Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Computer virus creates peer-to-peer terror network.
www.WorldTribune.com ^ | Copyright 2002 | Scott McCollum

Posted on 09/17/2002 10:13:04 AM PDT by Scott McCollum

"The 13,800+ Linux servers infected by the Slapper worm have created a huge, intelligent P2P network that according to Symantec virus analysts can efficiently redirect network traffic, data and even router information from targeted networks back to the compromised Linux servers."

(Excerpt) Read more at worldtechtribune.com ...


TOPICS: Business/Economy; Crime/Corruption; News/Current Events
KEYWORDS: economy; hackers; terrorism; virus
Navigation: use the links below to view more comments.
first previous 1-20 ... 81-100101-120121-140141-149 next last
To: rdb3

121 posted on 09/17/2002 8:51:42 PM PDT by AdA$tra
[ Post Reply | Private Reply | To 94 | View Replies]

To: AdA$tra

122 posted on 09/17/2002 8:57:40 PM PDT by AdA$tra
[ Post Reply | Private Reply | To 118 | View Replies]

To: Scott McCollum
M$ set up the brass ring when they used illegal anti-competitive tactics to manipulate the market and create a monopoly. If they have the only OS on the market, then it damn sure better be beyond reproach and better than the competition they illegally hindered in all respects.

Red Hat may have donated code and money, but why should they be any more responsible than the person who runs openSSL who has free access to the code and can modify it themselves? At least one has a chance to fix perceived problems rather than reading their EULA that says if something goes wrong with OUR product, YOUR screwed.

You alluded to the windoze exploit where user error was to blame, yet you neglected to mention that all the distributions you enumerated have their firewalls configured to block the ssh and ssl ports and the user has to manually configure those services and open up the ports.

No one has argued that any program is guaranteed to be secured as that is an impossible claim to back up. Obviously when configuring internet services the utmost care and maintenance is necessary. I feel that the former is in a seperate category from casual web browsing and email interaction that seem to form the basis of most M$ exploits.

123 posted on 09/17/2002 9:01:41 PM PDT by AaronAnderson
[ Post Reply | Private Reply | To 113 | View Replies]

To: AdA$tra

124 posted on 09/17/2002 9:03:35 PM PDT by AdA$tra
[ Post Reply | Private Reply | To 122 | View Replies]

To: AdA$tra
If you put two targets up on a rifle range. Label one Linux and the other Microsoft. Then you point ALL the guns at the target labeled Microsoft. Then apply the logic that Microsoft makes the least secure OS because it has more holes in it.

This type of allegation has been debunked in other threads.

Microsoft has more serious flaws than other operating systems, even when taking into account the difference in the installed base.

Since Apache is more widely used than IIS, this particular worm should be a quick demonstration of this.

125 posted on 09/17/2002 9:06:20 PM PDT by Knitebane
[ Post Reply | Private Reply | To 36 | View Replies]

To: Knitebane

126 posted on 09/17/2002 9:10:52 PM PDT by AdA$tra
[ Post Reply | Private Reply | To 125 | View Replies]

To: Knitebane
This type of allegation has been debunked in other threads.

NOT!
127 posted on 09/17/2002 9:16:49 PM PDT by AdA$tra
[ Post Reply | Private Reply | To 125 | View Replies]

To: rdb3

128 posted on 09/17/2002 9:29:27 PM PDT by AdA$tra
[ Post Reply | Private Reply | To 9 | View Replies]

To: AdA$tra
You do graphic work?
129 posted on 09/17/2002 9:33:36 PM PDT by rdb3
[ Post Reply | Private Reply | To 128 | View Replies]

To: rdb3
Yeah, bur I am a bit rusty. Tonight I was trying to dust off a few basic skills. Lightwave 3D and making fast logos.
130 posted on 09/17/2002 9:37:49 PM PDT by AdA$tra
[ Post Reply | Private Reply | To 129 | View Replies]

To: rdb3
These all look poorly lit on my glass monitor. They looked much brighter on my laptop. Let me know if you ever want a quick and dirty graphic. I can (could at one time) make about any object.
131 posted on 09/17/2002 9:40:23 PM PDT by AdA$tra
[ Post Reply | Private Reply | To 129 | View Replies]

To: Scott McCollum
I have had a number of alerts recently on my firewall with the perp trying to use a unix login.
132 posted on 09/17/2002 9:40:50 PM PDT by John Lenin
[ Post Reply | Private Reply | To 1 | View Replies]

To: rdb3
some folks think open ssl IS linux... or perhaps they have something to gain by asserting this misconception.

Anybody who does not monitor exploitive access and use of their own system... is likely a person, used to another op system... who is unaware that they can program as much security into their system as they need. I imagine that some of them don't even know they have installed multiple servers on their machines... and must then configure them for security appropriate to their needs....

They often don't even read the manual that comes with the software.

For some folks the idea of having to actually think and then input code on their own, is a bit confusing... but to those who know how (not me of course) it is a real blessing...

the bad thing is folks have to assess and configure security needs periodically...

and the good thing is folks CAN reassess and configure security needs periodically. Oh well.
133 posted on 09/17/2002 9:41:34 PM PDT by Robert_Paulson2
[ Post Reply | Private Reply | To 18 | View Replies]

To: John Lenin
SU#

There....I am in
134 posted on 09/17/2002 9:42:40 PM PDT by AdA$tra
[ Post Reply | Private Reply | To 132 | View Replies]

To: taxcontrol
I don't know about you... but linux emails me every week with security advice, patches and exploitation information... along with any files I need to install.

Seems simple to me... look and see what is accessing me without permissions (some folks don't set permissions), install the patches... make the changes... and usually I don't even have to reboot.

It's pretty damned nice... no hassles, no surprises and no cost attached to buying a "new and improved" upgrade to fix the bugs...

I DO have to read the updates, understand the coding a little and actually adjust the settings myself... I guess that is considered a weakness to the "mouse only" sysop folks.
135 posted on 09/17/2002 9:46:16 PM PDT by Robert_Paulson2
[ Post Reply | Private Reply | To 20 | View Replies]

To: All
Now this looks like an interesting way to make everyone in the room hate me for wasting bandwidth:

from Security Focus Online


Number of OS Vulnerabilities by Year
OS 1997 1998 1999 2000 2001
AIX 21 38 10 15 6
BSD/OS 7 5 4 1 3
BeOS 0 0 0 5 1
Caldera 4 3 14 28 27
Connectiva 0 0 0 0 0
Debian 3 2 31 55 28
FreeBSD 5 2 17 36 17
HP-UX 9 5 11 26 16
IRIX 28 15 9 14 7
MacOS 0 1 5 1 4
MacOS X Server 0 0 1 0 0
Mandrake 0 0 2 46 36
NetBSD 2 4 10 20 9
Netware 1 0 4 3 1
OpenBSD 1 2 4 17 14
RedHat 6 10 47 95 54
SCO Unix 3 3 10 2 21
Slackware 4 8 11 11 10
Solaris 24 33 34 22 33
SuSE 0 1 23 31 21
TurboLinux 0 0 2 20 2
Unixware 2 3 14 4 9
Windows 3.1x/95/98 3 1 46 40 14
Windows NT/2000 10 8 78 97 42

Top Vulnerable Packages 2001
Packages # Vulns
MandrakeSoft Linux Mandrake 7.2 33
RedHat Linux 7.0 28
MandrakeSoft Linux Mandrake 7.1 27
Debian Linux 2.2 26
Sun Solaris 8.0 24
Sun Solaris 7.0 24
Microsoft Windows 2000 24
MandrakeSoft Linux Mandrake 7.0 22
SCO Open Server 5.0.6 21
RedHat Linux 6.2 i386 20
MandrakeSoft Linux Mandrake 6.1 20
MandrakeSoft Linux Mandrake 6.0 20
Wirex Immunix OS 7.0-Beta 19
Sun Solaris 2.6 19
RedHat Linux 6.2 sparc 18
RedHat Linux 6.2 alpha 18
Debian Linux 2.2 sparc 18
Debian Linux 2.2 arm 18
Debian Linux 2.2 alpha 18
Debian Linux 2.2 68k 18

Top Vulnerable Packages 2000
Packages # Vulns
Microsoft Windows NT 4.0 71
RedHat Linux 6.2 i386 65
RedHat Linux 6.2 sparc 53
RedHat Linux 6.2 alpha 53
Microsoft Windows 2000 52
Debian Linux 2.2 48
RedHat Linux 6.1 i386 47
Microsoft Windows 98 40
RedHat Linux 6.1 sparc 39
RedHat Linux 6.1 alpha 39
MandrakeSoft Linux Mandrake 7.0 37
Microsoft Windows 95 35
RedHat Linux 6.0 i386 33
Microsoft IIS 4.0 29
Microsoft BackOffice 4.5 29
Microsoft BackOffice 4.0 29
RedHat Linux 7.0 28
MandrakeSoft Linux Mandrake 7.1 26
RedHat Linux 6.0 alpha 25
Conectiva Linux 5.1 25

Top Vulnerable Packages 1999
Packages # Vulns
Microsoft Windows NT 4.0 75
Microsoft Windows 98 44
Microsoft Windows 95 40
Microsoft Windows NT 4.0SP3 33
Microsoft Windows NT 4.0SP1 32
Microsoft Windows NT 4.0SP2 31
Microsoft Windows NT 4.0SP4 30
Microsoft Internet Explorer 5.0 for Windows 98 29
Microsoft Internet Explorer 5.0 for Windows NT 4.0 28
Microsoft Internet Explorer 5.0 for Windows 95 28
Microsoft BackOffice 4.0 28
Microsoft BackOffice 4.5 27
Sun Solaris 7.0 26
Microsoft IIS 4.0 25
Microsoft Windows NT 4.0SP5 23
RedHat Linux 5.2 i386 22
Sun Solaris 7.0_x86 21
Sun Solaris 2.6_x86 21
Sun Solaris 2.6 21
RedHat Linux 6.0 i386 21

Top Vulnerable Packages 1998
Packages # Vulns
IBM AIX 4.3 36
IBM AIX 4.2.1 29
IBM AIX 4.2 29
Sun Solaris 2.6 28
Sun Solaris 2.6_x86 25
IBM AIX 4.1 25
IBM AIX 4.1.5 24
IBM AIX 4.1.4 24
IBM AIX 4.1.3 24
IBM AIX 4.1.2 24
IBM AIX 4.1.1 24
Sun Solaris 2.5.1_x86 23
Sun Solaris 2.5.1 23
Sun Solaris 2.5_x86 22
Sun Solaris 2.5 21
Sun Solaris 2.4 18
Sun Solaris 2.4_x86 17
Sun Solaris 2.3 13
Sun Solaris 2.5.1_ppc 10
SGI IRIX 6.4 10

Top Vulnerable Packages 1997
Packages # Vulns
SGI IRIX 6.2 25
Sun Solaris 2.5.1 23
Sun Solaris 2.5 23
SGI IRIX 5.3 23
Sun Solaris 2.5_x86 22
Sun Solaris 2.5.1_x86 22
Sun Solaris 2.4 22
Sun Solaris 2.4_x86 21
SGI IRIX 6.3 20
IBM AIX 4.1 19
Sun Solaris 2.3 18
SGI IRIX 6.1 18
IBM AIX 4.2 17
SGI IRIX 5.2 15
SGI IRIX 6.4 14
IBM AIX 4.1.5 14
IBM AIX 4.1.4 14
IBM AIX 4.1.3 14
IBM AIX 4.1.1 14
Sun Solaris 2.5.1_ppc 13




Several things should be taken into consideration when interpreting these numbers:

The numbers presented below should not be considered a metric by which an accurate comparison of the vulnerability of one operating system versus another can be made.



136 posted on 09/17/2002 10:31:42 PM PDT by Dominic Harr
[ Post Reply | Private Reply | To 125 | View Replies]

To: Dominic Harr
Now this looks like an interesting way to make everyone in the room hate me for wasting bandwidth:

Nah, that's boring. And it's highly compressible text, so it's not even wasting much bandwidth. Try again with some pictures of Anna Kournikova or something ;)

137 posted on 09/17/2002 10:37:25 PM PDT by general_re
[ Post Reply | Private Reply | To 136 | View Replies]

To: general_re
Try again with some pictures of Anna Kournikova or something ;)

:-D

I thought that post might be generate some entertaining responses for later reading . . . not as entertaining as Anna, of course.

Especially now that she's winning! Who knew she could actually play tennis?

138 posted on 09/17/2002 10:43:19 PM PDT by Dominic Harr
[ Post Reply | Private Reply | To 137 | View Replies]

To: Dominic Harr
She plays tennis?

:^)

139 posted on 09/17/2002 10:46:26 PM PDT by general_re
[ Post Reply | Private Reply | To 138 | View Replies]

To: general_re
She plays tennis?

In between photo shoots, actually she does!

Those numbers could start a pretty interesting holy war, eh? I know the numbers aren't the whole story, but they are interesting none the less.

I'm not much of a mac guy, haven't used one since my Apple IIe, but those mac numbers are pretty amazing.

140 posted on 09/17/2002 10:58:07 PM PDT by Dominic Harr
[ Post Reply | Private Reply | To 139 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 81-100101-120121-140141-149 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson