Skip to comments.
Know who's using your cable modem?
The Boston Globe ^
| 2/23/2004
| Hiawatha Bray
Posted on 02/23/2004 2:27:57 PM PST by Radix
Edited on 04/13/2004 2:11:42 AM PDT by Jim Robinson.
[history]
Peiter Mudge Zatko is giving up. Zatko is the legendary computer cracker who cofounded Lopht Heavy Industries, a Boston hacker collective that proudly shattered computer security systems and then announced their achievements to the world.
Long ago, Zatko went straight, using his skills to build digital moats and barricades around corporate and government computer systems. The work is interesting, and the pay is good. And yet Zatko's efforts have achieved little: No matter how good the defenses he erects, the bad guys find a way in.
(Excerpt) Read more at boston.com ...
TOPICS: Business/Economy; Culture/Society; News/Current Events
KEYWORDS: computersecurity; hacker; privacy
Navigation: use the links below to view more comments.
first 1-20, 21-38 next last
It wouldn't be so bad if home users took network security seriously. Then again, we should all change our oil more often, too, but who has time? Besides, changing oil is trivial, compared to configuring firewalls and installing patches.
1
posted on
02/23/2004 2:27:57 PM PST
by
Radix
To: Radix
This is old hat. Security professionals have been doing this for years - at least anyone worth their salt.
2
posted on
02/23/2004 2:30:21 PM PST
by
taxcontrol
(People are entitled to their opinion - no matter how wrong it is.)
To: Radix
This means that all of the standard firewalls and intrusion detection methods are worthless.The author needs a little education. FWs and IDS aren't all of a sudden worthless, they just have to be put at the point of VPN termination. In addition, there is FW/IDS available for the desktop which will prevent attacks (hint: firewalling isn't enough) and provide controlled access (verified by the FW/IDS) through the VPN tunnel.
3
posted on
02/23/2004 2:36:36 PM PST
by
xrp
To: xrp
BUMP
4
posted on
02/23/2004 2:38:46 PM PST
by
Publius6961
(40% of Californians are as dumb as a sack of rocks.)
To: xrp
ICM's are the only proven mechanism to stopping intruders.
5
posted on
02/23/2004 2:41:39 PM PST
by
Naspino
(HTTP://NASPINO.BLOGSPOT.COM: Whats an ICM?)
To: Naspino
Intelligent Contact Management Servers? Riiiiiiiiiiiight.
6
posted on
02/23/2004 2:44:09 PM PST
by
xrp
To: Diddle E. Squat
They all work fine for me...
8
posted on
02/23/2004 2:50:03 PM PST
by
general_re
(Ubi solitudinem faciunt, pacem appellant. - Tacitus)
To: Diddle E. Squat
Happens with or without the firewall, just noticed it. Anyone else get a blank page on those links?No, but the URLs redirect to a different Symantec website. They obviously have changed URLs and your web browser isn't accepting the forwarding.
9
posted on
02/23/2004 2:50:34 PM PST
by
xrp
To: Diddle E. Squat
Nope. It's just you.
10
posted on
02/23/2004 2:50:52 PM PST
by
balrog666
(Two things are infinite: the universe and human stupidity; and I'm not sure about the universe.)
To: general_re
Thanks. Looks like I've got a problem on my hands.
To: Radix
"There are thousands of new ways to attack every week," said cofounder Justin Bingham. "It's like an arms race. You really can't keep up." Aw, come on. The Linux folks have assured us they are impenetrable.
12
posted on
02/23/2004 2:51:15 PM PST
by
Uncle Miltie
(MEMRI, Lights the Corners of Their Minds!)
To: xrp
The "Honeypot" method is useful and relatively cheap in trapping your average hacker/cracker. The method works as such, you create an opening in your security that matches the motus operandi of those whom you deem to be potential infiltrators.
You then create a false repository of data, known as the "honeypot". You make this somewhat (not too easy to find) easy for the hacker to locate and manipulate. This diversionary technique allows you to observe the hacker without allowing the idiot to do any real damage to your network or data and gives you more time and opportunity to track his identity or whereabouts at least.
The whole time this 16 year old Russian kid is laughing and bragging to his friends. Meanwhile, you are deciphering his hops, morphs and masking techniques. Woolah!!!!Busted!!!
To: xrp
Thanks for the info. I've noticed lately that my computer doesn't ever forward to new URL's. Whenever I get a 'If you browser does not automatically redirect you in x seconds, click here', I always have to click it, it never shifts on its own. Only began doing this recently. Is there a control that prevents that, say in 'Tools' 'Internet Options'?
To: Naspino
ICBM's work good at stopping intruders too!
15
posted on
02/23/2004 2:56:43 PM PST
by
Chewbacca
("Turn off your machines! Walk off your jobs! Power to the People!" - The Ice Pirates)
To: Diddle E. Squat
Check your hosts file.
16
posted on
02/23/2004 2:57:05 PM PST
by
general_re
(Ubi solitudinem faciunt, pacem appellant. - Tacitus)
To: ChinaThreat
Sun Tzu applies to all walks of life. If you can't go to the enemy, let him come to you!!!
To: xrp
So, what would be a good tool when getting broadband? I've been a little out of it for a while. I'm interested in getting broadband but don't know what all is out there to protect it. Also, do I have to use MSN or Explorer or can I use a browser of my own choosing with broadband?
18
posted on
02/23/2004 2:58:30 PM PST
by
IYAS9YAS
(Go Fast, Turn Left!)
To: ChinaThreat
I like your style.
19
posted on
02/23/2004 3:00:10 PM PST
by
IYAS9YAS
(Go Fast, Turn Left!)
To: taxcontrol
This is old hat. Security professionals have been doing this for years - at least anyone worth their salt. Agreed. Aside from a liberal media bias there is also a systemic bias on the part of the media to report on things as if they are happening for the first time. Just like "Dog bites man" doesn't sell papers, neither does "Man bites dog for the 1000th time". It has to be "New Human-Canine interaction discovered" or "Huge increase in Dogs being bitten recorded". This is rampant throughout all of media - there has to be an excited, breathlessness about everything they report - even if it's been going on forever.
Navigation: use the links below to view more comments.
first 1-20, 21-38 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson