Mailing List Archive

Mailing List: techdiver

Banner Advert

Message Display

From: "Randy Bohrer" <underwaterapplications@cs*.co*>
To: <bradyj@su*.ne*>, "Techdiver" <techdiver@aquanaut.com>
Subject: RE: abuse of system (faker on techdiver)
Date: Sun, 1 Nov 1998 15:21:03 -0500


-----Original Message-----
From: bradyj@su*.ne* [mailto:bradyj@su*.ne*]
Sent: Sunday, November 01, 1998 1:57 PM
To: Randy Bohrer; Techdiver
Subject: Fw: abuse of system (faker on techdiver)



Randy, you may in fact work in network security, but what you described has
nothing to do with what happened.  The computer attacks described are
exactly that a port/IP/telnet hack and has little to do with someone
creating an email account (HOTMAIL) using someone else's name.  Hotmail is
public access.  Using the term coined in the military world this is
information warfare at best.  I believe the correct terminology is spoofing.
The Department of Defense has created an organization that specializes in
just that, in the Air Force it is called the information warfare squadron
(IWS).  I would suggest if george wishes to prevent this from happening
again he might want to get a real email address or think about getting a
digital signature, he might also want to do WKPP business off the internet
altogether.  This can and will happen in the future but, he could make it a
little more difficult.

For all you spoofers out their, I heard the DOD is recruiting.  By they way,
last time I checked they still don't take pot smokers...

No offense intended George, but you do have more to lose than most.

John Brady
South Carolina
EMAIL:  Bradyj@su*.ne*
Http://www.sumter.net/~bradyj

>
>
>>Since I now work in network security, I understand how seemingly harmless
>>things like this can cause big trouble. As an example, we use a utility
>here
>>called "strobe" in order to check customers' firewalls (the gateway
between
>>a
>>company network and the internet) to see if they are up and are listening
>on
>>the proper port(s). In most systems, this creates a number of messages
>>including "unauthorized remote connection attempt" and "port scan detected
>>on..." which alarms system administrators. On several occasions, customers
>>(including government entities), thought they were being hacked, and
>>initiated investigations which led back to our department. Of course, once
>>we explained what was going on, all was well, but unnecessary time was
>>wasted.
>>
>>So let's stop with the fake posts. They're not that much fun, you can be
>>found out, and they waste the time of people trying to get stuff done.
>>
>>Sincerely,
>>C. Randy Bohrer, President
>>Underwater Applications Corp
>>15 Brewster Rd
>>Framingham, MA 01702
>>tel:  508-628-9520
>>fax: 508-820-3337
>>http://www.geocities.com/~uwapplications
>>
>>
>>
>>--
>>Send mail for the `techdiver' mailing list to `techdiver@aquanaut.com'.
>>Send subscribe/unsubscribe requests to `techdiver-request@aquanaut.com'.
>




--
Send mail for the `techdiver' mailing list to `techdiver@aquanaut.com'.
Send subscribe/unsubscribe requests to `techdiver-request@aquanaut.com'.

Navigate by Author: [Previous] [Next] [Author Search Index]
Navigate by Subject: [Previous] [Next] [Subject Search Index]

[Send Reply] [Send Message with New Topic]

[Search Selection] [Mailing List Home] [Home]