Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Know who's using your cable modem?
The Boston Globe ^ | 2/23/2004 | Hiawatha Bray

Posted on 02/23/2004 2:27:57 PM PST by Radix

Edited on 04/13/2004 2:11:42 AM PDT by Jim Robinson. [history]

Peiter Mudge Zatko is giving up. Zatko is the legendary computer cracker who cofounded Lopht Heavy Industries, a Boston hacker collective that proudly shattered computer security systems and then announced their achievements to the world.

Long ago, Zatko went straight, using his skills to build digital moats and barricades around corporate and government computer systems. The work is interesting, and the pay is good. And yet Zatko's efforts have achieved little: No matter how good the defenses he erects, the bad guys find a way in.


(Excerpt) Read more at boston.com ...


TOPICS: Business/Economy; Culture/Society; News/Current Events
KEYWORDS: computersecurity; hacker; privacy
Navigation: use the links below to view more comments.
first 1-2021-38 next last
It wouldn't be so bad if home users took network security seriously. Then again, we should all change our oil more often, too, but who has time? Besides, changing oil is trivial, compared to configuring firewalls and installing patches.
1 posted on 02/23/2004 2:27:57 PM PST by Radix
[ Post Reply | Private Reply | View Replies]

To: Radix
This is old hat. Security professionals have been doing this for years - at least anyone worth their salt.
2 posted on 02/23/2004 2:30:21 PM PST by taxcontrol (People are entitled to their opinion - no matter how wrong it is.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Radix
This means that all of the standard firewalls and intrusion detection methods are worthless.

The author needs a little education. FWs and IDS aren't all of a sudden worthless, they just have to be put at the point of VPN termination. In addition, there is FW/IDS available for the desktop which will prevent attacks (hint: firewalling isn't enough) and provide controlled access (verified by the FW/IDS) through the VPN tunnel.

3 posted on 02/23/2004 2:36:36 PM PST by xrp
[ Post Reply | Private Reply | To 1 | View Replies]

To: xrp
BUMP
4 posted on 02/23/2004 2:38:46 PM PST by Publius6961 (40% of Californians are as dumb as a sack of rocks.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: xrp
ICM's are the only proven mechanism to stopping intruders.
5 posted on 02/23/2004 2:41:39 PM PST by Naspino (HTTP://NASPINO.BLOGSPOT.COM: Whats an ICM?)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Naspino
Intelligent Contact Management Servers? Riiiiiiiiiiiight.
6 posted on 02/23/2004 2:44:09 PM PST by xrp
[ Post Reply | Private Reply | To 5 | View Replies]

Say, if I go to Symantec's homepage, http://www.symantec.com/ but then cannot pull up most of their links, such as:

http://www.symantec.com/ssr_home.html
http://www.symantec.com/dl_home.html
http://www.symantec.com/servsupp_home.html
http://www.symantec.com/prod_home.html
http://www.symantec.com/purch_home.html
http://www.symantec.com/hc_home.html
http://www.symantec.com/about_home.html

but instead get a white blank page with the statement 'Done' on the bottom bar, does that mean my computer is infected with something?

Happens with or without the firewall, just noticed it. Anyone else get a blank page on those links?
7 posted on 02/23/2004 2:46:00 PM PST by Diddle E. Squat
[ Post Reply | Private Reply | To 1 | View Replies]

To: Diddle E. Squat
They all work fine for me...
8 posted on 02/23/2004 2:50:03 PM PST by general_re (Ubi solitudinem faciunt, pacem appellant. - Tacitus)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Diddle E. Squat
Happens with or without the firewall, just noticed it. Anyone else get a blank page on those links?

No, but the URLs redirect to a different Symantec website. They obviously have changed URLs and your web browser isn't accepting the forwarding.

9 posted on 02/23/2004 2:50:34 PM PST by xrp
[ Post Reply | Private Reply | To 7 | View Replies]

To: Diddle E. Squat
Nope. It's just you.
10 posted on 02/23/2004 2:50:52 PM PST by balrog666 (Two things are infinite: the universe and human stupidity; and I'm not sure about the universe.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: general_re
Thanks. Looks like I've got a problem on my hands.
11 posted on 02/23/2004 2:51:04 PM PST by Diddle E. Squat
[ Post Reply | Private Reply | To 8 | View Replies]

To: Radix
"There are thousands of new ways to attack every week," said cofounder Justin Bingham. "It's like an arms race. You really can't keep up."

Aw, come on. The Linux folks have assured us they are impenetrable.

12 posted on 02/23/2004 2:51:15 PM PST by Uncle Miltie (MEMRI, Lights the Corners of Their Minds!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: xrp
The "Honeypot" method is useful and relatively cheap in trapping your average hacker/cracker. The method works as such, you create an opening in your security that matches the motus operandi of those whom you deem to be potential infiltrators.

You then create a false repository of data, known as the "honeypot". You make this somewhat (not too easy to find) easy for the hacker to locate and manipulate. This diversionary technique allows you to observe the hacker without allowing the idiot to do any real damage to your network or data and gives you more time and opportunity to track his identity or whereabouts at least.

The whole time this 16 year old Russian kid is laughing and bragging to his friends. Meanwhile, you are deciphering his hops, morphs and masking techniques. Woolah!!!!Busted!!!
13 posted on 02/23/2004 2:54:37 PM PST by ChinaThreat (E)
[ Post Reply | Private Reply | To 3 | View Replies]

To: xrp
Thanks for the info. I've noticed lately that my computer doesn't ever forward to new URL's. Whenever I get a 'If you browser does not automatically redirect you in x seconds, click here', I always have to click it, it never shifts on its own. Only began doing this recently. Is there a control that prevents that, say in 'Tools' 'Internet Options'?
14 posted on 02/23/2004 2:54:39 PM PST by Diddle E. Squat
[ Post Reply | Private Reply | To 9 | View Replies]

To: Naspino
ICBM's work good at stopping intruders too!
15 posted on 02/23/2004 2:56:43 PM PST by Chewbacca ("Turn off your machines! Walk off your jobs! Power to the People!" - The Ice Pirates)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Diddle E. Squat
Check your hosts file.
16 posted on 02/23/2004 2:57:05 PM PST by general_re (Ubi solitudinem faciunt, pacem appellant. - Tacitus)
[ Post Reply | Private Reply | To 11 | View Replies]

To: ChinaThreat
Sun Tzu applies to all walks of life. If you can't go to the enemy, let him come to you!!!
17 posted on 02/23/2004 2:58:24 PM PST by ChinaThreat (E)
[ Post Reply | Private Reply | To 13 | View Replies]

To: xrp
So, what would be a good tool when getting broadband? I've been a little out of it for a while. I'm interested in getting broadband but don't know what all is out there to protect it. Also, do I have to use MSN or Explorer or can I use a browser of my own choosing with broadband?
18 posted on 02/23/2004 2:58:30 PM PST by IYAS9YAS (Go Fast, Turn Left!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: ChinaThreat
I like your style.
19 posted on 02/23/2004 3:00:10 PM PST by IYAS9YAS (Go Fast, Turn Left!)
[ Post Reply | Private Reply | To 13 | View Replies]

To: taxcontrol
This is old hat. Security professionals have been doing this for years - at least anyone worth their salt.

Agreed. Aside from a liberal media bias there is also a systemic bias on the part of the media to report on things as if they are happening for the first time. Just like "Dog bites man" doesn't sell papers, neither does "Man bites dog for the 1000th time". It has to be "New Human-Canine interaction discovered" or "Huge increase in Dogs being bitten recorded". This is rampant throughout all of media - there has to be an excited, breathlessness about everything they report - even if it's been going on forever.

20 posted on 02/23/2004 3:04:54 PM PST by 2 Kool 2 Be 4-Gotten
[ Post Reply | Private Reply | To 2 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-38 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson