing
     number of e-commerce sites and portals collect consumer information and many companies place employee 
     information on access-restricted sites on the Internet so individuals can manage some aspects of their
     human resource needs. 
     
     The consulting services will be part of IBM's Global Services division. At the core of the services is
     a tool-assisted methodology that shows the steps involved and the questions that need to be addressed to
     set up the right privacy policies and systems. 
     
     Analysts said the services will help users identify "hard," costs such as new systems and upgrades, and
     "soft" costs--expenses that customers hadn't considered. 
     
     Privacy services are designed to address specific customer requirements and are based on work with IBM
     researchers, global service professionals, and industry experts. IBM plans to implement policies and 
     procedures needed to protect personal information that is collected and maintained on customers and employees. 
     
     "The growth of electronic commerce depends on trust," said Gary Roboff, chairman of Banking Industry Technology
      Secretariat (BITS) Research & Planning Steering Committee, in a statement. BITS is a organization that focuses
      on privacy issues. "These new services can help companies such as banks build that trust, and show individuals
      --the customers of our customers--that they are protected by a thoughtful, comprehensive privacy program." 
     
     IBM's privacy services also help identify the types of information being gathered and processed, ensuring that
     consumers get proper notification of how their personal information will be used. 

     @HWA  
     
45.0 mod_ssl 2.3.6 Bug Fixes 
     ~~~~~~~~~~~~~~~~~~~~~~~
     via http://www.securityportal.com/
     
     mod_ssl provides provides strong cryptography for the Apache, the Internet's most
     popular web server. This version contains various bug fixes, as well as a new certificate construct for client
     authentication     
     
     http://freshmeat.net/news/1999/07/15/932074176.html
     
     @HWA
     
46.0 Clinton authorizes National Infrastructure Assurance Council
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
     via http://www.securityportal.com/
     
     http://library.whitehouse.gov/PressReleases.cgi?date=2&briefing=8
      
    - text of press release here. The President will appoint up to 30 members to the council, which will seek to
      foster cooperation with the public and private sector in the goal of protecting critical infrastructure. 
      Seen by many as continuing the initial work of the earlier Presidential
      Commission for the Protection of Critical Infrastructure     
      
      July 15, 1999

      REMARKS BY THE PRESIDENT AND PRIME MINISTER EHUD BARAK OF ISRAEL IN PRESS AVAILABILITY 
      
      
      
      
      
                                 THE WHITE HOUSE
      
                          Office of the Press Secretary
      ______________________________________________________________
      For Immediate Release                            July 15, 1999     
      
                   
                            REMARKS BY THE PRESIDENT
                     AND PRIME MINISTER EHUD BARAK OF ISRAEL
                              IN PRESS AVAILABILITY
                   
                        Rose Garden                                        
                        
      2:29 P.M. EDT
                   
                   
                   THE PRESIDENT:  Good afternoon, ladies and gentlemen.  I 
      am delighted to welcome Prime Minister Barak to Washington.  As all 
      of you know, he is the most decorated soldier in Israel's history.  
      And as a soldier, as Army Chief of Staff, Interior Minister and 
      Foreign Minister, he has made immeasurable contributions to his 
      nation's security and its emergence as a modern, thriving democratic 
      society, time and again taking on tough tasks and getting them done 
      right.
      
                   Now, as Prime Minister, he has put Middle East peace at 
      the top of his agenda, telling his fellow citizens that Israel's 
      triumph -- and I quote -- "will not be complete until true peace, 
      trust and cooperation reign between Israel and its neighbors."
                   
                   Mr. Prime Minister, if your mentor, Yitzhak Rabin were 
      here today, I believe he would be very gratified, seeing the 
      leadership of his cherished nation in your most capable hands.
      
                   For more than half a century, the United States has 
      stood proudly with Israel and for the security of its people and its 
      nation.  Now, Mr. Prime Minister, as Israel again walks bravely down 
      the path of peace, America will walk with you, ready to help in any 
      way we can.  
      
                   As we have seen before here at this house, as Israelis, 
      Palestinians, Egyptians and Jordanians have come together, what at 
      first seems unlikely, even impossible, can actually become reality 
      when the will for peace is strong.  America will help as 
      you move forward, as you put implementation of the Wye River 
      agreement back on course, as you work for a final status 
      agreement; as you seek to widen the circle of peace to include 
      Syria and Lebanon, and to revitalize talks among Israel and the 
      Arab world to solve regional problems and build a prosperous 
      
      common future.  I look forward to our meeting and to 
      strengthening the bonds between Israel and the United States.  
                
                First, Mr. Prime Minister, again, welcome.  The podium 
      is yours.
      
                PRIME MINISTER BARAK:  Mr. President, ladies and 
      gentlemen, I came here as a messenger of the people of Israel who 
      have called for change and renewal, and I am determined to bring 
      about change and renewal.  I and the people of Israel attach 
      great importance to the relations with the United States, its 
      friendship and support, and its invaluable contribution to the 
      peace process.  The United States has always been a true and 
      tried friend of Israel, and President Clinton personally has 
      played an important role in changing the Middle East landscape.  
                
                I came to Washington following a series of talks with a 
      number of Middle East leaders.  I assured them that we would work 
      as partners with mutual trust in order to overcome all the 
      challenges and complications that are still awaiting us down the 
      street. 
                
                We agreed that we need to abide by the previous 
      agreements signed by all parties, including the Wye Accords.  It 
      is our intention to inject new momentum into the peace process 
      and to put it back on all tracks.  For this, we need American 
      leadership and support all along the way.
      
                Mr. President, we are on the threshold of the 21st 
      century and the third millennium.  Mothers, fathers and children 
      all across the Middle East yearn for the dawn of a new era.  They 
      expect us to provide them with a better and safer future.  We 
      cannot let their hopes down.  Together, as partners in the search 
      for peace, we can help transform the Middle East from an area of 
      confrontation and enmity to a region of peace, security and 
      prosperity.
      
                I look forward to all my meetings here, and I hope that 
      this visit will usher in a new era in the peace process and 
      further deepen American-Israeli relations.  Thank you very much.  
      (Applause.)
      
                Q    Mr. Prime Minister --
                
                Q    Mr. President --
      
                THE PRESIDENT:  Let me tell you -- here's what we'll 
      do.  We'll take a couple of questions from the Americans, and a 
      couple of questions from the Israelis, but we'll start with a 
      question from the American press.  
                
                Sam?
      
                Q    Yes, sir.  Mr. Prime Minister, when you say as you 
      did the other day, words to the effect that the United States 
      perhaps should step back somewhat and let the parties do more of 
      the work, what do you mean by that?  
                
                And, Mr. President, how would that change U.S. 
      involvement in the process?
      
                PRIME MINISTER BARAK:  I think that the United States 
      can contribute to the process more as facilitator than as a kind 
      of policeman, judge and arbitrator at the same time.  This was 
      the tradition when Yitzhak Rabin was leading the peace process.  
      And I deeply believe that this is the right way to have the best 
      kind of inference and the best kind of contribution that the 
      United States can bring into the peace process.  
                
                It is clear to all of us that without United States 
      participation, contribution, and without the leadership that had 
      been shown in the past by the President -- and I hope will be 
      shown in the future by the American administration -- we won't be 
      able to reach a peace.  And I'm confident we'll find these 
      resources and move forward towards peace that all our peoples are 
      awaiting.
      
                THE PRESIDENT:  I agree with what the Prime Minister 
      said.  I thought that the peace process worked best when we were 
      essentially facilitating direct contacts between the parties and 
      helping to make sure that there was a clear understanding, 
      helping to make sure that we were there to do whatever we could 
      do to, now and in the future, to make sure that it would work.
                
                We took a more active role, in effect, as mediator when 
      the bonds of trust and the lines of communication had become so 
      frayed that we were in danger of losing the peace process.   And 
      I did not want that to happen, and I didn't think either side 
      wanted that to happen.  So we did what was necessary to keep it 
      going.  But, obviously, if there is a genuine priority put on 
      this, there's a sense trust and mutual communication on both 
      sides -- the people in the region have to live with the 
      consequences of the agreements they make; it is far better for 
      them to take as large a role as possible in making those 
      agreements.  And so, to that extent, I agree with the Prime 
      Minister.
                Do you want to call on an Israeli journalist?  Is there 
      anyone --
      
      
                Q    Mr. President, you say that you are waiting for 
      Mr. Barak as a kid waiting for a new toy.  You don't think that 
      by this remark you make is some kind of patronizing on Mr. Barak, 
      that you want to play with him?  What kind of game do you want to 
      play with Mr. Barak?
      
                THE PRESIDENT:  No, I don't think it's patronizing at 
      all; it's just the reverse.  What I'm saying is that the United 
      States is a sponsor of the peace process.  We have done what we 
      could consistently for more than 20 years now through all kinds 
      of administrations to try to advance the peace process.  I have 
      probably spent more time on it than anyone has, and certainly 
      I've spent a lot of time on it.
      
                But my view is that we should not be in a patronizing 
      role, we should be in a supportive role.  We should do what is 
      necessary to keep the peace process going.  But you heard what 
      the Prime Minister said.  He said that the United States' role 
      was essential, it was best if it worked as a facilitator.  He has 
      already gone to see all the leaders of the region with whom he 
      must work -- or many of the leaders of the region with whom he 
      must work -- which I thought was the right thing to do in the 
      right order.  So I was supporting the position that he took.
      
                PRIME MINISTER BARAK:  Wolf Blitzer, you are half 
      American, half Israel, so you get priority.  (Laughter.)
      
                Q    Thank you, Mr. Prime Minister.  I think what the 
      previous reporter, Shimon Shiffer (phonetic) was asking the 
      President -- I don't think the President necessarily understood 
      the question.  Your comment at the Democratic fundraiser in 
      Florida the other day when you said you were as excited as a 
      young kid with a new toy about the meetings that you're going to 
      have with the new Prime Minister, which today have caused some 
      consternation, headlines in Israel -- that you were referring to 
      the Prime Minister as a new toy.
      
                THE PRESIDENT:  No, no -- I see, yes --  
      
                PRIME MINISTER BARAK:  May I tell you, Wolf, that I 
      feel like someone who got the mission of diffusing a time bomb, 
      and I believe that we are all under urgent need to deal very 
      seriously not with tricky interpretation of an innocent favorable 
      statement, but by looking into the real problems and focus on 
      solving them.
                THE PRESIDENT:  Yes, let me say, though -- I didn't 
      understand, you're right.  Thank you, Wolf.  That is -- in 
      English, what that means is that you are very excited.  It has no 
      reference to the Prime Minister.  For example -- (laughter) -- I 
      would never do that.  For example, if I -- no, no, if I were 
      taking a trip to Hawaii, I might say, I'm as excited as a kid 
      with a new toy -- doesn't mean I think Hawaii's a new toy, if you 
      see what I mean.  It means that it's a slogan, you know.  In 
      American English, it means I am very excited about the prospect 
      of the rejuvenation of the peace process.  And that's all it 
      means.  I would never say such a patronizing thing -- ever.  
                
                So I thank you -- thank you, Wolf.  This is an historic 
      moment.  Blitzer helps me make peace with the press and the 
      people of Israel.  That's wonderful.  (Laughter.)  Yes, now you 
      get a real question.
      
                Q    Mr. President, the Prime Minister has suggested 
      that he's going to have to use up a lot of his domestic political 
      capital in Israel in order to fully implement the Wye agreement.  
      Would it be wise to go right away to the final status issues and 
      let them save some of that political capital for the tough 
      decisions Israel is going to have to make down the road?  Would 
      you be willing to go along with deferring some of the agreements 
      that were achieved at Wye?
      
                THE PRESIDENT:  First of all, I'm not quite sure that's 
      what he said, but I think that those kinds of questions ought -- 
      may be properly to be asked of us after we have a chance to have 
      our meeting.  But the problem is, we have -- maybe we ought to 
      let him answer it -- but there is another party there and they 
      have their expectations.  So maybe I should let the Prime 
      Minister answer that. 
                
                PRIME MINISTER BARAK:  We abide by an international 
      agreement, Wye Agreement included.  It had been signed by an 
      Israeli freely-elected government, by the Americans and by 
      Chairman Arafat.  We are committed to live up to it.  But there 
      is a need to combine the implementation of Wye with the moving 
      forward of the permanent status agreement.  It could be this way 
      -- first Wye, then final status.  It could be this way.  But only 
      through an agreement with Arafat after mutual, open, frank and 
      direct discussion.
      
                If we, together, agree, together with the Americans and 
      Arafat, that something could be made in order to bring those two 
      elements together, I hope and believe that even the international 
      press would not resist it very forcefully.
                Q    Prime Minister Barak, you have met with President 
      Mubarak, you have met with King Abdullah.  What are the 
      possibilities of a meeting between you and President Hafiz al 
      Assad?
      
      
                PRIME MINISTER BARAK:  We still wait to see.  When the 
      time comes, I hope we'll be able to meet.  It takes two to tango.  
      I'm ready, the arena is ready; maybe the dancing instructor is 
      ready.  We have to find opportunity and begin.
      
                THE PRESIDENT:  Now, let me say, that is not a 
      patronizing remark toward President Assad as the Prime Minister's 
      dancing partner.  (Laughter.)
      
                Helen, go ahead.
      
                Q    Mr. Prime Minister, when do you plan to disband 
      the heavily armed settlements in Palestine?
      
                PRIME MINISTER BARAK:  I'm not sure whether I 
      understood the question, so could you please repeat it?
      
                Q    There are more and more settlements being built 
      around Jerusalem and so forth.  Are you going to disband them?
      
                PRIME MINISTER BARAK:  No.  I'm not going to build new 
      ones.  I'm not going to dismantle any one of them -- Israelis 
      citizens live in them.  They came to these places -- almost all 
      of them -- through an approval of the Israeli government.  We are 
      responsible for them.  But the overall picture will be settled 
      once we end the permanent status negotiation and whatever will be 
      agreed, we will do.  I believe in a strong block of settlements 
      that will include most of the settlers in Judeo-Samaria and the 
      Gaza Strip. 
                
                Thank you.
                
                THE PRESIDENT:  Thank you.
      
                Q    Mr. President, many Arab American organizations in 
      this country are very skeptical about Arabs getting a fair chance 
      in Israel, while Arab Americans from Arab descent and from this 
      country going to Israel having very harsh treatment.  There are 
      four people sitting in a jail without due process.  They are 
      badly treated at the airport.  Can you comment on that?
      
                PRIME MINISTER BARAK:  I will answer.  I'm ready to 
      look into this problem.  We have no intentions to humiliate or to 
      intimidate any Arab citizens, be it Israelis, Americans or other 
      countries.  And I cannot respond directly to the story you are 
      telling since I don't know the details.
      
                THE PRESIDENT:  Thank you very much.
      
      
                Q    Mr. President, do you personally believe in the 
      Palestinian right of return, even though you comments perhaps at 
      the press conference with Mr. Mubarak might not reflect a change 
      in U.S. policy?  
                
                And to Prime Minster Barak, one issue here in the 
      states has been the question of moving the U.S. embassy in Israel 
      from Jerusalem to Tel Aviv.  Do you think that that has to 
      happen?  I'm sorry -- from Tel Aviv to Jerusalem.  Thank you.  Do 
      you believe that that needs to happen  now?
      
                PRIME MINISTER BARAK:  Be careful about the directions 
      -- (laughter.) 
      
                Q    Do you believe that that needs to happen now, or 
      can that wait for progress in the peace process?
      
                THE PRESIDENT:  Do you want me to go first?  First of 
      all, as you correctly stated, nothing that I have said should be 
      interpreted as a change in United States policy.  I do think 
      there will be a general atmosphere when the peace is finally made 
      which will be positive.  That's all I said.  
                
                On that question, the question you asked me, that is 
      explicitly an issue stated for final status negotiations by the 
      parties.  That's part of the final status talks.  The United 
      States, as a sponsor of the peace process, has asked the parties 
      to do nothing to prejudge final status issues.  We certainly 
      should be doing nothing to prejudge the final status issues.  
      That is why I have had a consistent position on that, on the 
      embassy, on every issue -- whatever else we do, the United States 
      has no business trying to prejudge these final status issues.  
      That's what the parties have to work out in the final status 
      talks.
      
                     Q But Mrs. Clinton has certainly prejudged them, 
      sir.  
      
                PRIME MINISTER BARAK:  As the Prime Minister of Israel, 
      I would like to see all the embassies from all around the world 
      coming to Jerusalem, and we will do whatever we can to provide 
      the preconditions for it.  I feel that the essence of the peace 
      
      effort that we are trying to drive forward right now is the bring 
      within the shortest possible time a new landscape, political 
      landscape, in the Middle East that will make the whole question 
      irrelevant; you will see all the embassies together side by side 
      in Jerusalem.  Thank you very much.
      
                Q    Mr. Prime Minister, is there going to be Israeli 
      astronauts on the space station -- are you going to discuss this 
      issue, and do you desire such?
      
                PRIME MINISTER BARAK:  I like Israelis, especially 
      Israeli astronauts.  There is an officer, highly competent 
      officer in our Air Force and I would be more than glad to see him 
      walking in space when we enter the new millennium, maybe in 2001 
      or 2002.  Thank you.
      
                PRESIDENT CLINTON:  Thank you.  We have to go to work.
                
                Q    Mr. President, what about Mrs. Clinton?  She's 
      prejudged the issues.  What about Mrs. Clinton's prejudgment, Mr. 
      President?  Tell us about Mrs. Clinton's prejudgment, sir.
                
                THE PRESIDENT:  That's why Senator Moynihan's law is 
      good -- every individual member of Congress can express a 
      personal opinion, but because of the waiver, the United States 
      does not have to prejudge the final status issue.  That's good.  
      That's the way the law is set up, and it's good.  
                
                Q    Also, she's not President, is she?
                
                THE PRESIDENT:  That's right.
                
                Q    Yet.  (Laughter.)
      
                   END                      2:47 P.M. EDT
      
      
     
     @HWA 
     
47.0 Federal Computer Week: GSA makes last awards for security services pact
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 
     
      via http://www.securityportal.com/
      

    - 27 comanies in all received a piece of the pie, which is earmarked to help agencies working 
      on compliance with Presidential Decision Directive 63, protecting critical infrastructure. 
      Winners include Booz-Allen & Hamilton, GTE, IBM Federal, Trident
    
      http://www.fcw.com/pubs/fcw/1999/0712/web-safe-7-15-99.html
      
       
                                  

      JULY 15, 1999 . . . 17:30 EDT 


      GSA makes last awards for security services pact

      BY DIANE FRANK (dfrank@fcw.com)

      The Federal Technology Service's Office of Information Security has
      awarded the last of its Program Safeguard contracts for information security
      services and last week awarded the first task order under the program.

      The Safeguard blanket purchase agreement contracts provide services for
      agencies developing and implementing plans to comply with Presidential
      Decision Directive 63, which requires agencies to protect their critical
      infrastructures, including information systems, from cyberattacks.

      GSA awarded its first Safeguard task order to Booz-Allen & Hamilton Inc.,
      according to Richard Krauss, program manager for Safeguard. The company
      will help the Department of Veterans Affairs develop a network security
      architectural plan for the agency's transition from a private network to the FTS
      2001 public network.

      The 27 winning vendors are as follows:

      ACS Government Solutions Inc.
      Anteon
      AverStar
      BB&N Technologies Inc.
      Booz-Allen & Hamilton Inc.
      CACI Inc.
      Collins Consulting
      Computer Sciences Corp.
      Electronic Data Systems Corp.
      Electronic Warfare Associates Inc.
      GRC International Inc.
      GTE 
      IBM Federal
      Kajax Engineering Inc.
      KPMG LLP
      L&E Associates Inc.
      Litton/PRC Inc.
      Litton/TASC Inc.
      Lockheed Martin
      Logicon
      Science Applications International Corp.
      Software Technologies Group Inc.
      SRA International Inc.
      Telos Corp.
      Trident 
      TRW 
      Unisys Federal Systems

      
      
      @HWA
      
48.0 Federal Computer Week: Army awards $248 million ID contract
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

      via http://www.securityportal.com/

     - Symbol Technologies wins contract to provide a wide range of identification devices, including 
       smart cards and wireless scanners. Goal is to provide Army with realtime logistics data
    
     http://www.fcw.com/pubs/fcw/1999/0712/web-army-7-14-99.html
     
     
     JULY 14, 1999 . . . 18:50 EDT 


     Army awards $248 million ID contract

     BY BOB BREWIN (antenna@fcw.com)

     The Army awarded a $248 million contract Tuesday to Symbol
     Technologies Inc. to field and deploy a wide range of automatic identification
     devices including bar code readers, magnetic stripe cards and radio frequency
     "tags" to track supplies and parts for Army, Navy, Air Force and Marine
     users worldwide.

     The Army Communications-Electronics Command, which manages the
     Automatic Identification Technologies II procurement, said the contract will
     enhance warfighting through real-time access to logistics data. Lack of such a
     coherent system in the Persian Gulf War caused tons of supplies to pile up at
     ports while service personnel had to manually determine the contents of crates
     and standard 40-foot shipping containers.

     Symbol, headquartered in Holstville, N.Y., said it will supply DOD with a
     "complete line of wireless mobile computing and scanning systems" on the AIT
     II contract. Symbol said the systems it plans to supply through AIT II will
     enhance the rapid and accurate deployment of materials and personnel
     throughout the world, track supplies through the military's global distribution
     centers. The AIT II contract also calls for Symbol to provide smart card
     technology for military personnel identification.

     @HWA
    
49.0 Denial of Service Vulnerability in IBM AIX
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

      via http://www.securityportal.com/


      - A denial of service vulnerability has been discovered in the ptrace()
        system call of AIX versions 4.2.x and 4.3.x allowing non-root users to 
        crash the system. A temporary fix is available from IBM           
        
     http://securityportal.com/topnews/aix19990714.html
     
     -----BEGIN PGP SIGNED MESSAGE-----
      
      Tue Jul 13 20:46:31 CDT 1999
      
      ============================
      
      A denial of service vulnerability has been discovered in the ptrace() system call of AIX versions 4.2.x and 4.3.x allowing non-root users to
      crash the system. This vulnerability has been posted to the bugtraq mailing list.
      
      Temporary Fix
      
      =============
      
       
      
      A temporary fix is available via anonymous ftp from:
      
      ftp://aix.software.ibm.com/aix/efixes/security/adb_hang.tar.Z
      
      Filename sum md5
      
      ======================================================================
      
      unix_mp.42.adb_hang_fix 00772 2693 960214a1945f2c70311283adc0b231a3
      
      unix_mp.43.adb_hang_fix 15044 3302 584d1c5ea0223110e2d8eba84388f526
      
      This temporary fix has not been fully regression tested. The fix consists of a multiprocessor kernel which can be used on either a
      uniprocessor or multiprocessor machine. There may be a slight performance penalty when using a multiprocessor kernel on a uniprocessor
      machine.
      
       
      
      Use the following steps (as root) to install the temporary fix:
      
       
      
      1. Determine the version of the kernel fileset on your machine.
      
       
      
      # lslpp -l <fileset>
      
       
      
      If the version of the kernel fileset for your machine is not at the level described below, install the requisite APAR listed. This will help ensure
      that the temporary kernel fix will run properly.
      
      Release Fileset Version requisite APAR
      
      ===============================================================
      
      AIX 4.2.x bos.mp or bos.up 4.2.1.23 IY00689
      
      AIX 4.3.x bos.mp or bos.up 4.3.2.8 IY00727
      
      2. Uncompress and extract the fix.
      
      # uncompress < adb_hang.tar.Z | tar xf -
      
      # cd adb_hang
      
      3. Review and run the adb_hang.sh script to install the new kernel.
      
      # view ./adb_hang.sh
      
      # ./adb_hang.sh
      
      4. Reboot.
      
       
      
      Obtaining Fixes
      
      ===============
      
      IBM AIX APARs may be ordered using Electronic Fix Distribution (via the FixDist program), or from the IBM Support Center. For more
      information on FixDist, and to obtain fixes via the Internet, please reference
      
      http://aix.software.ibm.com/aix.us/swfixes/
      
      or send email to "aixserv@austin.ibm.com" with the word "FixDist" in the "Subject:" line.
      
      To facilitate ease of ordering all security related APARs for each AIX release, security fixes are periodically bundled into a cumulative
      APAR. For more information on these cumulative APARs including last update and list of individual fixes, send email to
      "aixserv@austin.ibm.com" with the word "subscribe Security_APARs" in the "Subject:" line.
      
       
      
      Contact Information
      
      ===================
      
      Comments regarding the content of this announcement can be directed to:
      
      security-alert@austin.ibm.com
      
      To request the PGP public key that can be used to encrypt new AIX security vulnerabilities, send email to security-alert@austin.ibm.com
      with a subject of "get key".
      
      If you would like to subscribe to the AIX security newsletter, send a note to aixserv@austin.ibm.com with a subject of "subscribe Security".
      
      To cancel your subscription, use a subject of "unsubscribe Security". To see a list of other available subscriptions, use a subject of "help".
      
       
      
      IBM and AIX are a registered trademark of International Business Machines Corporation. All other trademarks are property of their
      respective holders.
      
       
      
      -----BEGIN PGP SIGNATURE-----
      
      Version: PGP for Personal Privacy 5.0
      
      Charset: noconv
      
      iQCVAwUBN4vxDgsPbaL1YgqvAQFASAP9HBQ4UCcMURj0W0WnKivLo/UXF4yhs3Cl
      
      tX9H4tQsGo3U93G2cm3P59C8zbtZd355IVRxTtbOlCLL5CZBMIjNE7c6nyvvn0A0
      
      RCeC1T9+nxZZfFCG81Rd1OME242KzjVz/1w1jQtNqdYugm9/YHm8hamd+KCRNtXl
      
      e+x8Vg16YU4=
      
      =JB4f
      
      -----END PGP SIGNATURE-----
      
      @HWA   
     


50.0 Trinux revisited by www.securityportal.com 
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 
     
    The Linux Security Appliance


    BO2K Information Center
    July 12, 1999 - They say that good things come in small packages with Linux,
    but even so, it is hard to believe how much functionality you can get out of
    Trinux. Whether your network is primarily NT, Linux, or some other flavor of Unix is
    immaterial - if it is based on TCP/IP, Trinux can be a valuable tool. Trinux is the
    Linux Security Appliance, and is a valuable tool for any network engineer and
    security specialist.
    What is Trinux? Trinux is a small, portable, re-compiled version of Linux, stripped
    of non-essential modules and enhanced with GPL security tools. By doing an
    excellent job of identifying module dependencies, the authors of Trinux are able
    to create a special Linux distribution that can fit on two high density floppies.
    Some of the many tools included with Trinux are:
    Firewalk - this is a tool that employs traceroute techniques to discover and determine Access Control Lists for
    firewalls and routers.
    Ipfwadm - utility to administer the IP accounting and IP firewall services offered by the Linux kernel.
    Iptraf - IPTraf is a console-based network statistics utility for Linux. It gathers a variety of figures such as TCP
    connection packet and byte counts, interface statistics and activity indicators, TCP/UDP traffic breakdowns, and LAN
    station packet and byte counts. 
    Neped - stands for "NEtwork Promiscuous Ethernet Detector", a tool designed to detect Linux sniffers on a local
    network.
    Netwatch - monitors Ethernet traffic for hosts, packet counts and protocols.
    Nmap - The Network Mapper is the premier port scanning tool for Linux. Allows state of the art scanning using a
    variety of techniques.
    Snmpset/snmpget/snmpwalk - allows you to easily retrieve and set SNMP variables.
    Tcpdump - the standard packet sniffer for Unix.
    You can get Trinux at many sites that archive Linux tools. The authors have setup a site at www.trinux.org,
    containing the software, detailed documentation and version history. The software can be downloaded into two files,
    boot (the boot image) and classic (the applications). After downloading the files, simply use the rawrite utility (from
    DOS) or dd (from Linux/Unix), to create the floppies. Next, copy the module for your network card (a .o file, such as
    3c59x.o) to the boot floppy, and you are ready to go.
    How do we see usage of Trinux? Trinux is not a pretty, GUI-based management console, but a versatile tool you can
    take anywhere that can provide quick answers. Trinux is a must for consultants and network engineers who travel to
    many different sites and must diagnose a wide variety of problems. A Trinux user can quickly build a picture of a
    foreign network and assess security problems. Due to the fact that it can be carried around in just two floppies can
    give you the flexibility to quickly put a client's PC into service as a Trinux station. Make certain to carry driver modules
    for all of the network cards you think you will encounter. Network Administrators may want to keep a dedicated Trinux
    station in the computer room to provide a quick diagnosis of network security issues and to provide validation for (or
    contradiction with) other network management tools.
    The elegance and simplicity of Trinux displays not only the wisdom of the network appliance concept, but also shows
    the power of specially compiled Linux distributions to deliver on that concept. If you are responsible for the security of
    a network, large or small, you owe it to yourself to invest a couple hours of your time and test out this tool.

    
    @HWA
    
51.0 ComputerWorld: Crypto Expert - Most encryption software is insecure 
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     via http://www.securityportal.com/     
     
     - Bruce Schneier, author of Applied  Cryptography, says it is hard to tell whether problems lie in the alogorithm,
       implementation, or elsewhere. He strongly recommends staying conservative, and use well known and highly 
       scrutinized crypto algorithms    
       
     



         Crypto expert: Most encryption
                software is insecure
                         By Ann Harrison


      LAS VEGAS -- Respected cryptography authority Bruce
      Schneier this week told a security conference that most
      products and systems that use cryptography are insecure
      and most commercial cryptography doesn't perform as
      advertised. 

      Instead, he recommended that companies use strong
      random number generators and published nonproprietary
      algorithms and cryptographic protocols. 

      Schneier, who is president of Counterpane Systems in
      Minneapolis, author of Applied Cryptography and inventor of
      the Blowfish, Twofish and Yarrow algorithms, noted that it's
      difficult to distinguish bad cryptography from good
      cryptography in security products. 

      Experienced security testing is needed to uncover bugs, but
      products are often shipped without this type of evaluation,
      he told the audience at the Black Hat Briefings. "Beta testing
      can never uncover security flaws," Schneier said. 

      According to Schneier, flaws can be found almost
      anywhere: in the threat model, the design, the algorithms
      and protocols, the implementation, the configuration, the
      user interface, the usage procedures and other locations in
      the design of products. 

      There is usually no reason to use a new or unpublished
      algorithm in place of an older and better analyzed one,
      Schneier said. "There is no need ever for proprietary
      algorithms," he added. 

      Insecure random number generators can also compromise
      the security of entire systems since the security of many
      algorithms and protocols assumes good random numbers,
      Schneier said. He noted that random numbers are critical
      for most modern cryptographic applications including
      session keys, seeds for generating public keys and random
      values for digital signatures. 

      Security consultants at the conference said they took
      Schneier's suggestions to heart. "I would suggest that no
      one ever purchase proprietary encryption products if it's
      protecting anything of value because someone can
      reverse-engineer it," said Byran Baisden, a software
      engineer at Edge Technologies Inc. in Fairfax, Va. Edge
      designed the Nvision product for network management
      platforms and consults for the federal government. 

      Matthew S. Cramer, lead security practitioner at Armstrong
      World Industries Inc. in Lancaster, Pa., said Schneier does
      a good job pointing out flawed systems and helping
      companies evaluate products such as virtual private
      networks that use encryption. "The tough job is picking
      which ones are snake oil and which ones are real and
      Bruce provides a lot of information to the community to pick
      out which is which," Cramer said. 
  
      @HWA
      
52.0 Y2K Villains come in all shapes and sizes...
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
     http://www.computerworld.com/home/news.nsf/all/9907165y2kfraud/
     
     You network may be covered from the inside but what about physically huh?
     got thos suckers bolted down and and id card system in action y'all?
     
     Y2K 'repairs' could open door for
          billion-dollar thefts
         By Thomas Hoffman


      Don't be surprised if crackers make off with at least one
      electronic heist in the $1 billion range by taking advantage of
      the year 2000 problem, according to a new report from
      Gartner Group Inc. 

      Gartner believes that contractors and programmers hired by
      companies to make Y2K fixes may have left "trapdoors" to
      move money between accounts. 

      "The likely perpetrator would be a highly skilled software
      engineer who has worked on Y2K remediation efforts and
      understands both computer systems and the underlying
      business processes," Gartner said in a statement today.
      "...The worst-case scenario for theft would include a highly
      skilled software engineer involved with Y2K remediation who
      feels unrecognized or unappreciated." 

      An opportunity for theft could occur when a system crashes
      and repairs are made by a single software engineer without
      usual oversight and review, Gartner said. 

     @HWA
     

 3Com eyes new wireless standard for PALM
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
     http://www.computerworld.com/home/news.nsf/all/9907165palmwap

     3Com eyes new wireless standard
                                          for Palm
                                         By James Niccolai


     3Com Corp. is exploring an emerging technology called the
     Wireless Access Protocol (WAP) for possible use in its
     Palm computer, a move that would bring new Web
     browsing capabilities to the popular handheld device,
     analysts and sources familiar with the matter said this
     week. 

     Moving to WAP would be a significant step for 3Com, which
     has invested heavily to develop a text-based technology
     called "Web Clipping" for its wireless Palm VII, which was
     launched in May in the New York area. But analysts said the
     momentum growing behind WAP might not leave 3Com
     with any choice but to switch to WAP. 

     Web Clipping allows mobile users to download short bursts
     of text information from Web sites that have tailored content
     for 3Com's technology. Web Clipping doesn't allow users to
     surf the Web at large, but downloads information to "query
     applications" offered by more than 60 firms, including United
     Airlines, The Weather Channel, ETrade Group Inc. and The
     Wall Street Journal. The list of content and service
     providers using Web Clipping is growing, and users can
     download new query applications from Palm's Web site,
     3Com said. 

     In contrast, WAP provides a set of open standards that
     allow mobile devices like cell phones, pagers and handheld
     computers to browse content on the Web. Sites, however,
     must be reformatted to support a programming language
     called Wireless Markup Language that supports both text
     and bitmap images. 

     WAP still is an emerging technology, but the industry
     momentum behind it, combined with its potential to offer
     users greater freedom to surf the Internet, may force 3Com
     to make a transition from Web Clipping to WAP, analysts
     said. 

     "I think they would be foolish not to support WAP. They're
     trying to push Web Clipping as a metaphor for surfing the
     Web, but I don't think they'll be that successful," said Ken
     Dulaney, vice president of mobile computing research at
     market analyst firm Gartner Group Inc. in San Jose, Calif. 

     Dulaney characterized 3Com's apparent reluctance to
     move to WAP as "a touch of Microsoft-itis." 

     "I think it's stupid for them to wait," he said. "They ought to
     be in the middle of things. They're obviously waiting, but
     what they're waiting for I don't know." 

     3Com denies it has any plans to move away from its
     proprietary technology, although the company
     acknowledges that WAP is on its radar screen. 

     "We're certainly looking at WAP and find it very interesting,
     but we don't have any imminent plans" to use the
     technology, Tammy Medanich, product marketing manager
     at 3Com's Palm Computing division, said in a recent
     interview. 

     But two sources close to the matter told IDG News Service
     that 3Com has already begun talks with the WAP Forum, an
     industry group formed to promote the technology. Other
     industry sources have indicated to Gartner Group's Dulaney
     that 3Com will move to the new technology sooner rather
     than later, Dulaney said. 

     The world's largest handset makers, including L.M.
     Ericsson Telephone Co., Nokia Corp. and Motorola Inc., all
     have announced plans to ship WAP-enabled phones late
     this year or early in 2000. Telecom carriers AT&T Corp.,
     France Telecom SA and Nippon Telegraph & Telephone
     Corp. (NTT) are also backing the effort, along with IT
     heavyweights like Microsoft Corp. and Intel Corp. 

     "For 3Com to take on Microsoft and all the other players
     would be suicide in my opinion," Dulaney said. 

     3Com maintains that Web Clipping has proved popular
     among its early customers. What's more, the company
     notes, content for the Palm VII is available now, whereas
     companies are only just beginning to think about retooling
     their Web content for WAP. 

     Web Clipping is "fast and efficient" at downloading snippets
     of information, said Jill House, a research analyst at
     International Data Corp.'s (IDC) smart handheld devices
     group. Still, she characterized the technology as an "interim
     solution" to providing mobile users with wireless Web
     access. 

     Like Dulaney, House believes 3Com will be forced to yield to
     the market impetus building up behind WAP. IDC expects
     shipments of WAP-enabled products to increase rapidly,
     soaring from almost zero today to close to 10 million by
     2003. About 5 million Palm OS-based devices will ship in
     the same year, up from an estimated 2.9 million this year,
     House said. 

     "[WAP is] a strong technology with a lot of interest from the
     industry. Given both those factors, it would be very
     surprising if 3Com were not considering it" for use in the
     Palm, she said. 

     Officials at the WAP Forum declined to comment on
     whether any discussions with 3Com are under way, but
     said 3Com's membership to the Forum would be of great
     value. 

     "Our principal goal is to create one worldwide standard that
     all wireless handheld devices work on for Internet access
     and browsing, and it would be a huge accomplishment to
     have 3Com join," said Chuck Parrish, who recently
     completed his tenure as chairman of the WAP Forum.
     Parrish is also executive vice president at Phone.com Inc.,
     which makes client and server software for WAP devices. 

     One major benefit of having a single standard among
     wireless providers would be to enable content developers to
     write their content once and have it understood by all
     devices, Parrish said. 
     
     @HWA
      
54.0 Intel creates Net-specific unit.
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

     http://www.computerworld.com/home/news.nsf/all/9907165intelnet

     (Online News, 07/16/99 11:36 AM)



         Intel creates Net-specific unit
                        By Cheri Paquet


     Intel Corp. has divided its communications business into a
     networking business unit and a new unit dedicated to the
     development of Internet-specific products. 

     Intel's new Communications Products Group will include
     communication servers, computer telephony hardware,
     network appliances, routers, hubs, switches, VPN (virtual
     private network) software and LAN management hardware,
     the company said in a statement issued yesterday.
     Meanwhile, the Network Communications Group will
     continue to focus on developing Intel's microprocessors,
     LAN chip controllers and network processors. 

     To form the new Internet unit, Intel combined its
     Communications and Internet Server Division, Network
     Systems Division, Systems Management Division and the
     Dialogic subsidiary it recently acquired. Dialogic makes
     computer telephony software, network interfaces and media
     processing boards. 

     Intel Vice President John Miner, formerly general manager
     of the Enterprise Server Group, will head up the
     Communications Products Group and will report directly to
     Craig Barrett, Intel's president and CEO. Michael Fister,
     vice president of the Intel Architecture Business Group and
     general manager of Enterprise Server Group, will succeed
     Miner in his former role. 

        @HWA
             
55.0 Bugtraq: JavaScript used to bypass cookie settings in Netscape 
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
     Communicator 4.[56]x, JavaScript used to bypass cookie settings
     
     
     
     Peter W (peterw@USA.NET)
     Fri, 9 Jul 1999 18:18:57 -0400 
     
          Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] 
          Next message: Oliver Lineham: "Navigator cookie security" 
          Previous message: ET LoWNOISE: "[LoWNOISE] Lotus Domino" 
          Next in thread: Oliver Lineham: "Navigator cookie security" 
          Reply: Oliver Lineham: "Navigator cookie security" 
          Reply: Claudio Telmon: "Re: Communicator 4.[56]x, JavaScript used to bypass cookie settings" 
     
     
     
     As Netscape has not acknowledged my email or bug report from last week, 
     and one form of this vulnerability is currently being used, I have decided 
     it best to publicize this problem. 
     
     SUMMARY 
     
     This post describes a flaw verified in Netscape Communicator 4.6-0 as 
     distributed by Red Hat software for x86 Linux and Communicator 4.51 and 
     4.61 for Windows NT. Communicator does not enforce "originating server" 
     cookie restrictions as expected when JavaScript is enabled, leading to 
     privacy issues for users who may think they have taken reasonable 
     precautions. 
     
     BACKGROUND 
     
     Communicator 4.6 has a setting to warn before accepting cookies, and 
     another to "Only accept cookies originating from the same server as the 
     page being viewed". That latter option is supposed to, and used to, 
     completely and quietly reject "DoubleClick" style third party ad cookies, 
     i.e., cookies from servers that did not produce the main HTML document. 
     
     These third party ad servers use cookies to track Web users as they move 
     through completely unrelated Web sites. By accepting the cookie, one 
     allows the third party to compile a profile of visits to other Web sites 
     that use the third party's ad service (though normally the third party 
     does not know the end user's exact identity). 
     
     PROBLEM 
     
     Last week I noticed a warning for a cookie (for doubleclick.net) not from 
     the domain of the page I was viewing (newsalert.com) -- which the cookie 
     settings should have rejected outright. If I turn off the warning, 
     Netscape silently accepts the doubleclick cookie, although I still have 
     the "originating server" restriction enabled. 
     
     MEANS OF EXPLOIT 
     
     The reason? I had JavaScript enabled for Web browsing. The offending 
     newsalert page used a tag something like 
      <SCRIPT language="JavaScript1.1" SRC="http://ad.doubleclick.net/..."> 
     and Communicator seems to interpret this as a "page" from doubleclick when 
     it's only getting a snippet of JavaScript code. 
     
     INTENT ? 
     
     I have been in communication with DoubleClick on this issue. They raise 
     credible reasons to justify using <SCRIPT> instead of simple <A><IMG> 
     tags: preventing caching, and allowing the ability to use media other than 
     simple images for their ads. Nevertheless, this technique does subvert 
     user preferences, regardless of whether this was the original intent. 
     DoubleClick does have an "opt out" program that sets a generic cookie to 
     prevent further tracking; see http://www.adchoices.com/ for details. 
     
     Newsalert management and web staff have not responded. 
     
     COMPETING PRODUCTS 
     
     Initial tests with Microsoft Internet Explorer 5.0 for Windows NT suggest 
     that it does not have any option like Netscape's "originating server" 
     restriction. By explicitly categorizing *.doubleclick.net in a zone like 
     "Restricted sites" where all cookies are disabled, MSIE 5 will reject 
     cookies offered by doubleclick.net <SCRIPT> tags; of course this must be 
     done for each third party domain individually. 
     
     WORKAROUNDS 
     
     Concerned Netscape users should either turn on warnings and read notices 
     carefully, disable JavaScript, or completely disable cookies. 
     
     SUGGESTED FIX 
     
     The cookie security mechanism should not accept <SCRIPT SRC="..."> as a 
     valid "page" for the purpose of the cookie settings. Nor should it allow 
     any similar means of bypassing the "originating server" restriction, 
     including external CSS files[1], or other documents not of type text/html. 
     
     For each rendered page, the domain of the main document's URL should be 
     compared against the domains of any other supplemental pieces in deciding 
     if those pieces qualify as "originating server" content. 
     
     VENDOR RESPONSE 
     
     While there has been no response from Netscape Communications, I am 
     grateful for the prompt, polite responses of DoubleClick's employees; 
     although I disapprove of their willfully continuing to use this technique, 
     and their advocacy of unwieldy "opt-out" procedures. 
     
     -Peter 
     
     [1] By specifying a style sheet from a different domain with 
       <link rel="stylesheet" type="text/css" href="..."> 
     you can also sneak a cookie past the "originating server" restriction, but 
     only if both style sheets and javascript are enabled.[2] 
     
     Even better, you can set cookies for more domains with "Location:" 
     redirects. E.G. "http://example.org/" can have a URL like 
     http://example.com/redirectPlusCookie in the LINK tag that issues a 
     Set-Cookie and a Location header, redirecting the user to 
     http://example.net/stylesheetPlusCookie. With JavaScript and CSS enabled, 
     Netscape will accept cookies from both example.com and example.net. 
     
     Or, a more vicious approach is to reference a URL on the same server which 
     issues the redirect for the CSS or <SCRIPT> SRC to another domain. Users 
     who look at the HTML source won't see anything unusual, but such 
     redirections will also bypass the "originating server" setting. 
     
     Finally, if you're not convinced of the problems, consider that these 
     "originating server" tricks also work if you're viewing a file:// URL, 
     even with a cookie-setting intermediate redirect. 
     
     [2] Sorry, Netscape, I didn't tell you this last week because only now did 
     I bother to test mechanisms other than the direct <SCRIPT> tag. 
     
     The Intel Pentium III chip: designed to deny your privacy 
     Boycott Intel. http://www.privacy.org/bigbrotherinside/ 
     
     
     
          Next message: Oliver Lineham: "Navigator cookie security" 
          Previous message: ET LoWNOISE: "[LoWNOISE] Lotus Domino" 
          Next in thread: Oliver Lineham: "Navigator cookie security" 
          Reply: Oliver Lineham: "Navigator cookie security" 
          Reply: Claudio Telmon: "Re: Communicator 4.[56]x, JavaScript used to bypass cookie settings" 

@HWA					 










56.0 Granny Hacker from Heck attends DefCon
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
     via AntiOnline http://www,antionline.com/
     
     Granny Hacker From Heck Visits Def Con 
     Thursday, July 15, 1999 at 16:29:59
     by Carolyn Meinel - Writing For AntiOnline 

     July 1, 1999. A staffer from Loompanics calls to say that the
     Def Con convention staff has ordered them to not sell my "The
     Happy Hacker: A Guide to Mostly Harmless Hacking"
     (http://happyhacker.org/buyhh.html) at their upcoming computer
     criminal soiree.

     This means war! How can I best stick it to the Def Con d00dz?
     Oho, their web site (http://www.defcon.org) is advertising a
     Bastard Operator from Hell (BOFH)
     (http://www.rangsoc.demon.co.uk/bofh_last.htm) contest. A
     true BOFH should run a computer with all sorts of tantalizing
     services. Build something that looks like an eight year old could
     break in. Then the attacker runs exploit after exploit against the
     box. And every attack mysteriously SCREWS UP!!!
     Muhahaha. By offering a prize for the best victim computer, the
     Def Con guys hops to get better targets for the hackers playing
     Capture the Flag.

     Amarillo, TX, July 6 and 7, I'm out there with Happy Hacker
     Wargame director Vincent Larsen and wargame admin Jon to
     put together our BOFH entry: Fangz. Ah, yes, Fangz, an Intel
     box running Red Hat Linux (at least that's what any port
     scanner would tell you, snicker). It runs ftp, pop3, smtp, a DNS
     server, telnet with a guest account with no password, guest
     access to vi and a C compiler; and a Lithium Quake server with
     back doors in place. Ahem, every service is working according
     to the RFCs, but not quite running the way hackers would
     expect:):)

     OK, let's get this straight. All I did was provide the hardware
     and use the Hacker Wargame to test various iterations of
     Vincent and Jon's Process Based Security
     (http://www.sage-inc.com) modifications to Red Hat Linux.
     Red Hat is a hacker's paradise. A clean install of the latest
     version has over 200 ways to break into it. Vincent and Jon's
     version of Red Hat, however, would make the BOFH himself
     proud. That's why I decided against entering a FreeBSD or
     OpenBSD system. They have pretty good security, too. But
     they don't TORMENT hackers the way Process Based
     Security does.

     At sunrise Friday morning, July 9, I caught a ride on the Happy
     Hacker Godfather's King Air business jet, along with him and
     Jon. Also there was this giant Texan on board. I asked him,
     "You look like a bodyguard. You look like you could pick up
     someone by the neck and hold him out at arm's length."

     "I'm an interior decorator. That's my story and I'm sticking with
     it."

     Nine AM we are on site at the Alexis Park hotel. We stagger
     along with Fangz, a monitor, laptop, my favorite Ethernet hub,
     my crummy backup Ethernet hub, lots of spare 10BASE-T
     cabling, tools, and duct tape just in case I need to tape anyone
     to the wall.

     A Def Con "goon" (security guard) helps us out by taking us to
     the head of the registration line. Who should be handling, um,
     exceptional cases such as ourselves but Pete Shipley. As his
     mouth drops with surprise to see us Happy Hacksters out in
     force, he fails to flash his copyrighted vampire fangs. Now these
     are very important, copyrighted vampire fangz, er, I mean,
     fangs. Shipley's lawyer actually sent several letters to the
     publisher of my Happy Hacker book claiming that Shipley had
     gotten a copyright on wearing vampire fangs, so the guy on the
     cover of my book wearing fangs owed Shipley royalties. Or
     something like this. 

     Anyhow, the publisher, being a hacker himself (Dr. Mark
     Ludwig), decided to have a little fun with Shipley. In the second
     edition he blotted out Shipley's fanged features with a green
     blob reading "hey man get my face off this cover."

     Anyhow, I think Mark using Shipley's copyrighted fangs on my
     book cover is why Shipley can't wear fangs any more. That
     must be what got Shipley to being such a major enemy of mine.
     After all, my lady BOFH personality ought to win the adulation
     of hackers everywhere. LART, LART, who has the LART?;^)
     (http://www.winternet.com/~eric/sysadmin/lart.1m.html)

     Shipley swears it isn't because I hacked him at Def Con 3 in
     front of dozens of witnesses (see Granny Hacker from Heck).
     Oh, yes, if you are a reporter, contact me and I'll give you
     phone numbers for two of those witnesses.

     Well, that fangless Shipley just about ruined my day. What next,
     would Cult of the Dead Cow's (http://cultdeadcow.com) Deth
     Vegetable trash can his Mr. T bust and prance on stage in a
     business suit? 

     We got Fangz set up pretty quickly. All I did was some physical
     stuff. Meanwhile, Jon changed the gateway, DNS server and IP
     address himself because there are some interesting twists to
     Fangz. Then he spent the next few hours waiting for the Capture
     the Flag/BOFH contest to start by changing a few more things
     on Fangz, like the process control tables for the "mv" and "cat"
     commands. Oh, you say you never heard of Red Hat Linux
     "process control tables"? Muhahaha.

     Then... Priest pays me a visit. Priest. He's a tall middle aged guy
     whose trademark is the loud Hawaiian shirts and shorts he
     wears at every Def Con. At Def Con 5 he won his "I am the
     Fed" T-shirt by showing off an FBI badge. Of course I believe
     everything I see.

     "Carolyn," he gestures to me. He sidles up close and whispers,
     "I left the agency a few weeks ago. An Internet startup in
     California offered me a chance to get rich. I have a
     nondisclosure agreement for you. Interested?"

     Of course I like to get rich, too. I sincerely believe that Internet
     startups like to offer FBI agents tons of money. "Sure."

     Meanwhile the Capture the Flag/BOFH game has finally gotten
     started. Less than 100 of the 3,600 Def Con attendees have
     signed up to play the game. What? Less than one hundred? I
     ask several players. They all say there are perhaps only 200
     people at Def Con who actually know how to break into
     computers. The rest? Feds, narcs, groupies, and fakes. And
     BOFHs:):)

     Suddenly people start shouting. I turn to see a man prancing on
     top of a table next to the Penguin Palace booth. He is naked
     except for an extremely tiny g-string. It's a good thing his
     genitals are tiny enough to fit into it. Then he pulls on his jeans
     and leads a parade of drooling teenagers out of the room.

     A tiny waisted bleached blonde with braless boobs in a
     spaghetti string shirt prances over to some Capture the Flag
     players. Not only is each boob the size of her head, they are
     powered by antigravity devices. From time to time she pulls up
     her shirt and sticks her naked boobs into the faces of the
     players. They keep on shooing her off -- "We're trying to hack,
     dammit!" 

     (to be continued: groupies get drunk and laid; Feds, narcs and
     Cult of the Dead Cow urge code kiddies to hack more
     government Web sites so Congress will boost the Information
     Warfare budget from $1 billion to $1.4 billion; fangz LARTs
     hackers; Michael Schiffman beefs up his muscles with a bicycle
     pump; Shipley remains fangless; Priest attempts an entrapment
     scheme; and Granny Operator from Heck gets into trouble.)
     
     @HWA

57.0 Carolyn's ("Granny Hacker") profile on Antionline
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     The Granny Hacker From Heck 
     Tuesday, February 23, 1999 at 11:43:38
     by Carolyn Meinel - Writing For AntiOnline 
  
     I sit in my home office, slaving over a hot computer. It's an NT
     server; next to it is an Indigo running Irix 6.2. Across the room is
     my Slackware box. They are linked by, ta, da! Ethernet. Two
     modems hum with TCP/IP over PPP.
  
     I'm the grannie hacker from heck. Elite d00dz tremble before my
     wrath. You don't believe me? Check out this
     (http://www.attrition.org/slander/content.html). See? Some of the
     scene's most dreaded hackers and brilliant computer security
     experts are trembling before my awesome skillz as, so they say, I
     run around erasing the systems files of helpless hacker boxes. I'm
     talking about people such as admitted black hat
     (http://www.wired.com/news/news/culture/story/16872.html)
     Brian Martin, AKA jericho, trembling in his boots. You know,
     the computer security professional from Repent Security, Inc.
     (http://www.repsec.com) Come on, check this out
     (http://www.attrition.org/slander/content.html) and see how
     terrified he is of me!
  
     Heck, even some FBI agents think I've waged a war of naughty
     images plastered over the likes of the New York Times and
     PenthouseWeb sites -- that I'm the Hacking for Girliez gang.
     Don't believe me? Martin even has a sound bite on his Web site
     with me apparently confessing to their crimes!
     (http://www.attrition.org/shame/www/admit.html)
  
     So how did I become the grannie hacker from heck? It all started
     in 1995 when I went to Def Con III. Being such a good
     housekeeper, I couldn't help but be the person who discovered a
     live phone line in the convention ballroom. Of course I sprawled
     out on the floor, plugged my laptop into the line and telneted into
     a shell account. Lo and behold, "Evil Pete" Shipley, leader of the
     Dis Org gang (http://www.dis.org/doc.html), strode over. He was
     quite a wonderment, with fangs and spurs and lovely black hair
     flowing to his waist. He crouched down beside me and asked,
     "You got a telnet session going?"
  
     "Yup."
  
     "May I borrow it for a minute? I need to do something at work."
  
     That was when the naughty side of me took over, you know, the
     Mrs. Hyde thing. "Suurreee:)," I replied. I handed my laptop to
     him, then leaned over and clicked a function key.
  
     "What did you just do?" Evil Pete demanded.
  
     "I turned on logging." I tried to wipe the cat got the canary look
     off my face.
  
     "You tried to steal my password!" Evil Pete stood up and started
     shouting, to no one in particular, "This woman tried to hack me!
     Bad hacker etiquette!"
  
     "Sheesh," I pouted. "It's my computer, I can run keystroke
     logging if I want to!"
  
     Maybe I was plum lucky. Full as that ballroom was with guys
     toting Miranda cards, not a single Fed rushed over to bust me.
     That was what really got me inspired. I could hack a big wig
     computer security fellow right in front of the Feds, and get away
     with it! The sense of power drove me mad, muhahaha....
  
     Anyhow, that is how I got started persecuting the biggest and the
     baddest hackers and computer security experts on the planet.
  
     Recently the organizer of Rootfest (http://www.rootfest.org)
     kicked me off the program of his hacker con because Evil Pete
     had warned him that I had put out a special, secret Guide to
     (mostly) Harmless Hacking showing newbies how to hack Pete's
     dis.org domain. Pete even showed him a copy of this GTMHH, a
     special edition of Vol.1, #3. It's one that you won't find anywhere
     on the Web, I think only Pete, Mr. Rootfest and I have copies of
     it. Anyhow, this smart move of Pete's has saved the planet from
     the live "how to hack" class I was going to teach at Rootfest.
  
     Intoxicated as I am by hacking, nowadays my spinning wheel sits
     gathering dust, and a shirt I was sewing lies half-finished. I used
     to be such a sweet housewifey, I swear! You don't believe me? I
     have witnesses! I used to demonstrate wool carding at the New
     Mexico State Fair! I used to make gourmet goat cheese and
     station bouquets of cut flowers from my greenhouse in
     Martha-Stewart-approved locations about my home. 
  
     What caused my fall from the Better Homes and Gardens set?
     The sweet taste of being a meanie against the world's hairiest
     hackers!
  
     Sooo, will the rampage of grannie hacker from heck ever end?
     My victims are trying to figure out how to defend themselves
     against me. Evil Pete told the organizer of Rootfest that in self
     defense, my hacker victims have brought many lawsuits against
     me. Much more effective than a firewall, right? Especially against
     us Uberhacker grannies!
  
     Now, I haven't seen any of these lawsuits, but as we all know,
     hackers never lie. The suspense is getting to me. When will this
     army of lawyers my victims have marshalled actually materialize?
     Will they sue me into submission? How much more damage will I
     and my Happy Hacker (http://www.happyhacker.org) army of
     newbies do before lawyers save the world from my
     depredations? Stop me before I hack again!
  
     In the meantime, while waiting for the lawyers to save you, what
     can you do to keep me from making naughty body parts sprout
     on your Web site? Here are my top five suggestions:
  
     1) Buy my Happy Hacker book. I don't rm the operating system
     of anyone who buys my book, because after reading it you will
     know enough to protect yourself from me. Also, when you see
     me trying to secure shell into your ftp port, you'll know I'm just
     yanking your chain.
  
     2) Send me computer jokes. I'm a sucker for them and will be
     too busy laughing and forwarding them to my friends to hack you.
     The following is an example of something that meets my
     laughability standards:
  
     An engineer, a systems analyst, and a programmer are driving
     down a mountain road when the brakes fail. They scream down
     the mountain gaining speed every second and screeching around
     corners. Finally they manage to stop, more by luck than by
     judgment, inches from a thousand foot drop to the jagged rocks
     on the valley floor. More than slightly shaken, they emerge from
     the car. "I think I can fix it," says the engineer. The systems
     analyst says, "No, I think we should take it into town and have a
     specialist examine it." The programmer, holding his chin between
     thumb and forefinger says, "Okay, but first I think we should get
     back in and see if it does it again."
  
     3) Give me a 120 cubic meter Cameron hot air balloon with
     complete accessories, you know, stuff like a rate of
     ascent/descent meter, GPS, one ton king cab chase truck with
     Tommylift gate... I'll be so busy accidentally landing on the
     classified areas of Sandia Labs, Area 51 etc. that I'll retire my
     computers next to the spinning wheel and unfinished shirt. I can
     see it now, "Gosh, Colonel, you know how these balloons are, I
     got caught in a thermal and next thing I knew I was here:)"
  
     4) After we had a fight, my ex-husband used thermite to melt
     down our 30 mm Finnish antitank gun. Gimme another one. With
     ammunition. Or else.
  
     5) Our church music director could use 50 copies of the score
     for Jesus Christ Superstar. If I can get some snivelling coward to
     give them to us in exchange for me promising not to hack him,
     maybe I can get to sing Mary Magdalene. If Lisa gets the part, I'll
     hack the church computer so Zippy the Pinheadisms creep into
     the bulletins.
  
     I guess that's enough extortionate demands. I gotta get back to
     sneaking Trojans into military computers so I can launch World
     War III while making it look like Y2K bugs so I won't get into
     trouble. As for those computer security professionals I've been
     fubaring, do you suppose I'll ever feel remorse? No way! If they
     want to call themselves computer security experts, they'd better
     be ready to take heat from the granny hacker from heck!
  
     Carolyn Meinel (cmeinel@techbroker.com) is a computer fubar
     expert and clown princess of the non-profit Happy Hacker, Inc.
     She lives in Cedar Crest, NM with her long-suffering hubby, four
     cats, three horses, three dogs, two toads and two mosquito fish.
  
     PS: The thing about the thermite is a slight exaggeration.
     Everything else is true -- remember, you read this on the Internet,
     so it must be true. Be sure to email a copy of this to Craig
     Shergold and everyone else your know and Bill Gates will give
     you $1000. Be sure to put "Good Times" in the subject. If you
     don't email this out within ten days, you will be cursed with seven
     years of bad luck and wake up in a bathtub full of ice with your
     kidneys missing. Honest! 
     
     <sic>
     
     @HWA
     
58.0 HP Support Bulletin HPSBUX9907-100
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
     From http://securityportal.com/topnews/hp19990708.html
      
     -------------------------------------------------------------------------------
     
          Document ID: HPSBUX9907-100
     
          Date Loaded: 19990707
     
          Title: CDE Leaves Current Directory in root PATH
     
           
     
     -------------------------------------------------------------------------
     
          HEWLETT-PACKARD COMPANY SECURITY BULLETIN: #00100, 07 July 1999
     
     -------------------------------------------------------------------------
     
     The information in the following Security Bulletin should be acted upon as soon as possible. Hewlett-Packard Company will not be liable for any
     consequences to any customer resulting from customer�s failure to fully implement instructions in this Security Bulletin as soon as possible.
     
      
     
     -------------------------------------------------------------------------
     
     PROBLEM: The current directory is in the root user�s PATH after logging in using CDE.
     
     PLATFORM: HP 9000 series 700/800 at hp-ux revision 10.X
     
     DAMAGE: Increase in privileges.
     
     SOLUTION: Modify /usr/dt/bin/Xsession until a patch is available.
     
     AVAILABILITY: This advisory will be updated when patches are available.
     
      
     
     -------------------------------------------------------------------------
     
      
     
     I.
     
               A. Background - The PATH environment variable is constructed from several sources including dtsearchpath and scripts in
               /etc/dt/config/Xsession.d/ and /usr/dt/config/Xsession.d/. The resulting PATH contains the string "::" which will be interpreted as the
               current directory. The root user should not have the current directory in the PATH.
     
               B. Fixing the problem - Since the PATH environment variable can be affected by dtsearchpath and several scripts, the
               recommended solution is to clean up the root user�s PATH after is has been created.
     
     In /usr/dt/bin/Xsession just before this:
     
      
     
     # ###########################################################################
     
     #
     
     # Startup section.
     
      
     
     Add this:
     
      
     
     ###################### Clean up $PATH for root ##########################
     
     if [ "$USER" = "root" ]
     
     then
     
     Log "Clean up PATH for root user"
     
     Log "Old PATH = $PATH"
     
     PATH=�echo $PATH | awk �
     
     {
     
     # Remove elements from PATH that are
     
     # (a) "."
     
     # (b) ""
     
     # � blank
     
     #
     
     gsub (" ",":", $0) # Substitite ":" for each blank
     
     n = split ($0, path, ":") # Split into elements with ":" as delimiter
     
     first = 1 # To suppress leading ":" in new PATH
     
     for (i=1; i&lt;=n; i++) {
     
     len = length(path[i])
     
     dot = index(path[i], ".")
     
     dot_only = 0
     
     if ((len == 1) && (dot==1)) {
     
     dot_only = 1
     
     }
     
     # print element if it is not "" and not "."
     
     if (!(len==0) && !(dot_only==1)) {
     
     if(first != 1) {
     
     printf (":") # if not first element, print ":" in front
     
     }
     
     printf ("%s",path[i])
     
     first = 0
     
     }
     
     }
     
     }
     
     END { printf ("\n") }��
     
     Log "New PATH = $PATH"
     
     fi
     
     ###################### End - Clean up $PATH for root ####################
     
               C. To subscribe to automatically receive future NEW HP Security
     
               Bulletins from the HP Electronic Support Center via electronic mail, do the following:
     
               Use your browser to get to the HP Electronic Support Center page at:
     
          http://us-support.external.hp.com
     
          (for US, Canada, Asia-Pacific, & Latin-America) http://europe-support.external.hp.com (for Europe)
     
          Login with your user ID and password (or register for one).
     
          Remember to save the User ID assigned to you, and your password.
     
          Once you are in the Main Menu:
     
               To -subscribe- to future HP Security Bulletins,
     
     click on "Support Information Digests".
     
               To -review- bulletins already released from the main Menu,
     
     click on the "Search Technical Knowledge Database."
     
          Near the bottom of the next page, click on "Browse the HP Security Bulletin Archive".
     
          Once in the archive there is another link to our current Security Patch Matrix. Updated daily, this matrix categorizes security patches by
          platform/OS release, and by bulletin topic.
     
          The security patch matrix is also available via anonymous ftp:
     
          us-ffs.external.hp.com
     
          ~ftp/export/patches/hp-ux_patch_matrix
     
               D. To report new security vulnerabilities, send email to
     
               security-alert@hp.com
     
          Please encrypt any exploit information using the security-alert PGP key, available from your local key server, or by sending a message
          with a -subject- (not body) of �get key� (no quotes) to security-alert@hp.com.
     
          Permission is granted for copying and circulating this Bulletin to Hewlett-Packard (HP) customers (or the Internet community) for the
          purpose of alerting them to problems, if and only if, the Bulletin is not edited or changed in any way, is attributed to HP, and provided such
          reproduction and/or distribution is performed for non-commercial purposes.
     
          Any other use of this information is prohibited. HP is not liable for any misuse of this information by any third party.
     
     ________________________________________________________________________
     
     -----End of Document ID: HPSBUX9907-100--------------------------------------
     
     @HWA 

59.0 Microsoft Security Bulletin (MS99-024): Patch for Unprotected IOCTLs
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
     ********************************
     
     Microsoft Security Bulletin (MS99-024)
     
     --------------------------------------
     
      
     
     Patch Available for "Unprotected IOCTLs" Vulnerability
     
     Originally Posted: July 06, 1999
     
     Summary
     
     ======
     
     Microsoft has released a patch that eliminates a vulnerability that could allow denial of service attacks against a Microsoft� Windows NT�
     workstation, server or terminal server. An unprivileged program can disable the local mouse or keyboard on a server or workstation, and disable
     the console mouse or keyboard on a terminal server.
     
     Frequently asked questions regarding this vulnerability can be found at
     
     http://www.microsoft.com/security/bulletins/MS99-024faq.asp
     
     Issue
     
     ====
     
     The IOCTLs that are used to obtain services from the keyboard and mouse drivers in Windows NT do not require that the calling program have
     administrative privileges. A user-level program could use legitimate calls to disable the mouse and keyboard, after which the machine would need
     to be rebooted to restore normal service. On a terminal server, such a program could disable the keyboard and mouse on the console.
     
     Affected Software Versions
     
     =========================
     
          Microsoft Windows NT Workstation 4.0 
          Microsoft Windows NT Server 4.0 
          Microsoft Windows NT Server 4.0, Enterprise Edition 
          Microsoft Windows NT Server 4.0, Terminal Server Edition
     
      
     
     Patch Availability
     
     =================
     
          Windows NT Server and Workstation 4.0:
     
               ftp://ftp.microsoft.com/bussys/winnt/winnt-public/
     
               fixes/usa/nt40/Hotfixes-PostSP5/IOCTL-fix/
     
          Windows NT Server 4.0, Terminal Server Edition:
     
               ftp://ftp.microsoft.com/bussys/winnt/winnt-public/
     
               fixes/usa/nt40tse/Hotfixes-PostSP4/IOCTL-fix/
     
                
     
     NOTE: Line breaks have added to the above URLs for readability
     
     More Information
     
     ===============
     
     Please see the following references for more information related to this issue.
     
          Microsoft Security Bulletin MS99-024:
     
          Frequently Asked Questions, http://www.microsoft.com/security/bulletins/MS99-024faq.asp.
     
          Microsoft Knowledge Base (KB) article Q236359,
     
          Denial of Service Attack Using Unprotected IOCTL Function Call, http://support.microsoft.com/support/kb/articles/q236/3/59.asp. (Note: It
          may take 24 hours from the original posting of this bulletin for the KB article to be visible; however, a copy will be immediately available in
          the patch folder.)
     
          Microsoft Security Advisor web site,
     
          http://www.microsoft.com/security/default.asp.
     
     Obtaining Support on this Issue
     
     ==============================
     
     This is a fully supported patch. Information on contacting Microsoft Technical Support is available at
     http://support.microsoft.com/support/contact/default.asp.
     
     Acknowledgments
     
     ==============
     
     Microsoft acknowledges Mark Russinovich of Systems Internals (http://www.sysinternals.com) for discovering this vulnerability and reporting it to
     us.
     
     Revisions
     
     ========
     
          July 06, 1999: Bulletin Created.
     
      
     
      
     
     --------------------------------------------------------------------------
     
     THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND.
     MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND
     FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
     DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
     DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
     SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO
     THE FOREGOING LIMITATION MAY NOT APPLY.
  
 
60.0 ZDNet: Does the media cause hacking? 
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    
    - short preview of DEF CON 7.0 in Las Vegas, July 9-11. Article quotes
    several experts, saying that the extensive reporting and fame given those who deface a government web page is
    adequate incentive to do it
    
         
     --------------------------------------------------------------
     This story was printed from ZDNN,
     located at http://www.zdnet.com/zdnn.
     --------------------------------------------------------------
     
     Does the media provoke hacking?
     By Robert Lemos, ZDNN
     July 5, 1999 6:34 PM PT
     URL: http://www.zdnet.com/zdnn/stories/news/0,4586,2288043-2,00.html
     
     Could the media be the cause of the recent rash of hacker outbreaks? The answer may come at
     DEF CON 7.0, the world's biggest hacking spectacle, which kicks off this coming weekend.
     
                           DEF CON, an annual strange brew of security experts, law
                           enforcement officials, hackers and, yes -- "The Media" -- descends
                           upon Las Vegas this Friday.
     
                           The event will be televised. It will also be streamed on the Web,
                           reported upon for newspapers and Web sites, and written about in
                           magazines for months to come.
     
     And all that attention has some media analysts questioning whether the media's coverage of
     hacking and cyber vandalism promotes more of the same.
     
     "Every step in the evolution of hackers, the media has gotten the story
     wrong," said Jon Katz, a media critic with Slashdot.org and Wired Magazine.
     
     "When the media uses the term 'hacker,' they are really talking about vandals.
     It doesn't help that the media falls into the trap every time."
     
     Graffiti on the Net
     One indication of the media's effect on hacking: Such unwelcome Web
     intrusions, at least anecdotally, are on the rise.
     
     Boston-area security consultant B. K. DeLong says there have been more than 1,300 incidences
     of Web-page defacements so far this year (he only began tracking the number of hacks late last
     year).
     
     They're certainly gaining in prominence: Several Web site hacks, including the WhiteHouse.gov,
     Senate.gov and Army.mil, were covered extensively by major media such as CNN and the New
     York Times, as well as by the electronic media, including ZDNet (NYSE:ZDZ) subsidiary ZDNN.
     
     Whether you call them cyber vandals or hackers, they have the run of the Web, said DeLong.
     
     Most sites hackable
     "I personally think that 75 to 85 percent of sites are hackable," he said.
     
     DeLong believes that if hackers leave these sites alone, it stems more from fear of potential legal
     repercussions than problems breaking in.
     
     One old-school hacker agrees that media publicity and the notoriety it guarantees keeps the hacks
     coming. Like Katz, he doesn't view page defacements as hacks.
     
     "Web-page defacing is not hacking," said Space Rogue, a long-time hacker.
     
     Hackers have traditionally plied their trade in part to gain knowledge about computer systems. In
     a Web page defacement, "there is really little knowledge gained [about the network], and no other
     motives besides fame."
     
     Space Rogue works with the security group L0pht Heavy Industries and runs the Hacker News
     Network, an underground information site.
     
     Members of the Keebler Elves, a cybergang that hacked the National Oceanographic and
     Atmospheric Administration's Storm Prediction Center site last week, disagree.
     
                           "Defacing a site to me is showing the admins, government [and others]
                           that go to the site that we own them," wrote "soupnazi," one of the
                           founding members of the Keebler Elves, in a chat with ZDNN. "They
                           wouldn't even know we were in [their systems], if we didn't deface
                           [them]."
     
                           Only when they want to send a message do they deface a page,
                           soupnazi said.
     
     "I've told the Keebler members that I'm not a big fan of defacing pages," he said. "I'd rather have
     root [complete access] to someone's account."
     
     Getting the message across
     Another hacker, who claims responsibility for the Army.mil defacement, also defended the tactic.
     "Messages can be gotten across, if you hit the right machines," said "t1edown" in a chat with
     ZDNN.
     
                     The hacker theorizes that the seeming increase in defacements is partially due
                     to media coverage, which he thinks makes more kids want to learn to hack.
     
                     But he also thinks that gaping security holes are part of the problem.
     
                     For example, the Army.mil attack came through a known hole in the security
                     of a Web server tool, Allaire Corp.'s ColdFusion. Though a patch is
                     available, and L0pht says it informed the Army of the weakness in its
                     security, the Army failed to update all its servers.
     
                     Web defacement: A good thing?
                     But not everyone thinks Web defacement is necessarily bad.
     
     Alex Fowler, director of strategic initiatives at the cyber-rights organization Electronic Frontier
     Foundation, does not advocate hacking, but stresses that there can be valid reasons for graffiti.
     
     Fowler paraphrased an African-American woman who attended a recent EFF panel on public
     spaces in cyberspace, saying, "Graffiti is about a space for the disenfranchised to cry out and
     inform those around them, even when anonymity has been forced upon them."
     
     He added that graffiti -- cyber and otherwise -- is visible to those who may not agree with the
     sentiments involved, unlike a Web page.
     
     "Building AOLsux.com only preaches to the choir," he said. "You are not actually talking to the
     people who like AOL or the ones that have not thought about the issue."
     
     No danger?
     Slashdot's Katz believes there is no danger in the defacements, and hardly any reason for media
     coverage.
     
     In fact, he blames journalists for confusing vandals with hackers, and turning them into Orwellian
     villains.
     
     "Ever since the end of the Cold War, law enforcement and the media have been short of bad
     guys," he said.
     
     "The people that the media calls hackers have done very little damage to the Net," he said. "They
     are kids that like to show anonymous power. To make them into a serious menace, a danger to
     society, is ludicrous."
         
       
       
     @HWA 
          
     -=----------=-   -=----------=-    -=----------=-   -=----------=-  -=----------=-
           
           
           
           
                                             O
                                             0
                                             o
                                           O O O   
                                             0

     -=----------=-   -=----------=-    -=----------=-   -=----------=-  -=----------=-
      
     END of main news articles content... read om for ads, humour, hacked websites etc
              
     -=----------=-   -=----------=-    -=----------=-   -=----------=-  -=----------=-
     
     
     
             
                                HWA.hax0r.news  
     
     
     
     
     
AD.S ADVERTI$ING.           The HWA black market                    ADVERTISEMENT$.
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
      
       *****************************************************************************
       *                                                                           *
       *           ATTRITION.ORG     http://www.attrition.org                      *
       *           ATTRITION.ORG     Advisory Archive, Hacked Page Mirror          *
       *           ATTRITION.ORG     DoS Database, Crypto Archive                  *
       *           ATTRITION.ORG     Sarcasm, Rudeness, and More.                  * 
       *                                                                           *
       *****************************************************************************      
              
 
       www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.freekevi
       n.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnick.co
       m www.2600.com ########################################ww.2600.com www.freeke
       vin.com www.kev#  Support 2600.com and the Free Kevin #.com www.kevinmitnick.
       com www.2600.co#  defense fund site, visit it now! .  # www.2600.com www.free
       kevin.com www.k#             FREE KEVIN!              #in.com www.kevinmitnic
       k.com www.2600.########################################om www.2600.com www.fre
       ekevin.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnic
       k.com www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.fre

       <a href="http://www.2600.com/">www.2600.com</a>
       <a href="http://www.kevinmitnick.com></a>
       
       
       +-----------------------------------------------------------------------------+
       | SmoGserz's site ...    http://smog.cjb.net/         NEWS on SCIENCE         |
       | ===================     http://smog.cjb.net/        NEWS on SECURITY        |
       | NEWS/NEWS/NEWS/NEWS    http://smog.cjb.net/         NEWS on THE NET         |
       |                         http://smog.cjb.net/        NEWS on TECHNOLOGY      |
       +-----------------------------------------------------------------------------+
       
       * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
       * www.csoft.net webhosting, shell, unlimited hits bandwidth ... www.csoft.net *
       *   www.csoft.net www.csoft.net www.csoft.net www.csoft.net www.csoft.net     *
    <a href="http://www.csoft.net">One of our sponsers, visit them now</a> www.csoft.net
       * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
       
       

       * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
       * WWW.BIZTECHTV.COM/PARSE WEDNESDAYS AT 4:30PM EST, HACK/PHREAK CALL-IN WEBTV *
       * JOIN #PARSE FOR LIVE PARTICIPATION IN SHOW CHAT OR THE WEBCHAT, AND WEBBOARD*
       * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
       
       
       

       * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
       * WWW.2600.COM OFF THE HOOK LIVE NETCAST'S TUES SIMULCAST ON WBAI IN NYC @8PM *
       * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *


         //////////////////////////////////////////////////////////////////////////////
        //  To place an ad in this section simply type it up and email it to        //
       //        hwa@press,usmc.net, put AD! in the subject header please. - Ed    //
      //////////////////////////////////////////////////////////////////////////////


     @HWA
     
       
              
             
HA.HA Humour and puzzles ...etc
      ~~~~~~~~~~~~~~~~~~~~~~~~~
                                                           Don't worry. worry a *lot*
     
      Send in submissions for this section please! .............    
     
      
     This sent in by FProphet;
     
      
      Respect from the other side;
      http://www.cutehtml.com/support/cracks2.html
      
      
      
      cuteftp32300.zip by ZuLu 

      The text file with this crack says "Eliminates 30-day expiration,
      checksums, and unregistered text." Notice that anyone can
      disable checksums, but not necessarily all the hashes. ZuLu also
      credits us as an "awesome FTP client." Thanks! 
      
      -=-
            
      @HWA
       
       
       
 SITE.1 http://smog.cjb.net
 
      SiteOp: SmoG
 
      Science, Technology, E-Books, News, Software, Security.. this site has been here
      before and its back, they are growing and have matured a bit since the first attempt
      at running the site, so stop by and add it to your daily/weekly bookmarks for fresh
      stuff.
                  - eentity
      
        
        
        
       
      @HWA
       
         
         
  H.W Hacked websites 
      ~~~~~~~~~~~~~~~~

      Note: The hacked site reports stay, especially with some cool hits by
            groups like *H.A.R.P, go get em boyz racism is a mugs game! - Ed

          * Hackers Against Racist Propaganda (See issue #7)

     
      Haven't heard from Catharsys in a while for those following their saga visit
      http://frey.rapidnet.com/~ptah/ for 'the story so far'...
      
     
     
     From HNN rumours section http://www.hackernews.com/
     see the archives section on HNN or attrition.org for copies of many of these
     sites in their defaced form.
     
     http://www.attrition.org/
     
     July 14th  via HNN
     contributed by Anonymous 
     Cracked
     The following sites have been reported as compromised.

      http://cta.ed.ornl.gov
      http://www.cknights.com 
      http://www.learndifferent.com 
      http://www.npinc.com 
      http://www.atgwp.navy.mil 
      http://www.yokipc.navy.mil      
  
     July 15th via HNN
     contributed by Anonymous 
      Cracked
      The Following sites have been reported as being
      compromised.
      http://www.abissa.ch
      http://www.iptv.org 
      http://www.wtvl.net 
      http://www.am1370.com 
      http://www.anothercomforter.com 
      http://www.zaffron.com 
      http://maps.arc.nasa.gov 
      http://www.wines-market.com    

     July 16th via HNN
     
     contributed by Anonymous 
     Cracked
      The following sites have been reported as cracked.
      http://www.action-lane.com
      http://www.alpine.com.au 
      http://www.autoshow.net 
      http://www.cnbca.com 
      http://www.cyberregistry.com 
      http://www.dragonfirecomics.com 
      http://www.engr.ukans.edu 
      http://www.fogodechao.com 
      http://www.itcsoft.com 
      http://www.tourism.gov.pk 
      http://www.universalpool.com
     
     
     Hacked sites missed by HNN while in Vegas, courtesy of ATTRITION.ORG
     
     
     Latest cracked pages courtesy of attrition.org

      (www.ado.army.mil)         Army Digitization Office 
      (www.cafac.com.ar)         Camara Argentina de Fabricante de Ascensores y sus Componentes
      (www.fruitstech.com)       Fruits Tech 
      (www.privaterealty.com)    Private Realty
      (www.autoshow.net)         Auto Show
      (www.itcsoft.com)          ITC Software 
      (www.action-lane.com)      Action Lane 
      (www.engr.ukans.edu)       University of Kansas School of Engineering  
      (www.cnbca.com)            Cunningham, Northington, Boynton, Cook and Adams, CPA 
      (www.fogodechao.com)       Fogo de Ch�o   
      (www.tourism.gov.pk)       Pakistan Tourism Development Corporation
      (www.dragonfirecomics.com) Dragon Fire Comics 
      (www.alpine.com.au)        Alpine Audio, (AU) 
      (www.universalpool.com)    Universal Pool
      (www.cyberregistry.com)    Cyber Registry
      (www.abissa.ch)            Abissa (CH) 
      
      and more sites at the attrition cracked web sites mirror:
                   
                    http://www.attrition.org/mirror/attrition/index.html 

       -------------------------------------------------------------------------
       
  A.0                              APPENDICES
       _________________________________________________________________________



  A.1 PHACVW, sekurity, security, cyberwar links
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

       The links are no longer maintained in this file, there is now a
      links section on the http://welcome.to/HWA.hax0r.news/ url so check
      there for current links etc.

      The hack FAQ (The #hack/alt.2600 faq)
      http://www-personal.engin.umich.edu/~jgotts/underground/hack-faq.html
      <a href="http://www-personal.engin.umich.edu/~jgotts/underground/hack-faq.html">hack-faq</a>

      Hacker's Jargon File (The quote file)
      http://www.lysator.liu.se/hackdict/split2/main_index.html
      <a href="http://www.lysator.liu.se/hackdict/split2/main_index.html">Original jargon file</a>

      New Hacker's Jargon File.
      http://www.tuxedo.org/~esr/jargon/ 
      <a href="http://www.tuxedo.org/~esr/jargon/">New jargon file</a>
      
      
      HWA.hax0r.news Mirror Sites:
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~
      http://www.csoft.net/~hwa/ 
      http://www.digitalgeeks.com/hwa.
      http://members.tripod.com/~hwa_2k
      http://welcome.to/HWA.hax0r.news/
      http://www.attrition.org/~modify/texts/zines/HWA/
      http://packetstorm.genocide2600.com/hwahaxornews/
      http://archives.projectgamma.com/zines/hwa/.  
      http://www.403-security.org/Htmls/hwa.hax0r.news.htm


      International links:(TBC)
      ~~~~~~~~~~~~~~~~~~~~~~~~~

      Foreign correspondants and others please send in news site links that
      have security news from foreign countries for inclusion in this list
      thanks... - Ed

      
          
      Belgium.......: http://bewoner.dma.be/cum/              
                      <a href="http://bewoner.dma.be/cum/">Go there</a> 
      
      Brasil........: http://www.psynet.net/ka0z              
                      <a href="http://www.psynet.net/ka0z/">Go there</a>
      
                      http://www.elementais.cjb.net           
                      <a href="http://www.elementais.cjb.net/">Go there</a>
      
      Canada .......: http://www.hackcanada.com
                      <a href="http://www.hackcanada.com/">Go there</a>
      
      Columbia......: http://www.cascabel.8m.com              
                      <a href="http://www.cascabel.8m.com/">Go there</a>
      
                      http://www.intrusos.cjb.net             
                      <a href="http://www.intrusos.cjb.net">Go there</a>
      
      Indonesia.....: http://www.k-elektronik.org/index2.html 
                      <a href="http://www.k-elektronik.org/index2.html">Go there</a>
      
                      http://members.xoom.com/neblonica/      
                      <a href="http://members.xoom.com/neblonica/">Go there</a>
      
                      http://hackerlink.or.id/                
                      <a href="http://hackerlink.or.id/">Go there</a>
      
      Netherlands...: http://security.pine.nl/                
                      <a href="http://security.pine.nl/">Go there</a>       
      
      Russia........: http://www.tsu.ru/~eugene/              
                      <a href="http://www.tsu.ru/~eugene/">Go there</a>
      
      Singapore.....: http://www.icepoint.com                 
                      <a href="http://www.icepoint.com">Go there</a>
                      
      Turkey........: http://www.trscene.org - Turkish Scene is Turkey's first and best security related e-zine.
                      <a href="http://www.trscene.org/">Go there</a>              

    Got a link for this section? email it to hwa@press.usmc.net and i'll
    review it and post it here if it merits it.

    @HWA
    

  -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
    --EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--

    � 1998, 1999 (c) Cruciphux/HWA.hax0r.news <tm> (R) { w00t }
    
  -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-                       
     --EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--
  -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
   [ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ]
       [45:6E:64]-[28:63:29:31:39:39:38:20:68:77:61:20:73:74:65:76:65]