[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Avoid problem new PC



PureBytes Links

Trading Reference Links

<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
<HTML>
<HEAD>

<META content=text/html;charset=iso-8859-1 http-equiv=Content-Type><!doctype html public "-//w3c//dtd html 4.0 transitional//en">
<META content='"MSHTML 4.72.3110.7"' name=GENERATOR>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT color=#000000 size=2>Daniel,</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT size=2>Thanks for the advice.&nbsp; With your cooling solution, is 
noise a problem ?&nbsp; If so, how did you deal with it ?</FONT></DIV>
<DIV><FONT size=2></FONT>&nbsp;</DIV>
<DIV><FONT size=2>Augie</FONT></DIV></BODY></HTML>
</x-html>From ???@??? Tue Jul 27 15:52:04 1999
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
	by purebytes.com (8.8.7/8.8.7) with ESMTP id PAA07923
	for <neal@xxxxxxxxxxxxx>; Tue, 27 Jul 1999 15:51:55 -0700
Received: (from majordom@xxxxxxxxx)
	by listserv.equis.com (8.8.7/8.8.7) id GAA25356
	for metastock-outgoing; Wed, 28 Jul 1999 06:47:18 -0600
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
	by listserv.equis.com (8.8.7/8.8.7) with ESMTP id GAA25352
	for <metastock@xxxxxxxxxxxxxxxxxx>; Wed, 28 Jul 1999 06:47:15 -0600
Received: from mars.superlink.net (root@xxxxxxxxxxxxxxxxxx [209.236.128.133])
	by freeze.metastock.com (8.8.5/8.8.5) with ESMTP id QAA12795
	for <metastock@xxxxxxxxxxxxx>; Tue, 27 Jul 1999 16:35:04 -0600 (MDT)
Received: from superlink.com (209.236.140.102.dialup.superlink.net [209.236.140.102])
	by mars.superlink.net (8.9.3/8.9.3) with ESMTP id SAA09426
	for <metastock@xxxxxxxxxxxxx>; Tue, 27 Jul 1999 18:22:04 -0400 (EDT)
Message-ID: <379E3071.EA0EF9F8@xxxxxxxxxxxxx>
Date: Tue, 27 Jul 1999 18:19:29 -0400
From: Vitaly Larichev <vitaly@xxxxxxxxxxxxx>
X-Mailer: Mozilla 4.61 [en] (Win98; U)
X-Accept-Language: en
MIME-Version: 1.0
To: metastock@xxxxxxxxxxxxx
Subject: Re: Intruders
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:   

Hi,

Yesterday at Borders bookstore I came across a book "Information Warfare and Security" by Dorothy E.
Denning, 1999. Surprisingly, in spite of a scary for non-expert title reading was very much
entertaining with a lot of anecdotal evidence on computer security issues, hacking, etc. For half
hour at a bookshelf, what I was able to infer from the book is this. A very determined hacker (no
need to be a top rate professional!) may hack whatever he/she wants. Fortunately, he/she often
targets something prizeworthy (certainly not people like myself, though go figure whether it's all
good or also bad news if to consider my ego too :-)  ). It's banks or other high security
installations to hack with criminal intentions or just to brag  "trophy" - a cracked security
system. In another approach, a hacker may cast a wide net to get on as many unsecured computers as
possible, and then sift through findings for whatever use later (the author says it's amazing
how many users and network administrators are reckless regarding security). In this case a simple
protection like firewall may be enough to escape the net (that net!).

Though, I am not an expert in this field, and there might be misunderstandings on my part.

Cheers, Vitaly