Copy Link
Add to Bookmark
Report

Net-Sec Issue 063

eZine's profile picture
Published in 
Net Sec newsletter
 · 26 Apr 2019

  

HNS Newsletter
Issue 63 - 13.05.2001
http://net-security.org
http://security-db.com

This is a newsletter delivered to you by Help Net Security. It covers weekly
roundups of security events that were in the news the past week. Visit Help
Net Security for the latest security news - http://www.net-security.org.

Subscribe to this weekly digest on:
http://www.net-security.org/text/newsletter

Archive of the newsletter in TXT and PDF format is available here:
http://www.net-security.org/news/archive/newsletter

Current subscriber count to this digest: 2368

Table of contents:

1) General security news
2) Security issues
3) Security world
4) Featured products
5) Security software
6) Defaced archives


========================================================
Help Net Security T-Shirt available
========================================================
Thanks to our affiliate Jinx Hackwear we are offering you the opportunity
to wear a nifty HNS shirt :) The image speaks for itself so follow the link
and get yourself one, summer is just around the corner.
Get one here: http://207.21.213.175:8000/ss?click&jinx&3af04db0
========================================================


General security news
---------------------

----------------------------------------------------------------------------

E-COMMERCE FIRMS FACING MORE ONLINE SECURITY RISKS
Online security can pose a threat to the IT industry world over. According to
the managing director of Safe Acript Atul Saran, the industry suffered losses
to the tune of $10 billion during the last two years. Speaking at a seminar -
Consilience-2000 - organised by the National Law School of India University
here on Sunday, he said the companies could cut down on problems by
taking precautionary measures.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.timesofindia.com/today/07info13.htm


A CRITIQUE OF MEDIA REPORTAGE OF VIRUSES
In this article, George Smith takes a critical look at the way the media reports
viruses. Specifically, he critiques the shortcomings of the 'crisis' mode used by
the media to report virus threats and virus-writing competitions and examines
the effects of that school of reportage on the public's reaction to viruses.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.securityfocus.com/focus/virus/articles/diseased.html


HACKERS DENIED ACCESS
Access Research, a security firm founded earlier this year, has unveiled its
security products to protect corporate data. Access Denied is a strong
authentication system, preventing unauthorised users from connecting to
company servers. It protects firms from hackers' spoofing, denial of service
and Trojan attacks at the IP level, safeguarding Web servers and clients, the
company said. The technology scans traffic at the TCP/IP connection level,
alongside other security features, such as firewalls, and controls communication
channels between Web servers and clients.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.co.uk/news/2001/18/ns-22662.html


NT SERVICE PACK 7: D.O.A.
SP7 is now officially dead. This is unfortunate, since it makes fixing all the
security holes present on an NT system more difficult. For day-to-day
operations, the lack of service packs won't make a huge difference. In the
last few years, Microsoft has only released six service packs for NT (not
counting multiple releases of Service Pack 6 that were broken to various
degrees). Administrators typically apply Microsoft's hotfixes as they become
available; otherwise, it is trivial in most cases for attackers to break into
unpatched systems.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://securityportal.com/articles/ntspseven20010507.html


WORMS COME UNDER ATTACK
When the ILoveYou virus swept through corporate networks around the
world last May, it took everyone by surprise - especially anti-virus software
developers. As the one-year anniversary of the Love Bug's attack passed
last week, McAfee Corp., Trend Micro Inc. and other anti-virus vendors
were working on new technologies and strategies that they hope will
reduce the likelihood of another outbreak of that scale.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.com/eweek/stories/general/0,11011,2715700,00.html


NEO-NAZIS ATTACK LIBRARY'S WEB SITE
The State Library of NSW was inundated with calls after an attacker replaced
its Web site with images of Hitler and a Nazi swastika across an Australian flag
in an unprecedented racially motivated attack.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.smh.com.au/news/0105/07/national/national16.html


EXODUS CUSTOMER SECURITY SITE HACKED
Internet hosting company Exodus Communications suffered an embarrassing
break-in of one of its security-related Web sites Friday night. Hackers left a
message bragging that they had access to the company’s network and posted
personal information about a company employee on www.security.exodus.net.
Exodus, which co-hosts big-name Web sites like Yahoo.com and eBay.com,
confirmed the break-in. But company officials say the attackers were only
able to access arcane Web server log files for a few Exodus customers.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.msnbc.com/news/569965.asp


THE NEW SECURITY PRO
"The really bad security breaches that would make the hair on the back of
your neck stand up are not being reported [in the media]," says David Foote,
a managing partner at Foote Partners LLC, a New Canaan, Conn.-based
research and consulting firm specializing in the IT workforce. "But companies
know about them, and they're scared." As companies place an increased
emphasis on security, says Foote, the role of the security professional is
changing from a strictly back-office IT support role to one that's strategically
tied in with the entire company.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.computerworld.com/cwi/story/0,1199,NAV47_STO60207,00.html


2600 CLUBS
The Washington Post's Ariana Eunjung Cha did an article on 2600 clubs
around the states. "Club members still draw the attention of authorities.
But the perception that their meetings are solely a place where hackers
exchange trade secrets and plot electronic break-ins is exaggerated, or
at least outdated".
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.chicagotribune.com/business/printedition/article/0,2669,SAV-0105070210,FF.html


HACKERS BREAK INTO INFOSYS’ BANKING SITE
Hackers reached IT major Infosys, with unidentified miscreants breaking in into
the company’s banking division website. According to an Infosys spokesperson,
the company’s technical personnel were attempting to rectify the damage and
restore the site. "Work is on at present and the site should be up soon," the
spokesperson said. The hackers changed the content of the site though it is
not clear how and why the break in occurred.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.hindustantimes.com/nonfram/080501/detECO10.asp


STREAMER.MICROSOFT.COM HACKED
According to Alldas.de, a Web server located within Microsoft's .com domain at
streamer.microsoft.com was cracked and defaced in the early hours of Tuesday
morning by a computer crackers calling themselves Prime Suspectz. Just last
Friday, the same group, which claims to be based in Brazil, vandalised three
international Microsoft Web sites, Microsoft UK, Mexico and Saudi Arabia.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.co.uk/news/2001/18/ns-22672.html


HACKER ATTACKS UTV SITE
UTV are investigating how an attacker managed to link the front page of their
web site to a commemoration site for hunger-striker Bobby Sands last weekend.
According to UTV, the attacker changed a link early Saturday morning, May 5th.
The problem was rectified within hours of being spotted.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.ireland.com/newspaper/breaking/2001/0508/breaking44.htm


IIS ATTACKING WORM OUT THERE
CERT issued an advisory on a new piece of self-propagating malicious code.
Based on preliminary analysis, the sadmind/IIS worm exploits a vulnerability in
Solaris systems and subsequently installs software to attack Microsoft IIS web
servers. In addition, it includes a component to propagate itself automatically
to other vulnerable Solaris systems. It will add "+ +" to the .rhosts file in the
root user's home directory. Finally, it will modify the index.html on the host
Solaris system after compromising 2,000 IIS systems.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.cert.org/advisories/CA-2001-11.html


WHY OPENBSD WILL NEVER BE AS SECURE AS LINUX
OpenBSD fans everywhere simultaneously draw their flame guns and set them
to "well done". OpenBSD claims to be "secure by default", and has undergone
an extensive code audit -- so the question is this: has Kurt been hit in the
head with a blunt object, or what? Wait! Before you hit the send button and
put me out of my ignorance-induced misery, please read the whole article.
Your thoughts will probably be addressed.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://securityportal.com/closet/closet20010509.html


WHITEHAT HACKER MADE FBI PATSY
American federal officials used threats and a false promise of leniency to lure
computer security researcher and admitted cyber intruder Max Butler into
becoming an undercover FBI informant, according to a defense motion filed
in the case Tuesday. It was only when Butler balked at covertly recording a
friend and colleague, and instead sought advice from an attorney, that the
government threw the book at him, the motion charges. "The government as
much as promised him he would receive consideration," says defense attorney
Jennifer Granick. "At least until he hired an attorney."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.theregister.co.uk/content/8/18817.html


AUSTRALIAN PARLIAMENT HIT BY VBSWG.X
VBSWG.X has hit the Australian parliament's e-mail system opening a selection
of pornographic websites on its victims' screens. International research company
Trend Micro says the virus was first detected in the US and has spread to more
than 50 Australian businesses. At least 2,500 cases of the virus have also been
recorded in New Zealand.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.ananova.com/news/story/sm_287043.html


AN INTRODUCTION TO NESSUS
"There are a number of security scanners out there. Most of them are vendor
specific, and each boasts a number of vulnerability checks to determine what
is secure on your system and what is not. So what if you are a hardcore open
source paranoid like myself who wouldn't think to spend a dime on the latest
commercial security scanner from CyberSlueths or CrackerCops? Well there is
a superior alternative that is regularly updated, free, and open source. It's
called Nessus, and it is by far the best scanner available."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.linuxsecurity.com/feature_stories/feature_story-86.html


BALTIMORE WILL FIRE 10% OF STAFF?
Baltimore Technologies Plc, a security software maker that issued two lowered
profit forecasts this year, may fire as many as 120 workers or about 10 percent
of its staff, the Irish Independent newspaper said, citing analysts.
Link: http://news.cnet.com/investor/news/newsitem/0-9900-1028-5868866-0.html


VBSWG.X UPDATE
A spokesman for the antiviral software company Sophos said that 80 companies
have reported being hit by the virus, and several said that they have each sent
out up to 100,000 infected e-mails. Another antiviral firm, MessageLabs, reports
similar statistics, adding that its data indicates Homepage is spreading faster
than the Kournikova virus.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.wired.com/news/culture/0,1284,43681,00.html


"WAR" IS OVER
Chinese 'hackers', engaged in a "cyberwar" with their counterparts in the
United States, boasted on Wednesday they had defaced 1,000 U.S. Web
sites, but called a truce to the conflict.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.com/zdnn/stories/news/0,4586,5082576,00.html


DUMMY INTERNET FIRM USED TO SNAG RUSSIAN HACKERS
Invita Security Corp. looked like a typical Internet company: It had offices,
computers, employees, even a secure computer system. The only thing
missing was the customers. Far from a failed start-up, the aptly named
Invita turned out to be a bogus company set up by the Federal Bureau
of Investigation to ensnare a pair of young Russian hackers accused of
breaking into U.S. Internet companies' computers, stealing financial and
other sensitive data and demanding extortion payments. Authorities say
Alexey Ivanov, 21, and Vasily Gorshkov, 25, both of Chelyabinsk, fell for
the bait. Arrested and jailed on 20 criminal counts including conspiracy
and wire fraud, they are set to go on trial May 29 in federal court in Seattle.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.dallasnews.com/technology/362473_fbihackers_10b.html


WINDOWS VS. LINUX - TAKING SECURITY SERIOUSLY
Network security cannot be left to chance these days. It is incumbent on
businesses, given the throng of Internet connections across the globe, that
their systems - no matter what types of operating systems or servers involved,
are patched, hardened and secure. Then again, if it is up to individual
organisations to protect what they have, perhaps the role of OS vendors is to
strengthen the security features they offer. Just which vendor does this better
is difficult to establish. While proponents of Linux systems maintain that the
many security vulnerabilities and attacks coming to the fore are due to
Microsoft's dominance in the market and its inherent vulnerabilities, others
believe that Bill Gates' behemoth company is beginning to hold its own in
acknowledging and addressing security issues. With fame, however,
misfortune can follow.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.westcoast.com/securecomputing/2001_05/special/special.html


USING SENDMAIL AND AMAVIS TO HALT VIRUS DISTRIBUTION
Unlike days past where viruses were primarily spread through sneaker-net
distribution of floppy disks, most modern viruses are spread via e-mail.
Advanced scripting languages for the Windows platform coupled with the
relative insecurity of certain Windows mail clients have increased the ranks
of the virus, worm, and other mal-ware authors. Fortunately, most Unix
servers and mail systems can halt the spread of such mal-ware. This tutorial
will focus on integrating the AMaViS (0.2.1) anti-virus cleanser with Sendmail
8.9.1b, the default mail server shipped with Solaris 7. However, the setup and
configuration procedures are very similar on Linux and xBSD.
Link: http://www.sunhelp.org/pages.php?page=article-amavis


SECURING LINUX WITH AIDE
It is often difficult to assess damage from an intrusion through syslogs and good
old-fashioned sysadmin work alone. Host-based intrusion detection systems can
assist in these efforts. One such host-based IDS for Unix operating systems is
AIDE. AIDE is a valuable, configurable tool that takes a snapshot of a system
in its original state in order to track subsequent changes in the system. This
article will discuss various aspects of using AIDE on Linux systems, including:
configuring and using AIDE, troubleshooting your configuration, reviewing logs
and cleaning up rulesets.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.securityfocus.com/focus/linux/articles/linuxaide.html


MAC: RIPE FOR A HACK?
"Think Different" has been an Apple rallying cry for the last few years. And
recently, many Mac fans have begun to think different(ly) - about computer
security. Macs have rarely been the target of hack attacks or viruses, due
in part to the fact that many malicious hackers are unfamiliar with the Mac
operating system. But Apple's new operating system, OS X, is built around
an open-source, Unix-based core - an operating system that many hackers
are already very familiar with.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.wired.com/news/infostructure/0,1377,43638,00.html


INFOSYS TRACKING ATTACKERS
India's top software firm Infosys Technologies said Tuesday it has tracked down
the origin of computer hackers who targeted its website on Monday. "The attack
seems to have been launched from an educational institution. We are trying to
reach the administrators of the institution to pinpoint the source," the company
said in a statement.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.timesofindia.com/090501/09info17.htm


ICSA LABS TO CERTIFY PC FIREWALLS
TruSecure Corp.'s ICSA Labs division has added PC Firewalls to its list of security
applications that it certifies. Through the personal firewall certification program,
personal firewall vendors will have their software tested, assessed, and validated
by ICSA's independent labs.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.informationweek.com/story/IWK20010510S0003


GOVERNMENT AGENCIES DEFLECT "HOMEPAGE" WORM
“We haven’t seen anything significant in the United States,” said a spokesman
for FedCIRC, the government’s computer intrusion response center. “It has
mostly been overseas.”
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.gcn.com/vol1_no1/daily-updates/4221-1.html


GATEWAY UK TURNS PERSONAL INFO PUBLIC
A security gaffe by Gateway 2000 has resulted in the exposure of sensitive
customer information on the PC vendor's web site. Up until late this afternoon
searching for 'delivery cost' on Gateway's UK site returned two copies of an
Excel spreadsheet containing order details, customer contacts and phone
numbers.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.theregister.co.uk/content/8/18867.html


DMZS FOR DUMMIES
You've ordered a new firewall, and you want to get it running on your network
ASAP. Your first reaction is probably to put every client and server behind it.
That's fine for a small company, but a larger company should consider creating
a perimeter security network called a demilitarized zone (DMZ) that separates
the internal network from the outside world.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.com/enterprise/stories/main/0,10228,2717224,00.html


ASK BUFFY
Questions this week cover Logging Root Commands; WINS, NetBIOS problems;
Protecting Solaris from IP Spoofing; xinetd and tcp_wrappers; and BCC Email
Tracking.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://securityportal.com/buffy/buffy20010510.html


ANOTHER HOTMAIL SCAM
"You're one of 100 hotmail winners!" reads the title from an email apparently
sent from from the "Hotmail Staff" and presents the users with a form to indicate
sign-in name, password, comments and..a picture. Infact the email was sent by
a "max@relay.1c.kiev.ua" and over html code directly links to http://193.125.79.67/,
which according to the RIPE whois data base belongs the Tara Shevchenko Kiev
University, 01033 Kiev, Ukraine. The only price to win would be your hacked
hotmail account.


IIS WORM - 8836 IP ADDRESSES ATTACKED
On Tuesday, May 8, Attrition staff received email containing a list of 8836 IP
addresses that were said to be victims of the "sadmind/IIS Worm". From there,
they broke the list down into a few major types of machines/names; ADSL
boxes, Cable Modems, DHCP servers, DNS machines, DSL boxes, Mail hosts,
personal machines, "regular" servers and "in-addr" addresses.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.attrition.org/security/commentary/worm01.html


2600.COM WASN'T HIJACKED; NSI PROBLEMS
2600.com reported that their domain got hijacked yesterday - "Imagine our
surprise when we were told by readers that 2600.com no longer belongs to
2600.com! That's the nightmare that we were greeted with on Friday due to
a bizarre foulup with Network Solutions." In a short time they were able to
track down the right people at Network Solutions Inc, so the mistake got fixed.
Link: http://www.2600.com/news/display.shtml?id=412
Link: http://www.2600.com/news/display.shtml?id=413


STATE DEPARTMENT'S OFFICE OF IIP SITE DEFACED
A confidential U.S. State Department Web site (State Department's Office of
International Information Programs) was defaced and some internal Internet
servers were shut down in a cyberattack launched earlier this week by an
unknown assailant, department spokeswoman Victoria DeLong announced.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.computerworld.com/cwi/stories/0,1199,NAV47-68-84-88_STO60494,00.html


PROTOCOL TO SECURE DATA FOR WLANS
Industry experts are tipping Kerberos to become the accepted security standard
for roaming between access points in the growing wireless local area network
(WLAN) market. Concerns about the rival Wireless Equivalent Privacy (WEP)
security protocol used in the 802.11b WLAN standard have surfaced recently,
putting IT managers off adopting the technology, due to fears about the
security of connections and the verification of users as they 'roam' from
one access point to another.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.co.uk/news/2001/18/ns-22764.html


0WN THIS BOX CHALLENGE
Cylant's "0wn this box challenge" is a research effort providing a good
challenge to skilled crackers. Dave Wreski and Benjamin Thomas of
LinuxSecurity.com interview Cylant Technology, Inc.seeking to find
more information regarding the work to create this contest, and the
experiences gained from holding it.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.linuxsecurity.com/feature_stories/feature_story-87.html

----------------------------------------------------------------------------




Security issues
---------------

All vulnerabilities are located at:
http://net-security.org/text/bugs


----------------------------------------------------------------------------

DEBIAN LINUX: CRON LOCAL ROOT EXPLOIT
A recent (fall 2000) security fix to cron introduced an error in giving up
privileges before invoking the editor. A malicious user could easily gain
root access. This has been fixed in version 3.0pl1-57.3 (or 3.0pl1-67
for unstable). No exploits are known to exist, but we recommend that
you upgrade your cron packages immediately.
Link: http://www.net-security.org/text/bugs/989242718,76559,.shtml


IIS 5.0 PROPFIND DoS #2
It is possible to remotely restart all IIS related services using specially
crafted request. If this request is repeated continously this seriously
affects IIS performance.
Link: http://www.net-security.org/text/bugs/989242918,59658,.shtml


MP3MYSTIC VULNERABILITY
MP3Mystic is a webserver that lets a visitor browse your harddrive only
showing MP3 files. It is vulnerable to the dot dot bug.
Link: http://www.net-security.org/text/bugs/989345433,40148,.shtml


ELECTROCOMM 2.0 VULNERABILITY
ElectroComm allows you to connect to a comm port on a computer over a
network using any Telnet client. The program can fall victim to a DoS.
Link: http://www.net-security.org/text/bugs/989345489,35284,.shtml


VIRTUAL DNS VULNERABILITY
Virtual DNS (Vdns) allows users with DSL & ADSL type connections to run their
own web server with their own domain name. It suffers from a DoS.
Link: http://www.net-security.org/text/bugs/989345611,74236,.shtml


LINUX MANDRAKE - PINE UPDATE
Versions of the Pine email client prior to 4.33 have various temporary file
creation problems, as does the pico editor. These issues allow any user
with local system access to cause any files owned by any other user,
including root, to potentially be overwritten if the conditions were right.
Link: http://www.net-security.org/text/bugs/989351502,70657,.shtml


TURBOLINUX SECURITY ANNOUNCEMENT: VIXIE-CRON
A security hole has been discovered in the package vixie-cron. Please
update the packages in your installation as soon as possible.
Link: http://www.net-security.org/text/bugs/989408997,40125,.shtml


TURBOLINUX SECURITY ANNOUNCEMENT: SQUID
A security hole has been discovered in the package squid. Please update
this package in your installation as soon as possible.
Link: http://www.net-security.org/text/bugs/989409105,89300,.shtml


TURBOLINUX SECURITY ANNOUNCEMENT: DHCP
A security hole has been discovered in the dhcp packages. Please update
the packages in your installation as soon as possible.
Link: http://www.net-security.org/text/bugs/989409220,8713,.shtml


TURBOLINUX SECURITY ANNOUNCEMENT: XNTP3
A security hole has been discovered in the xntp3 packages. Please update
the packages in your installation as soon as possible.
Link: http://www.net-security.org/text/bugs/989409271,97178,.shtml


WINDOWS 2000 KERBEROS DoS
The Kerberos service and kerberos password service contain a flaw that could
allow a malicious attacker to cause a Denial of Service on the Kerberos service
and thus making all domain authentication impossible.
Link: http://www.net-security.org/text/bugs/989436098,15488,.shtml


DEBIAN LINUX - SAMBA SECURITY FIX UPDATE
Marc Jacobsen from HP discovered that the security fixes from samba 2.0.8 did
not fully fix the /tmp symlink attack problem. The samba team released version
2.0.9 to fix that, and those fixes have been added to version 2.0.7-3.3 of the
Debian samba packages.
Link: http://www.net-security.org/text/bugs/989582948,34149,.shtml


RED HAT LINUX: UPDATED NEDIT PACKAGES
nedit creates temporary files in an insecure fashion. This version has been
patched to use mkstemp().
Link: http://www.net-security.org/text/bugs/989583041,52988,.shtml


SQL SERVER 7.0 SERVICE PACK PASSWORD BUG
When SQL Server 7.0 Service Packs 1, 2, or 3 are installed on a machine that
is configured to perform authentication using Mixed Mode, the password for the
SQL Server standard security System Administrator (sa) account is recorded in
plaintext in the files %TEMP%\sqlsp.log and %WINNT%\setup.iss. The default
permissions on the files would allow any user to read them who could log onto
the server interactively.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.microsoft.com/technet/security/bulletin/MS00-035.asp


VULNERABILTY IN TYPSOFT FTP SERVER V0.95
An attacker with anonymous access to the ftp server can break out of the ftp
root using the dot vulnerability.
Link: http://www.net-security.org/text/bugs/989607354,81774,.shtml


DENICOMP REXECD/RSHD DENIAL OF SERVICE
There exists a problem in the port-handling code of mentioned products which
exposes the services provided by these to a DoS attack.
Link: http://www.net-security.org/text/bugs/989607535,50259,.shtml


DEBIAN LINUX - GFTP REMOTE EXPLOIT
The gftp package as distributed with Debian GNU/Linux 2.2 has a problem
in its logging code: it logged data received from the network but it did
not protect itself from printf format attacks. An attacker can use this
by making a FTP server return special responses that exploit this.
Link: http://www.net-security.org/text/bugs/989607865,68250,.shtml

----------------------------------------------------------------------------




Security world
--------------

All press releases are located at:
http://net-security.org/text/press


----------------------------------------------------------------------------

TRAFFIC LIMITING INTRUSION DETECTION SYSTEM (TLIDS) - [07.05.2001]

Captus Networks, the world leader in protecting against Denial of Service
attacks, announced a major software enhancement to its CaptIO family of
network security solutions that greatly simplifies the task of systems
administrators for ensuring the security and availability of their Internet
networks.

Press release:
< http://www.net-security.org/text/press/989243503,12040,.shtml >

----------------------------------------------------------------------------

SAFENET PARTNERS WITH TEXAS INSTRUMENTS - [07.05.2001]

SafeNet, a leading provider of Internet security technology that is the de facto
standard in the VPN industry, announced that it has been chosen to partner
with Texas Instruments to provide a new wireless security library for next
generation (2.5 and 3G) wireless devices. SafeNet's encryption technology,
combined with TI's DSP-based OMAP family of processors, will enable the
strongest security for next generation wireless devices including personal
digital assistants, cell phones, and pagers. The OMAP architecture is fast
becoming a de facto standard for 2.5 and 3G wireless devices. Today, TI's
OMAP architecture has been publicly endorsed by Nokia, Ericsson, Sony,
Sendo, HTC, Symbian, Microsoft, and Sun Microsystems.

Press release:
< http://www.net-security.org/text/press/989243541,30009,.shtml >

----------------------------------------------------------------------------

PROACTIVENET 4.0 PROVIDES ROOT CAUSE ANALYSIS - [08.05.2001]

ProactiveNet, Inc., a leading provider of performance management solutions for
Internet, intranet and extranet applications, today announced ProactiveNet 4.0,
the company's flagship management application. The product makes its debut at
the Networld + Interop show in Las Vegas this week, in ProactiveNet's booth #1825.

Press release:
< http://www.net-security.org/text/press/989316924,18917,.shtml >

----------------------------------------------------------------------------

STONEBRIDGE TECHNOLOGIES AND ISS PARTNER - [08.05.2001]

Stonebridge Technologies, an award-winning technology consulting firm,
announced that the company is extending its infrastructure service offerings
through a strategic alliance with Internet Security Systems (ISS), a leading
provider of security management solutions for the Internet.

Press release:
< http://www.net-security.org/text/press/989317193,42924,.shtml >

----------------------------------------------------------------------------

ANTI-VIRUS INFORMATION EXCHANGE NETWORK GROWS - [08.05.2001]

The Anti-Virus Information Exchange Network and its associated Early Warning
System continue to increase their growth at a fast pace. At the end of April,
2001, with just 6 months of activity, AVIEN already includes antivirus specialists
who support more than 2 million end users.

Press release:
< http://www.net-security.org/text/press/989336150,58744,.shtml >

----------------------------------------------------------------------------

WATCHGUARD: FIREBOX 2500 AND FIREBOX 4500 - [08.05.2001]

WatchGuard Technologies, Inc., a leader in Internet security solutions, introduced
its next generation of award-winning Firebox Internet security appliances at the
NetWorld + Interop Conference in Las Vegas. The Firebox III family, consisting of
the Firebox 2500 and Firebox 4500, redefine price/performance by delivering
industry-leading performance at prices that are affordable for larger distributed
organizations and Internet data centers with the need to secure a large number
of VPN connections.

Press release:
< http://www.net-security.org/text/press/989336211,66652,.shtml >

----------------------------------------------------------------------------

RAINBOW IVEA AWARDED AT N+I - [08.05.2001]

Rainbow iVEA, a Rainbow Technologies (Nasdaq: RNBO) company and a leading
provider of high-performance security solutions for the Internet and eCommerce,
announced that the CryptoSwift 600 eCommerce accelerator captured a Well
Connected Award by Network Computing Magazine at the Spring 2001 Networld+
Interop Conference in Las Vegas. The CryptoSwift 600 defeated the nCipher
nForce 300 and the Compaq AXL2000 Accelerator PCI Card for "Best SSL
Acceleration Solution."

Press release:
< http://www.net-security.org/text/press/989350887,96012,.shtml >

----------------------------------------------------------------------------

F-SECURE ALERTS USERS ON VBSWG.X WORM - [09.05.2001]

F-Secure Corporation, a leading provider of centrally-managed, widely
distributed security solutions is alerting computer users worldwide about
a new, rapidly spreading e-mail worm named VBSWG.X, also known as
Homepage, is an encrypted e-mail worm found in the wild on May 9th,
2001.

Press release:
< http://www.net-security.org/text/press/989407841,43920,.shtml >

----------------------------------------------------------------------------

VISUALSOFT CRYPT WINS JOLT PRODUCTIVITY AWARD - [09.05.2001]

VisualSoft Technologies, a leading Software Products and Solutions development
company, today announced that VisualSoft Crypt won Software Development
magazine's Jolt Productivity Award in the category of "Libraries, Frameworks and
Components". The Jolt Awards were announced by CMP's Software Development
magazine on April 11th, 2001 at Software Development West Conference and
Exposition at the San Jose Convention Center in San Jose, CA.

Press release:
< http://www.net-security.org/text/press/989407988,53034,.shtml >

----------------------------------------------------------------------------

INFOEXPRESS WINS NETWORK COMPUTING’S AWARD - [09.05.2001]

InfoExpress, a pioneer in enterprise remote access security solutions,
announced that its CyberArmor Suite Enterprise Personal Firewall 1.1 has
been named a winner of CMP Media LLC’s Network Computing for a 2001
Well-Connected Award in the category of Desktop Firewall. CyberArmor
was chosen for its innovative centralized security policy management
capability to protect corporate assets from various malicious Internet
attacks. CyberArmor also offers the industry’s only environmentally
sensitive policy- based solution. It can select the active policy by
differentiating between users on the corporate network, when a
remote VPN session is active, or when they are surfing the Internet.

Press release:
< http://www.net-security.org/text/press/989431870,88278,.shtml >

----------------------------------------------------------------------------

MELCAM SURVEILLANCE APPLICATION FOR PC CAMERAS - [10.05.2001]

MelCam is easy to operate, keeps real-time tabs on vulnerable assets and
increases security levels. Physical areas that are secured with a MelCam
system benefit from Melioris' proprietary "Multi-Channel Security" - the
ability to monitor and respond to incidents in a multiple number of ways,
concurrently.

Press release:
< http://www.net-security.org/text/press/989494304,54252,.shtml >

----------------------------------------------------------------------------

NEW DEVICELOCK MILLENNIUM EDITION RELEASED - [10.05.2001]

SmartLine, Inc. announced the new release of DeviceLock Millennium Edition, a
Windows service for restricting access to local devices running Windows 95/98/Me.
Preventing the introduction of inappropriate software and data is important when
trying to protect and administer a company's computer network. The traditional
solution has been a physical lock on the floppy drive. DeviceLock Me eliminates
the need for physical locks and has a number of advantages. It is easy to install
and administrators can have instant access from the remote computers when
necessary. There are no physical keys to store and manage - DeviceLock Me
is a software-only solution.

Press release:
< http://www.net-security.org/text/press/989519175,1325,.shtml >

----------------------------------------------------------------------------

SOPHOS DEFENDS IRISH SCHOOLS THROUGH ICL - [10.05.2001]

Sophos, a world leader in corporate anti-virus protection, announced that it is
to protect IT systems in all of Northern Ireland's schools from virus attack.
Sophos will defend the schools as part of a deal with eBusiness services company,
ICL. Under the terms of the deal, all Northern Irish secondary schools will switch
from their existing anti-virus protection (provided through CLASS - the
Computerisation of Local Administration Systems in Schools) to that provided
by Sophos. All of the region's primary school IT systems are already protected
by Sophos Anti-Virus.

Press release:
< http://www.net-security.org/text/press/989519256,16494,.shtml >

----------------------------------------------------------------------------

SURFCONTROL SLAMS THE DOOR ON VBSWG.X - [11.05.2001]

SurfControl, the Internet Filtering Company, announced that SurfControl is part
of the preventative measures that corporations are putting in place to protect
themselves from email born viruses like the recent "homepage" attack. Given that
SurfControl's SuperScout Email Filter sits between the email server and the virtual
boarder, and works with a corporation's existing anti-virus software, the product
can stop viruses at the door before they get to the email server.

Press release:
< http://www.net-security.org/text/press/989533926,93756,.shtml >

----------------------------------------------------------------------------

CHECKPOINT AND ISS CO-SPONSOR ENET - [11.05.2001]

Check Point Software Technologies Ltd. and Internet Security Systems (ISS),
two Internet security leaders, today announced that they have been selected
for the fourth consecutive year as network security co-sponsors of the Interop
Net Event Network (eNet) at NetWorld+Interop in Las Vegas. Check Point and
ISS have provided integrated Internet security technology, real-time monitoring
and expertise for protecting the complex network. The eNet is an integral part
of NetWorld+Interop, held May 7-11, 2001 at the Las Vegas Convention Center.

Press release:
< http://www.net-security.org/text/press/989533992,80558,.shtml >

----------------------------------------------------------------------------

SURFCONTROL ANNOUNCES GRANT OF US PATENT - [11.05.2001]

SurfControl, the Internet Filtering Company, is pleased to announce today
that the US Patent Office has granted to SurfControl a patent on its core
web filtering technology and processes. The US Patent 6,219,786, granted
to SurfControl, Inc., describes the unique system for managing access
control to resources of a distributed network, and more particularly to
monitoring computer users' access to those resources from within and
outside the network.

Press release:
< http://www.net-security.org/text/press/989534017,22824,.shtml >

----------------------------------------------------------------------------

ZEASOFT RELEASES TASK TERMINATOR - [11.05.2001]

ZeaSoft is proud to announce a new release of our free utility, Task Terminator
(http://www.zeasoft.com/products/taskterm.htm). Task Terminator is a free
utility from ZeaSoft which allows you to terminate any task or window running
on your machine, even hidden programs and services which are invisible to the
Windows Task Manager (that window that pops up when you hit Ctrl-Alt-Del).
Task Terminator has the look and feel of the Windows Task Manager to make
it instantly familiar to Windows users.

Press release:
< http://www.net-security.org/text/press/989583281,21227,.shtml >

----------------------------------------------------------------------------

EEYE DIGITAL SECURITY RELEASES SECUREIIS - [11.05.2001]

SecureIIS is the latest in proactive network security tools from eEye Digital
Security. SecureIIS protects Microsoft IIS Web servers from known and
unknown hacker attacks. SecureIIS wraps around IIS and works within it,
verifying and analyzing incoming and outgoing Web server data for any
possible security breaches. It prevents these breach attempts from
penetrating the server, and alerts the network administrator when such
attacks occur. SecureIIS combines the best features of Intrusion Detection
Systems and Network Firewalls all into one, and it is custom tailored to your
Web server.

Press release:
< http://www.net-security.org/text/press/989583781,34566,.shtml >

----------------------------------------------------------------------------

LEADING SECURITY COMPANIES COMBINE PRODUCTS - [11.05.2001]

At Networld + Interop today, networking, antivirus and Internet security leaders
Linksys, TrendMicro Inc., and Zone Labs announced they will combine their
products and technologies into one comprehensive, best-of-breed security
solution for the small/medium business and home networking market. Linksys
EtherFast Cable/DSL Router users will benefit from ironclad protection for their
networks consisting of Zone Labs' ZoneAlarm Pro Internet security utility and
Trend Micro's PC-cillin antivirus software as part of a complete hardware
and software solution.

Press release:
< http://www.net-security.org/text/press/989583975,40156,.shtml >

----------------------------------------------------------------------------

TRIPWIRE HONORED AS UPSIDE MAGAZINE - [12.05.2001]

Tripwire Inc., the leading provider of data and network integrity (DNI) software,
announced that it has been selected by UPSIDE Magazine as one of the 2001
Hot 100 private companies. Tripwire was selected by the editors of UPSIDE and
an advisory panel comprised of venture capitalists, financial analysts and market
researchers. More than 800 companies were nominated for this year's UPSIDE
Hot 100 Awards. Each company was judged on the basis of its technological
achievements, customer acceptance of products or services, financial
performance, industry partnerships, financial backing, and management
experience.

Press release:
< http://www.net-security.org/text/press/989625999,42397,.shtml >

----------------------------------------------------------------------------

MCAFEE USERS UNAFFECTED BY HOMEPAGE WORM - [12.05.2001]

McAfee, a division of Network Associates, Inc. and recognized leader in anti
virus security solutions, today announced that its gateway anti-virus products
and services protected leading businesses from the recently discovered
Homepage worm. McAfee's advanced scanning technology detected and
cleaned the Homepage worm at Major League Soccer, Loancity.com, Affinity
Health System and other leading McAfee corporate businesses. Similar to the
AnnaKournikova virus detected earlier this year, McAfee AVERT (Anti-Virus
Emergency Response Team) worked closely with customers to provide up-to-
date diagnostics and information regarding the virus.

Press release:
< http://www.net-security.org/text/press/989659179,31194,.shtml >

----------------------------------------------------------------------------

PREPARATIONS FOR RSA CONFERENCE 2001 ASIA - [12.05.2001]

As e-commerce continues to gain a strong foothold in Asia, RSA Security Inc.,
the most trusted name in e-security, announced the program for RSA Conference
2001, Asia, which will be held July 9 - 12, 2001 at the Singapore International
Convention and Exhibition Center in Suntec City, Singapore. RSA Security's first
annual e-security conference and exposition in the Asia-Pacific region is designed
to address the critical e-security and privacy issues facing business, government
and the public. RSA Conference 2001, Asia is modeled after the U.S.-based RSA
Conference, the world's largest security event, which drew more than 10,000
attendees last April in San Francisco, Calif.

Press release:
< http://www.net-security.org/text/press/989659469,10481,.shtml >

----------------------------------------------------------------------------

ALADDIN'S ESAFE PROTECTS OF HOMEPAGE WORM - [12.05.2001]

Aladdin Knowledge Systems, a global leader in the field of Internet content and
software security, today announced its eSafe Internet content security solution
successfully blocks the new medium-risk vandal named VBS.Homepage.

Press release:
< http://www.net-security.org/text/press/989659605,74425,.shtml >

----------------------------------------------------------------------------

BIOMETRIC SECURITY FOR NEW NASA FACILITY - [12.05.2001]

Bioscrypt Inc., a leading provider of biometric authentication solutions, announced
that the Triana Science and Operations Center (TSOC), a NASA funded facility at
the University of California in San Diego, is using Bioscrypt's advanced biometric
technology to control physical access and provide security for their operations.

Press release:
< http://www.net-security.org/text/press/989659723,75766,.shtml >

----------------------------------------------------------------------------




Featured products
-------------------

The HNS Security Database is located at:
http://www.security-db.com

Submissions for the database can be sent to: staff@net-security.org


----------------------------------------------------------------------------

GENUITY SECURITY ADVANTAGE

Genuity Security Advantage service lets you outsource your security needs
and gives you local access to security management services independent of
any specific ISP, hardware platform, or operating system. Furthermore, the
service uses IPsec-compliant hardware and software, enabling you to
establish secure, site-to-site Virtual Private Networks (VPNs), thereby
avoiding costly leased-line fees.

Read more:
< http://www.security-db.com/product.php?id=149 >

This is a product of Genuity, for more information:
< http://www.security-db.com/info.php?id=27 >

----------------------------------------------------------------------------

LT AUDITOR+

Blue Lance´s LT Auditor+ is a Windows-based intrusion detection/audit trail
security software solution. LT Auditor+ is designed to protect organizational
assets accessible through NT and/or Novell networks. LT Auditor+ provides
around-the-clock monitoring of network activity across the enterprise. LT
Auditor+ is used to secure corporate assets against unauthorized access,
fraud and theft. Highly acclaimed by Netware Users International, Blue
Lance's LT Auditor+ is in use by the world´s largest banks, government
agencies and corporations.

Read more:
< http://www.security-db.com/product.php?id=436 >

This is a product of Blue Lance, for more information:
< http://www.security-db.com/info.php?id=97 >

----------------------------------------------------------------------------

LANGUARD NETWORK SCANNER

LANguard network scanner is a freeware security scanner to audit your network
security. It scans entire networks and provides NETBIOS information for each
computer such as hostname, shares, logged on user name. It does OS detection,
password strength testing, detects registry issues and more. Reports are
outputted in HTML.

A security scanner that is always up to date
Many commercial security scanning tools exist that claim to find all security holes
in an OS. Fact is, because of the number of OS versions (service packs) & amount
of security issues discovered daily, these database based products are almost
immediately out of date.

Read more:
< http://www.security-db.com/product.php?id=640 >

This is a product of GFI Software Ltd., for more information:
< http://www.security-db.com/info.php?id=146 >

----------------------------------------------------------------------------




Security Software
-------------------

All programs are located at:
http://net-security.org/various/software

----------------------------------------------------------------------------

VISUALSOFT FILESECURE

VisualSoft FileSecure encrypts selected files and/or folders and produces a
self-decryption archive. The encrypted file can be decrypted simply by double
clicking the archive with the given passphrase. The user needs no installation
of any application to decrypt the files. The user can also split the generated
self-decryption archive by choosing appropriate settings. VisualSoft FileSecure
uses Blowfish symmetric key for both encryption and de-cryptio. It can also
provides file compression and secure file transfer using FTP.

Info/Download:
< http://www.net-security.org/various/software/989519664,9161,windows.shtml >

----------------------------------------------------------------------------

VISUALSOFT CRYPT V.3.0

VisualSoft Crypt provides strong cryptographic algorithms for secure enterprise
application development. Information such as Passwords, Credit Card numbers,
Email and other transaction data can be securely transferred on the untrusted
networks like Internet etc., using this component. It encrypts and decrypts
files using Advanced Encryption Standard (Rijndael) algorithm and Industry
standard Cryptography methodologies namely Serpent, Mars, DES, TDES,
BlowFish, and IDEA. This component also supports MIME Format files. It is
can also be used to store or transport information securely within a
network environment.

Info/Download:
< http://www.net-security.org/various/software/989519782,27322,windows.shtml >

----------------------------------------------------------------------------

PORT SCAN ATTACK DETECTOR

Port Scan Attack Detector (psad) is a perl program that is designed to work
with Linux firewalling code (iptables in the 2.4.x kernels, and ipchains in the
2.2.x kernels) to detect port scans. It features a set of highly configurable
danger thresholds (with sensible defaults provided), verbose alert messages
that include the source, destination, scanned port range, begin and end times,
TCP flags and corresponding nmap options (Linux 2.4.x kernels only), email
alerting, and automatic blocking of offending IP addresses via dynamic
configuration of ipchains/iptables firewall rulesets. In addition, for the 2.4.x
kernels psad incorporates many of the TCP signatures included in Snort to
detect highly suspect scans for various backdoor programs (e.g. EvilFTP,
GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port
scans (syn, fin, Xmas) which are easily leveraged against a machine
via nmap.

Info/Download:
< http://www.net-security.org/various/software/989519878,70603,linux.shtml >

----------------------------------------------------------------------------

PC VIPER

PC Viper is the first product of its kind to provide strong firewall security to
your home PC's as you surf the absolutely no protection against Internet
Intrusion. The PC Viper Personal Edition solves this problem by providing an
extremely strong firewall located on the user's machine. PC Viper sits between
the operating system and the modem to monitor all traffic. Because it is resident
on the same machine that it is protecting, Viper can monitor any PC applications
that access the Internet to protect against Trojan Horse Viruses from transmitting
user-sensitive information. PC Viper also features an adult-material filter built in
which can be enabled to prevent adult content or pornography from reaching the
protected machine.

Info/Download:
< http://www.net-security.org/various/software/989520145,24540,windows.shtml >

----------------------------------------------------------------------------




Defaced archives
------------------------

[07.05.2001]

Original: http://www.commerzbank.com.uy/
Defaced: http://defaced.alldas.de/mirror/2001/05/07/www.commerzbank.com.uy/
OS: Windows

Original: http://www.blizzard.com/
Defaced: http://defaced.alldas.de/mirror/2001/05/07/www.blizzard.com/
OS: Windows

Original: http://investor2.cnet.com/
Defaced: http://defaced.alldas.de/mirror/2001/05/07/investor2.cnet.com/
OS: Windows

Original: http://www.opel.dk/
Defaced: http://defaced.alldas.de/mirror/2001/05/07/www.opel.dk/
OS: Windows

Original: http://www.bmw.com.mx/
Defaced: http://defaced.alldas.de/mirror/2001/05/07/www.bmw.com.mx/
OS: Windows

Original: http://www.toyota.co.ug/
Defaced: http://defaced.alldas.de/mirror/2001/05/07/www.toyota.co.ug/
OS: Windows

Original: http://www.sanyo.com.mx/
Defaced: http://defaced.alldas.de/mirror/2001/05/07/www.sanyo.com.mx/
OS: Windows


[08.05.2001]

Original: http://www.mcdonalds.co.id/
Defaced: http://defaced.alldas.de/mirror/2001/05/08/www.mcdonalds.co.id/
OS: Windows

Original: http://www.fujifilm.co.kr/
Defaced: http://defaced.alldas.de/mirror/2001/05/08/www.fujifilm.co.kr/
OS: Windows

Original: http://www.honda.com.au/
Defaced: http://defaced.alldas.de/mirror/2001/05/08/www.honda.com.au/
OS: Windows

Original: http://www.puma.com/
Defaced: http://defaced.alldas.de/mirror/2001/05/08/www.puma.com/
OS: Windows

Original: http://www.dinersclub.com.ph/
Defaced: http://defaced.alldas.de/mirror/2001/05/08/www.dinersclub.com.ph/
OS: Windows

Original: http://www.toyota.kz/
Defaced: http://defaced.alldas.de/mirror/2001/05/08/www.toyota.kz/
OS: Windows

Original: http://www.unicef.no/
Defaced: http://defaced.alldas.de/mirror/2001/05/08/www.unicef.no/
OS: Windows

Original: http://streamer.microsoft.com/
Defaced: http://defaced.alldas.de/mirror/2001/05/08/streamer.microsoft.com/
OS: Windows


[09.05.2001]

Original: http://www.agfa.co.za/
Defaced: http://defaced.alldas.de/mirror/2001/05/09/www.agfa.co.za/
OS: Windows

Original: http://pc.microsoft.is/
Defaced: http://defaced.alldas.de/mirror/2001/05/09/pc.microsoft.is/
OS: Windows

Original: http://www.twbookmark.com/
Defaced: http://defaced.alldas.de/mirror/2001/05/09/www.twbookmark.com/
OS: Windows

Original: http://www.sanyo.com.mx/
Defaced: http://defaced.alldas.de/mirror/2001/05/09/www.sanyo.com.mx/
OS: Windows


[10.05.2001]

Original: http://webonair.worldonline.co.za/
Defaced: http://defaced.alldas.de/mirror/2001/05/10/webonair.worldonline.co.za/
OS: Windows

Original: http://www.quantum.it/
Defaced: http://defaced.alldas.de/mirror/2001/05/10/www.quantum.it/
OS: Windows

Original: http://www.compaq.co.jp/
Defaced: http://defaced.alldas.de/mirror/2001/05/10/www.compaq.co.jp/
OS: Windows

Original: http://www.wintek.be/
Defaced: http://defaced.alldas.de/mirror/2001/05/10/www.wintek.be/
OS: Windows


[11.05.2001]

Original: http://www.shipping.co.il/
Defaced: http://defaced.alldas.de/mirror/2001/05/11/www.shipping.co.il/
OS: Windows

Original: http://www.camelot.com/
Defaced: http://defaced.alldas.de/mirror/2001/05/11/www.camelot.com/
OS: Windows

Original: http://www.stockphotos.com.br/
Defaced: http://defaced.alldas.de/mirror/2001/05/11/www.stockphotos.com.br/
OS: Windows


[12.05.2001]

Original: http://www.datasun.com.hk/
Defaced: http://defaced.alldas.de/mirror/2001/05/12/www.datasun.com.hk/
OS: Windows

Original: http://www.chaintech.com.tw/
Defaced: http://defaced.alldas.de/mirror/2001/05/12/www.chaintech.com.tw/
OS: Windows

Original: http://www.exergy.net/
Defaced: http://defaced.alldas.de/mirror/2001/05/12/www.exergy.net/
OS: Windows

Original: http://www.twphillips.com/
Defaced: http://defaced.alldas.de/mirror/2001/05/12/www.twphillips.com/
OS: Windows

[13.05.2001]

Original: http://pmacrae.oracle.co.uk/
Defaced: http://defaced.alldas.de/mirror/2001/05/13/pmacrae.oracle.co.uk/
OS: Windows

Original: http://www.newport.com.hk/
Defaced: http://defaced.alldas.de/mirror/2001/05/13/www.newport.com.hk/
OS: Windows

----------------------------------------------------------------------------


========================================================
Advertisement - HNS Security Database
========================================================
HNS Security Database consists of a large database of security related
companies, their products, professional services and solutions. HNS
Security Database will provide a valuable asset to anyone interested in
implementing security measures and systems to their companies' networks.
Visit us at http://www.security-db.com
========================================================


Questions, contributions, comments or ideas go to:

Help Net Security staff

staff@net-security.org
http://net-security.org
http://security-db.com

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT