Copy Link
Add to Bookmark
Report

Net-Sec Issue 047

eZine's profile picture
Published in 
Net Sec newsletter
 · 26 Apr 2019

  

HNS Newsletter
Issue 47 - 22.01.2001
http://net-security.org

This is a newsletter delivered to you by Help Net Security. It covers weekly
roundups of security events that were in the news the past week. Visit Help
Net Security for the latest security news - http://www.net-security.org.

Subscribe to this weekly digest on:
http://www.net-security.org/text/newsletter

Archive of the newsletter in TXT and PDF format is available here:
http://www.net-security.org/news/archive/newsletter

Current subscriber count to this digest: 1805

Table of contents:

1) General security news
2) Security issues
3) Security world
4) Featured articles
5) Security software
6) Defaced archives



General security news
---------------------

----------------------------------------------------------------------------

WORLD FOR WORMS
The Kakworm virus was responsible for more helpdesk calls than the Love Letter
virus during 2000, even though Love Letter caused major business disruption
during May, according to antivirus software supplier Sophos.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.co.uk/news/2001/2/ns-20225.html


HONEYNET CHALLENGE
"One of the primary goals of the Honeynet Project is to find order in chaos by
letting the attackers do their thing, and allowing the defenders to learn from
the experience and improve. The latest challenge, inspired by the Honeynet
Project's founder Lance Spitzner, is the Forensic Challenge. Only this time,
we're opening it up to anyone who wants to join in... The best 20 submissions
will win a copy of "Hacking Exposed", Second Edition (courtesy of Foundstone)".
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://project.honeynet.org/challenge/


MANY INDIAN WEB SITES HACKED IN 2000
Some 635 Indian Web sites were hacked during the year 2000 - reflecting the
low awareness level of Internet security amongst Indian companies - according
to Dewang Mehta, president of the National Association of Software and Service
Companies. Companies spend only 0.8 percent of their total IT spending on
Internet security annually as against the world average of 5.5 percent. Since
95 percent of the sites hacked are hosted abroad, Indian firms believed that
Web hosting companies would take care of the security aspects, which
generally does not happen, added Mehta.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.newsbytes.com/news/01/160515.html


IT COMPANIES CREATE PRIVATE COMPUTER SECURITY NETWORK
Today, a group of more than 20 information technology companies - including
Intel, AT&T, Microsoft, IBM and Hewlett Packard will announce a major milestone
in their efforts to create a private network for sharing information on computer
security weaknesses and cyber-attacks. The details of the announcement
center on a mechanism the industry is crafting to share information on cyber
attacks, vulnerabilities and security practices that can be used to better
respond to deliberate intrusions into computer networks.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.computeruser.com/news/01/01/16/news1.html


COMPUTER CRIME INVESTIGATOR'S TOOLKIT: PART III
While one doesn't have to be a master programmer to be a computer crime
sleuth, being able to read code helps generate insight. If you find a Perl script
useful for checking the aging of passwords, for example, understanding how
the program works goes a long way toward implementing the tool properly.
And, you learn during the process how to develop your own tools. Some
investigators may prefer C or C++ as a starting point. That preference has
some merit since quite a few computer security tools are available written
in those languages. But the most important skill is to learn a code and then
build on that knowledge. More common ground exists between languages
than you might realize.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://securityportal.com/articles/feature20010116.html


SECURITY SOFTWARE MARKET SET TO GROW
The worldwide security software market is due to grow at a compound rate
of 21.7% through to 2004, when revenue will be over $6.7bn, according to a
recent study. The report from Gartner Dataquest, "Internet and E-commerce
drive Security Software Growth", also points to increasing focus by large
companies such as IBM/Tivoli and HP on security in their core offerings.
Apparently 31% of the security software market in 1999 was Anti-Viral
software. Of this, Network Associates has 43.8% market share, followed
by Symantec with 33.8%, and Trend Micro at 11.9%.
Link: http://www.netimperative.com/technology/newsarticle.asp?ArticleID=7513&ChannelID=3&ArticleType=1


LINUX FIREWALL - THE TRAFFIC SHAPER
The firewall is a fundamental component of all computer security strategies.
However, the simple firewall is not only restricted to safeguarding the user's
valuable information - it can also optimize the user's bandwidth. This article,
by Jeroen Wortelboer and Jan Van Oorschot will discuss how Linux firewalls
can be used to shape traffic to optimize quality of Internet service and to
reduce vulnerability to DoS attacks.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.securityfocus.com/focus/linux/articles/trafshap.html


TRACKING NETWORK TRAFFIC IN 3D
The vital monitoring of networks can now be done in 3-D. High Tower Software,
an offshoot of NASA, recently launched a 3-D tool that lets operators not only
see where a problem might be, but also see the whole network and what could
be affected if a component or device breaks down. The lack of trained IT staff
puts a lot of pressure on companies to interpret data emanating from network
monitoring systems. "Even network personnel who understand these issues have
a hard time figuring out what is going wrong," said Robert Angelino, the head of
software engineering.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.telekomnet.com/writer_telekomnet/1-16-01_hightower.asp


U.S. POST OFFICE UNVEILS SECURE INTERNET SYSTEM
The U.S. Postal Service unveiled a new service that allows government agencies
to send and receive sensitive documents such as birth certificates and medical
records over the Internet in a secure manner. An electronic version of Certified
Mail, the new service uses a system of passwords and ID cards embedded with
computer chips to provide proof that the document arrived safely in the hands
of its intended recipient.
Link: http://www.reuters.com/news_article.jhtml;$sessionid$DUZS4RAAACHZ0CRBADLSFEYKEEANMIV2?type=internet&Repository=INTERNET_REP&RepositoryStoryID=%2Fnews%2FIDS%2FInternet%2FNET-TECH-POSTAL-DC_TXT.XML


FIGHT RAGES OVER DIGITAL RIGHTS
Critics say content owners and digital rights management companies are
discouraging the growth of digital music by taking liberties with their control
of copyrights. The Digital Millennium Copyright Act was enacted in 1998 to
encourage content owners to begin moving their businesses online. At the
center of the act were precautions set up to allow copyright holders to
protect their work by making it against the law for consumers to illegally
post and share materials.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.wired.com/news/politics/0,1283,41183,00.html


STARTING FROM SCRATCH
Of all people, security experts are the most likely to keep their own systems
backed up, and verify that the backups haven't been overwritten, right? Wrong,
says Carole Fennelly. In this week's Unix Security, Carole reveals how
complacency caused her to lose her home directory and email, and shows
you how you can prevent the same thing from happening to you.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.sunworld.com/unixinsideronline/swol-01-2001/swol-0112-unixsecurity.html


A LOOK AT SYSTEM V INITIALIZATION
System V method of initialization is one of the most widely used across most
Linux distributions. It definitely eases the system administrators job. There's a
lot more than autoexec.bat and config.sys here. We've written this article for
novice users. It explains the concept of runlevels, initialization scripts and the
significance of /etc/rc.d.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.freeos.com/articles/3243/


SECURE LINUX DISTRIBUTIONS
If there is one question I hate, it's "Which Linux distribution is the most secure?"
followed by "Which firewall is best?" People ask these questions in all innocence,
and very few realize the complexity behind them. If I'm in a bad mood I'll usually
say, "Whichever one works best for you with the fewest problems." While
essentially a correct answer, it is mostly useless. To actually answer the
question properly, I usually need to spend the better part of an hour asking
the other person questions: what their requirements are, how much they can
spend, what the current installation has, and so on. After getting this information
I can usually make a recommendation; sometimes the answer is clear, and other
times it isn't too clear.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://securityportal.com/closet/closet20010117.html


RUNNING SNORT ON IIS WEB SERVERS: PART I
In 1998, Martin Roesch developed Snort for Unix platforms as a "lightweight
intrusion detection system." In the summer of 2000, Mike Davis created the
first Win32 port of Snort, bringing a great tool to a whole new world of Windows
users and bringing a world of Windows users to a different understanding of
security. Now in this, the first of a series of articles on Snort for Microsoft
platforms, Mark Burnett introduces the reader to Snort for IIS Web Servers.
This article will discuss various aspects of SNort, including: the development
of Snort, the installion and use of Snort, and strategies for the most effective
implementation of Snort on IIS servers.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.securityfocus.com/focus/microsoft/iis/mssnort.html


WHO’S THAT KNOCKING ON THE FIREWALL?
Open Door Networks Monday began shipping its firewall advisor software, Who’s
There? Firewall Advisor, which Open Door bills as "essential for understanding
the ever-increasing access attempts from the Net", is compatible with Open
Door’s DoorStop firewall software and Symantec’s Norton Personal Firewall.
The software does not work with Intego’s NetBarrier.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.insanely-great.com/news/01/486.html


MALAYSIAN POLICE TRACKING DEFACERS
Malaysian police have traced attackers who broke into Parliament's home page
in December to Brazil and France and are seeking help from police there to
capture them.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.cnn.com/2001/ASIANOW/southeast/01/16/malaysia.hackers.ap/index.html


LOS ALAMOS EMPLOYEE DENIES HACKING
Claiming he's being used as a scapegoat, 21-year-old MagicFX has reportedly
denied hacking into six company Web sites before he was hired last year at
the Los Alamos National Laboratory.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.computeruser.com/news/01/01/16/news6.html


UPDATE ON ETISALAT CASE
The Public Prosecutor's office has begun its investigation into allegations that
a 21-year-old Briton hacked into Emirates Telecommunications Corp's (Etisalat)
Internet system last June.Lee Ashurst was charged with the "misuse of
equipment, services or facilities provided by Etisalat" after he was allegedly
traced as one of the hackers who caused widescale disruptions to the service,
causing it to crash.
Link: http://www.gulf-news.com/Articles/news.asp?ArticleID=7046


GERMAN WATCHDOG TO PROBE ONLINE BANK SECURITY
Germany's banking watchdogs said they have launched a security check at
some of Europe's largest Internet banks and brokers as the threat from hackers
or electronic theft increases. The check of banks' electronic defenses will be
run by a three-part team including the German central bank the Bundesbank,
the Federal Banking Regulatory Agency BAKred, and the Interior Ministry's
special unit for computer security BSI.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.timesofindia.com/today/19info31.htm


REMOTE DESKTOP USING VNC
X-terminals allowed you to work off another machine while sitting on your
machine. VNC allows you to do the same and also adds the ability to go
beyond your local network to access a desktop over the Internet. Use it
from your Windows machine to access and administer your Linux box or
even the other way round!
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.freeos.com/articles/3292/


MAFIABOY PLEADS GUILTY ON 55 CHARGES
The trial of the 16-year-old Montrealer known as "Mafiaboy" had been set to
begin on 66 charges relating to attacks last year on several major Web sites,
as well as security breaches of other sites at institutions such as Yale and
Harvard universities. The court had just convened when prosecutor Louis
Miville-Deschenes announced that the youth had pleaded guilty to most
of the charges.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.cnn.com/2001/TECH/computing/01/18/mafiaboy.ap/index.html


PANDA SOFTWARE SLAMMED
Antivirus company Panda Software has been suspended from an industry group
for withholding information about a new virus it claimed was "more deadly than
the Love Bug" (they were speaking about Little Davinia).
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.vnunet.com/News/1116640


EFF ON DECSS: HACKERS' RIGHTS AT STAKE
The Electronic Frontier Foundation is asking a federal appeals court to overturn
a ruling that banned a Web site from posting and linking to a software program
that can crack DVD security, saying the decision did "great violence" to the
First Amendment.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.com/zdnn/stories/news/0,4586,2676657,00.html


SOFTWARE REVIEW: ARKEIA BACKUP
This document is a review of the Arkeia backup software combined with the
Ecrix rakpak dual 66G drive, discussion of the features, security, usage,
documentation, and support.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.linuxsecurity.com/feature_stories/feature_story-74.html


OPENHACK III BOWED BUT NOT BROKEN
The battle has begun, and the first salvo was a fierce one, as a cascade of
denial-of-service attacks swept over the Openhack III site in its first four
days of operation. As of midday Thursday, no one had succeeded in any of
the four hacking goals, although eWEEK Labs saw creative DoS attacks
directed against the Champaign, Ill., site, along with heavy usage.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.com/eweek/stories/general/0,11011,2676675,00.html

----------------------------------------------------------------------------




Security issues
---------------

All vulnerabilities are located at:
http://net-security.org/text/bugs


----------------------------------------------------------------------------

MEDIA PLAYER 7 AND IE JAVA VULNERABILITY
There is a security vulnerability in Windows Media Player 7 exploitable thru IE
and java which allows reading local files and browsing directories which in turn
allows executing arbitratrary programs. This may lead to taking full control over
user's computer.
Link: http://www.net-security.org/text/bugs/979586134,83134,.shtml


YAHOO! INSTANT MESSENGER TRANSMISSIONS
"When being warned by my firewall that some packet contents may contain
sensitive data when connecting to Yahoo! servers with the popular, Yahoo!
Instant Messenger, I found to my amazement my username and password
combination where being sent to the server in plain text."
Link: http://www.net-security.org/text/bugs/979594691,35290,.shtml


PHP ADVISORY - APACHE MODULE BUGS
[1] PHP supports a configuration mechanism that allows users to configure PHP
directives on a per-directory basis. Under Apache, this is usually done using
.htaccess files. Due to a bug in the Apache module version of PHP, remote
'malicious users' might be able to create a special HTTP request that would
cause PHP to serve the next page with the wrong values for these directives.
In certain (fairly rare) situations, this could result in a security problem.
[2] PHP supports the ability to be installed, and yet disabled, by setting the
configuration option 'engine = off'. Due to a bug in the Apache module version
of PHP, if one or more virtual hosts within a single Apache server were configured
with engine=off, this value could 'propagate' to other virtual hosts. Because
setting this option to 'off' disables execution of PHP scripts, the source code
of the scripts could end up being sent to the end clients.
Link: http://www.net-security.org/text/bugs/979594708,42917,.shtml


HTML.DROPPER (INTERESTING)
Internet Explorer 5.5 and accompanying mail and news client afford us the
unique ability to dictate which icons and file extensions we require. Specifically,
we are able to manufacture an email message to appear as one thing when in
fact it is not.
Link: http://www.net-security.org/text/bugs/979781821,21006,.shtml


NEW MAILING LIST MOBILEBUGS
It is dedicated to discussion of cellular phone and network security aspects. To
subscribe to this list, send a message to majordomo@developers.of.pl with the
following in the body of the message: subscribe mobileBugs.
Link: http://www.net-security.org/text/bugs/979781840,31202,.shtml


INN TEMPORARY DIRECTORY CONFIGURATION
"It's recently come to our attention that some repackagers of INN have
mistakenly shipped INN packages configured to use the system temporary
directory (either /tmp or /var/tmp) for create temporary files. INN expects
its configured temporary directory to only be writeable by the news user
and does not take sufficient precautions when creating temporary files to
be able to use world-writeable temporary directories. This configuration
could be exploited to gain access to the news account."
Link: http://www.net-security.org/text/bugs/979781859,46967,.shtml


CRYPTANALYSIS OF THE RSA SECURID ALGORITHM
Recently, I.C. Wiener published a reverse engineering effort of the RSA SecurID
algorithm. There were few speculations on the security ramifications of the
algorithm in I.C. Wiener's posting, so this note is an effort to touch upon
areas of concern. We have verified that I.C. Wiener's released version of the
proprietary algorithm is accurate by comparing it with our own prior reverse
engineering of the same algorithm.
Link: http://www.net-security.org/text/bugs/979874843,29493,.shtml


SHOUTCAST SERVER BUFFER CRASHES SERVER
The following information is being released by PA Networks to expose a potential
problem with the Shoutcast server for Linux version v1.7.1 for Shoutcast
Distributed Network Audio Server. During testing of new streams the following
was discovered.
Software Needed To Perform This Overflow:
Winamp (Any Version)
DSP Plugin for Audio Streaming
Microsoft Netshow Tools (Audio MP3 Codecs Only)
Shoutcast Server for Linux v1.7.1
Normally the Winamp client uses the DSP plugin to encode MP3 files and send a
single stream to a DNAS Server (Shoutcast) for distribution to listeners. By
entering a string in the description past the visible field the server will overflow
causing the shoutcast server to crash. This has been tested and verified on the
Linux version only so we do not know if the Win32 version of DNAS is also affected.
Link: http://www.net-security.org/text/bugs/979874858,39730,.shtml


LICENSING FIREWALL-1 DOS ATTACK
"I have identified a denial of service attack that can be launched against
Firewall-1 that has identical results to the IP fragmentation attack identified
by Lance Spitzner."
Symptoms: Firewall CPU hits 100% utilization, console locks up, a reboot only
temporarily solves the problem.
Vulnerable: All versions of Firewall-1 4.1 on Solaris 2.x using a limited-IP license
Link: http://www.net-security.org/text/bugs/979874948,44992,.shtml


PATCH FOR ORACLE INTERNET DIRECTORY
Several potential buffer overflow vulnerabilities have been discovered in the
Oracle Internet Directory executables 'oidldapd' and 'oidmon'. These
vulnerabilities were originally found in Oracle Internet Directory (OID)
2.0, Release 2.0.6, on Linux. (Note: OID 2.0.6 on LINUX was a beta release.)
Link: http://www.net-security.org/text/bugs/979957423,83735,.shtml


ENCRYPTED FILE SYSTEM WIN 2000 FLAW
"I have found a major problem with the encrypted filesystem (EFS) in Windows
2000 which shows that encrypted files are still very available for a thief or
attacker."
Link: http://www.net-security.org/text/bugs/979957507,70469,.shtml

----------------------------------------------------------------------------




Security world
--------------

All press releases are located at:
http://net-security.org/text/press

----------------------------------------------------------------------------

HNC DELIVERS FRAUD DETECTION - [18.01.2001]

HNC Software Inc. announced the availability of a new fraud detection service
for stored value cards. The service delivers fraud protection from both Falcon,
the leading payment card fraud detection system, and eFalcon, the leading
real-time payment fraud detection service. WildCard Systems, a provider of
high-quality e-payment solutions, is the first stored value card provider to
use the service.

Press release:
< http://www.net-security.org/text/press/979780431,85413,.shtml >

----------------------------------------------------------------------------

INTRUSION.COM ANNOUNCES NEW JOINT VENTURE - [18.01.2001]

Intrusion.com, Inc., a leading provider of enterprise security solutions for the
information-driven economy, today announced an agreement to establish a
joint venture with Shanghai Video and Audio Electronics Co., Ltd. This new
venture, Shanghai SVA Intrusion.com Joint Venture, will manufacture, market,
distribute and sell Intrusion.com SecureCom platform solutions, and will be the
authorized reseller of selected Intrusion.com software products in China (PRC
Mainland) under an exclusive multi-year licensing agreement.

Press release:
< http://www.net-security.org/text/press/979780474,55331,.shtml >

----------------------------------------------------------------------------

FLAGSHIP MOBILE VPN-BASED SOFTWARE RELEASED - [18.01.2001]

Roam Secure, Inc., a Washington, D.C. based mobile VPN (virtual private network)
software solutions company, announced its first product, OnRoad, that provides
advanced Internet mobility, security and networking features and allows both
wireless and wired communications in a VPN.

Press release:
< http://www.net-security.org/text/press/979780559,93861,.shtml >

----------------------------------------------------------------------------

DIGITAL CERTIFICATES FOR GOVERNMENT AGENCIES - [18.01.2001]

E-business security pioneer Cylink Corporation announced the deployment of its
NetAuthority(tm) public key infrastructure solution as the certificate authority
for the U.S. Postal Service's NetPost.Certified, a new Internet-based service
designed to secure and authenticate electronic correspondence between
government agencies.

Press release:
< http://www.net-security.org/text/press/979780817,6686,.shtml >

----------------------------------------------------------------------------

VIRUSMD.COM BIDS TO LEAD MEDICAL RECORDS ENCRYPTION - [18.01.2001]

In its bid to lead the new $3.8 billion dollar gold rush for medical records privacy
and encryption, the VirusMD sofware corporation today hired two Board-Certified
physicians to join its consulting team. In order to protect the security and
confidentiality of electronic health information, Congress has passed The
Health Insurance Portability and Accountability Act, also known as HIPAA.

Press release:
< http://www.net-security.org/text/press/979780923,36108,.shtml >

----------------------------------------------------------------------------

SELLING 'NETWORK VAULT' TECHNOLOGY - [18.01.2001]

CyberArk Software, Ltd., makers of the industry's first "network vault" for
securing corporate data and e-business, announced today that Global
Technology Associates (GTA), a U.K.-based IT security consulting firm,
will begin reselling Cyber-Ark's PrivateArk solution. GTA is a respected
authority in the Internet and network security arena and assesses
corporate security needs and provides leading-edge security solutions.

Press release:
< http://www.net-security.org/text/press/979780999,85255,.shtml >

----------------------------------------------------------------------------

NO FEAR FROM MELISSA-X WORM - [20.01.2001]

Sophos Anti-Virus, a world leader in corporate anti-virus protection, has
announced that users practising safe computing have nothing to fear from
the Melissa-X virus. However, users without the latest version of their
anti-virus software may be unable to detect the virus.

Press release:
< http://www.net-security.org/text/press/979957211,47193,.shtml >

----------------------------------------------------------------------------

SECURITY BIOMETRICS' BOARD OF DIRECTORS GROWS - [20.01.2001]

Mr. George Gould, President of Security Biometrics, Inc. (www.sigbio.com) is
pleased to announce the appointment of Robert M. Egery as a director to
the company. "We are delighted to see Egery joining our team at this exciting
time for SBI," says Gould. "His expertise and industry exposure will serve us all
very well in the near and distant future."

Press release:
< http://www.net-security.org/text/press/979957634,24064,.shtml >

----------------------------------------------------------------------------

SYMANTEC ON NEW MELISSA VARIANT - [20.01.2001]

Researchers at the Symantec AntiVirus Research Center are warning computer
users of Melissa.W, a variant of the damaging Melissa virus that uses Microsoft
Outlook to e-mail itself as an attachment.

Press release:
< http://www.net-security.org/text/press/979957704,68834,.shtml >

----------------------------------------------------------------------------




Featured articles
-----------------

All articles are located at:
http://www.net-security.org/text/articles

Articles can be contributed to staff@net-security.org

Below is the list of the recently added articles.

----------------------------------------------------------------------------

TECHNIQUES TO VALIDATE HOST-CONNECTIVITY

This paper will attempt to describe techniques used to discover heavily filtered
and firewalled hosts, that will not answer to standard PING responses. It is
assumed that the reader has a firm knowledge of the major internet protocols
(TCP,IP,UDP,ICMP). Most other protocols will not be discussed but techniques
described here can be applied to many protocols.

Read more:
< http://www.net-security.org/text/articles/index-download.shtml#host >

----------------------------------------------------------------------------

WHAT'S SO SPECIAL ABOUT "DAVINIA"? THE TRUTH ABOUT THE RECENTLY
DISCOVERED INTERNET-WORM by Kaspersky Lab

"Davinia" spreads via e-mail using the popular MS Outlook e-mail program. The
worm uses a very sophisticated way of penetrating into a user's computer. This
process consists of two parts...

Read more:
< http://www.net-security.org/text/articles/viruses/davinia.shtml >

----------------------------------------------------------------------------




Security Software
-------------------

All programs are located at:
http://net-security.org/various/software

----------------------------------------------------------------------------

ABI-CODER 3.5

This free file encryption software uses a 192-bit Triple DES algorithm. It allows
you to encrypt files and folders with a click of the mouse. ABI-CODER is easy
to use and comes with great help files as well as hints to guide you along the
way. Included is a self-decryption tool. Version 3.5 includes a new 128-bit
Blowfish encryption algorithm.

Info/Download:
< http://www.net-security.org/various/software/978804005,99349,windows.shtml >

----------------------------------------------------------------------------

LINUX IDS 0.9.12-2.2.18

The Linux Intrusion Detection System is a patch which enhances the kernel's
security. When it's in effect, many system administration operations can be
made impossible even for root. You can turn the security protection on or off
on the fly and you can hide sensitive processes and prevent anyone from using
ptrace or any other capability on your system. LIDS can also provide raw device
and I/O access protection. Changes: The file that acls inherit has had several
bugs removed. Multiplatform support has been added to the makefile.

Info/Download:
< http://www.net-security.org/various/software/979669522,23787,linux.shtml >

----------------------------------------------------------------------------

WEBPASSWORD 1.0

WebPassword is a program which protects your Web pages with a password.
Once you have password-protected your page, no one will be able to view its
content without having a correct password, either in their browser or as an
original HTML source. In a Web browser, the content of a password-protected
page may be viewed only after a valid password is entered. In a text viewer,
the content of an encoded page appears as a block of JavaScript data in an
HTML page.

Info/Download:
< http://www.net-security.org/various/software/978809296,27689,windows.shtml >

----------------------------------------------------------------------------

FWLOGWATCH-0.1.2

Fwlogwatch analyzes the ipchains, netfilter, or iptables packet filter logfiles
and generates text and HTML summaries. Features realtime anomaly alerting
capability, an interactive report generator, and the ability to cut off attacks
by adding firewall rules. Changes: Some remaining problems in realtime
response mode were fixed.

Info/Download:
< http://www.net-security.org/various/software/979836008,28948,linux.shtml >

----------------------------------------------------------------------------

DEVICELOCK ME 1.0

DeviceLock Me gives network administrators control over which users can
access what removable devices (floppies, Magneto-Optical disks, CD-ROMs,
ZIPs, and so on) on a local computer. Once DeviceLock Me is installed,
administrators can control access to floppies, CD-ROMs, or any other device,
depending on the time and date. DeviceLock Me enhances access control for
Windows System Administrators and helps control removable disk usage. It can
protect network and local computers against viruses, Trojans, and other
malicious programs often introduced by removable disks. Network administrators
can also use DeviceLock Me to flush a storage device's buffers. Remote control
is also available.

Info/Download:
< http://www.net-security.org/various/software/978809487,99994,windows.shtml >

----------------------------------------------------------------------------

CRYPT EDIT 4.0

Crypt Edit is a multidocument word processor with enhanced cryptographic
features. It can easily save texts in HTML, DOC, RTF, ASCII, WRI, Unicode,
and PRT (Protected Text Format with three security levels) formats. Encrypt
and decrypt binary files with compression, and create desktop shortcuts for
your documents. Insert OLE objects and pictures in GIF, JPEG, BMP, EMF, or
WMF format. The program includes an email client with an address book, a
spelling checker, a built-in Clipboard viewer, various converters (Lowercase,
Uppercase, ROT-13, OEM, and so on), a character map, and an autoformat
tool. The new version is now nag-free donationware.

Info/Download:
< http://www.net-security.org/various/software/978809762,78481,windows.shtml >

----------------------------------------------------------------------------

UNRM-0.92

unrm is a small linux utility which can, under some circumstances, recover
almost 99% of your erased data (similar to DOS's undelete). Changes: Fixed
a bug that allowed only 6 digit inode numbers to be dumped, and added a few
variables containing the common used program locations (mount,debugfs).

Info/Download:
< http://www.net-security.org/various/software/979836106,61006,linux.shtml >

----------------------------------------------------------------------------

DATA ENCRYPTION TOOLKIT 1.0

Data Encryption Toolkit is a comprehensive program for data encryption. This
program allows you to use five well-known, highly secure encryption algorithms.
DET will help you to encrypt single files, groups of files, or entire folders,
including all subfolders, quickly and easily. You can work with encrypted
folders as simply as with usual folders (except entering the unlocking password).
All encryption and decryption actions can be done on fly. The program can be
integrated into any Windows shell and all its functions are available from the
context menu. Besides encryption, the program has some additional features.
DET is fast, and easy to setup and to use.

Info/Download:
< http://www.net-security.org/various/software/978809844,49850,windows.shtml >

----------------------------------------------------------------------------




Defaced archives
------------------------

[14.01.2001] - Rockwell Software, Inc.
Original: http://www.rsbizware.com/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/14/www.rsbizware.com/

[14.01.2001] - #2 McHammer Official Site
Original: http://www.mchammer.com/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/14/www.mchammer.com/

[14.01.2001] - National Centre for Radio Astrophysics, India
Original: http://dual2.gmrt.ncra.tifr.res.in/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/14/dual2.gmrt.ncra.tifr.res.in/

[14.01.2001] - Northern Plains Region Homepage - Natural Resources
Original: http://www.np.nrcs.usda.gov/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/14/www.np.nrcs.usda.gov/

[15.01.2001] - National Aeronautics and Space Administration
Original: http://uta7400.jpl.nasa.gov/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/15/uta7400.jpl.nasa.gov/

[16.01.2001] - Newspaper Association of America
Original: http://www.naa.org/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/16/www.naa.org/

[16.01.2001] - Presidency of The Islamic Republic of Iran
Original: http://web.president.gov.ir/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/16/web.president.gov.ir/

[16.01.2001] - Ministry of Trade and Industry, Israel
Original: http://www.tamas.gov.il/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/16/www.tamas.gov.il/

[16.01.2001] - President Administration (Bulgaria)
Original: http://www.president.bg/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/16/www.president.bg/

[19.01.2001] - Ministry of Education and Science (Bulgaria)
Original: http://asclep.muvar.acad.bg/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/19/asclep.muvar.acad.bg/

[19.01.2001] - USAF Pararescue
Original: http://www.specialtactics.com/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/19/www.specialtactics.com/

[19.01.2001] - Australian Institute of Marine Science
Original: http://www.aims.gov.au/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/19/www.aims.gov.au/

[19.01.2001] - US Department of the Interior, Alaskan Office
Original: http://www.ak.doi.gov/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/19/www.ak.doi.gov/

[19.01.2001] - National Cemetary Administration, Department of Veterans Affairs
Original: http://www.cem.va.gov/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/19/www.cem.va.gov/

[19.01.2001] - Swindon Borough Council, UK
Original: http://www.swindon.gov.uk/
Defaced: http://www.attrition.org/mirror/attrition/2001/01/19/www.swindon.gov.uk/

----------------------------------------------------------------------------


Questions, contributions, comments or ideas go to:

Help Net Security staff

staff@net-security.org
http://net-security.org

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT