-----Original Message----- From: bradyj@su*.ne* [mailto:bradyj@su*.ne*] Sent: Sunday, November 01, 1998 1:57 PM To: Randy Bohrer; Techdiver Subject: Fw: abuse of system (faker on techdiver) Randy, you may in fact work in network security, but what you described has nothing to do with what happened. The computer attacks described are exactly that a port/IP/telnet hack and has little to do with someone creating an email account (HOTMAIL) using someone else's name. Hotmail is public access. Using the term coined in the military world this is information warfare at best. I believe the correct terminology is spoofing. The Department of Defense has created an organization that specializes in just that, in the Air Force it is called the information warfare squadron (IWS). I would suggest if george wishes to prevent this from happening again he might want to get a real email address or think about getting a digital signature, he might also want to do WKPP business off the internet altogether. This can and will happen in the future but, he could make it a little more difficult. For all you spoofers out their, I heard the DOD is recruiting. By they way, last time I checked they still don't take pot smokers... No offense intended George, but you do have more to lose than most. John Brady South Carolina EMAIL: Bradyj@su*.ne* Http://www.sumter.net/~bradyj > > >>Since I now work in network security, I understand how seemingly harmless >>things like this can cause big trouble. As an example, we use a utility >here >>called "strobe" in order to check customers' firewalls (the gateway between >>a >>company network and the internet) to see if they are up and are listening >on >>the proper port(s). In most systems, this creates a number of messages >>including "unauthorized remote connection attempt" and "port scan detected >>on..." which alarms system administrators. On several occasions, customers >>(including government entities), thought they were being hacked, and >>initiated investigations which led back to our department. Of course, once >>we explained what was going on, all was well, but unnecessary time was >>wasted. >> >>So let's stop with the fake posts. They're not that much fun, you can be >>found out, and they waste the time of people trying to get stuff done. >> >>Sincerely, >>C. Randy Bohrer, President >>Underwater Applications Corp >>15 Brewster Rd >>Framingham, MA 01702 >>tel: 508-628-9520 >>fax: 508-820-3337 >>http://www.geocities.com/~uwapplications >> >> >> >>-- >>Send mail for the `techdiver' mailing list to `techdiver@aquanaut.com'. >>Send subscribe/unsubscribe requests to `techdiver-request@aquanaut.com'. > -- Send mail for the `techdiver' mailing list to `techdiver@aquanaut.com'. Send subscribe/unsubscribe requests to `techdiver-request@aquanaut.com'.
Navigate by Author:
[Previous]
[Next]
[Author Search Index]
Navigate by Subject:
[Previous]
[Next]
[Subject Search Index]
[Send Reply] [Send Message with New Topic]
[Search Selection] [Mailing List Home] [Home]