[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: OFF TOPIC intruders [Fw: Today's WinInfo: July 12]



PureBytes Links

Trading Reference Links

<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
<HTML>
<HEAD>

<META content=text/html;charset=iso-8859-1 http-equiv=Content-Type>
<META content='"MSHTML 4.72.3110.7"' name=GENERATOR>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT color=#000000 size=2>Thanks George.</FONT></DIV>
<BLOCKQUOTE 
style="BORDER-LEFT: #000000 solid 2px; MARGIN-LEFT: 5px; PADDING-LEFT: 5px">
    <DIV><FONT face=Arial size=2><B>-----Original Message-----</B><BR><B>From: 
    </B>George Ashton &lt;<A 
    href="mailto:golden1@xxxxxxxxxx";>golden1@xxxxxxxxxx</A>&gt;<BR><B>To: </B><A 
    href="mailto:metastock@xxxxxxxxxxxxx";>metastock@xxxxxxxxxxxxx</A> &lt;<A 
    href="mailto:metastock@xxxxxxxxxxxxx";>metastock@xxxxxxxxxxxxx</A>&gt;<BR><B>Date: 
    </B>Wednesday, July 28, 1999 6:43 AM<BR><B>Subject: </B>OFF TOPIC intruders 
    [Fw: Today's WinInfo: July 12]<BR><BR></DIV></FONT>At 23:21 27/07/99 -0600, 
    you wrote:<BR><FONT size=2>
    <BLOCKQUOTE cite type = cite>Guy,</FONT><BR><BR><FONT size=2>How do I 
        password protect my hard drives ?&nbsp; Is it a Windows feature or is it 
        achieved via special software ?</FONT><BR><BR><FONT 
        size=2>Thanks.</FONT><BR><BR><FONT size=2>Augie</FONT><BR><FONT 
        face=arial size=2><B>
        <BLOCKQUOTE cite type = cite>-----Original 
            Message-----</B><BR>From:</B> Guy Tann &lt;<A 
            href="mailto:grt@xxxxxxxxxxxx";>grt@xxxxxxxxxxxx</A>&gt;<BR><B>To: 
            </B><A 
            href="mailto:metastock@xxxxxxxxxxxxx";>metastock@xxxxxxxxxxxxx</A> 
            &lt;<A 
            href="mailto:metastock@xxxxxxxxxxxxx";>metastock@xxxxxxxxxxxxx</A>&gt;<BR><B>Date: 
            </B>Tuesday, July 27, 1999 11:13 PM<BR><B>Subject: </B>RE: intruders 
            [Fw: Today's WinInfo: July 12]<BR><BR></FONT><FONT color=#0000ff 
            face=arial size=2>Ton</FONT><BR><BR><FONT color=#0000ff face=arial 
            size=2>I have password protected all of my drives with passwords for 
            read-only as well as read-write access.&nbsp; I'm still finding 
            'visitors' in my network neighborhood.&nbsp; I assume they can't get 
            at anything.&nbsp; When I installed the passwords, I disconnected my 
            PC from the network (and the Internet) and installed all of the 
            passwords, etc.&nbsp; Then hooked everything back 
            up.</FONT><BR><BR><FONT color=#0000ff face=arial size=2>I tried to 
            locate poledit.exe and that program isn't anywhere to be found in my 
            Win95 directory.</FONT><BR><BR><FONT color=#0000ff face=arial 
            size=2>Regards</FONT><BR><BR><FONT color=#0000ff face=arial 
            size=2>Guy</FONT><BR><BR><FONT face="Times New Roman, Times" 
            size=2>-----Original Message-----<BR><B>From:</B> 
            owner-metastock@xxxxxxxxxxxxx [<A 
            href="mailto:owner-metastock@xxxxxxxxxxxxx%5DOn"; eudora = 
            autourl>mailto:owner-metastock@xxxxxxxxxxxxx]</A><A 
            href="mailto:owner-metastock@xxxxxxxxxxxxx%5DOn"; eudora = 
            autourl><B>On</A> Behalf Of</B> A.J. Maas<BR><B>Sent:</B> Tuesday, 
            July 13, 1999 4:12 PM<BR><B>To:</B> 
            Metastock-List<BR><B>Subject:</B> Re: intruders [Fw: Today's 
            WinInfo: July 12]<BR><BR></FONT>To clear some 
            myths..........................<BR><BR><FONT size=2>For as long as 
            you do not &quot;Share&quot; any files, disks, printers, folders or 
            even Net-adapters, you are save from</FONT><BR>anyone entering your 
            PC.<BR>If you haven't done any of the file, folder, disk, printer 
            and netadapter sharing (also in the Control Panel's 
            Nethood/<BR>Networking and the Win95/98 Context Menu's options for 
            &quot;Sharing&quot;, then no-one can intrude onto your PC<BR>with 
            you in command (and as otherwise is described in the article 
            below).<BR>This &quot;Sharing&quot;, apart from the Control Panel's 
            Nethood and the Win95/98 Context Menu's options,<BR>are privaleges 
            you can also set for any of the &quot;Users&quot; of your PC's 
            Windows sessions. The program to do so<BR>is 
            &quot;C:\Windows\Poledit.exe&quot;.<BR><BR><FONT size=2>The above is 
            for Win95/98 only, for as WIN-NT4/2000 requires a top secret 
            &quot;NTconfig.pol&quot; file stored on server for</FONT><BR>setting 
            the &quot;Sharing of the Network's NetHood, Server and WKS's files, 
            folders, printers and disks&quot;.<BR><BR><FONT 
            size=2>Regards,<BR>Ton Maas<BR><A 
            href="mailto:ms-irb@xxxxxxxxxxxxx";>ms-irb@xxxxxxxxxxxxx</A><BR>Dismiss 
            the &quot;.nospam&quot; bit (including the dot) when 
            replying.<BR><BR><BR></FONT>___________________________________________________________________________<BR><BR>WinInfo: 
            Windows news and information -- Copyright (c) 1995-9 Paul 
            Thurrott<BR>Visit WinInfo on the Web at WUGNET: <A 
            href="http://www.wugnet.com/wininfo";>http://www.wugnet.com/wininfo</A><BR>___________________________________________________________________________<BR><BR>Today's 
            WinInfo:<BR>&nbsp; Microsoft challenges BackOrifice myths<BR>&nbsp; 
            Microsoft bringing USB hardware to the 
            Macintosh<BR><BR><BR>Microsoft challenges BackOrifice 
            myths<BR><BR>With the release this week of Windows NT hacking tool 
            &quot;BackOrifice 2000,&quot;<BR>Microsoft has launched an 
            informational campaign of its own, designed to<BR>derail myths about 
            the malicious program. According to a report on<BR>Microsoft's 
            Security Advisor Web site, BackOrifice 2000 is a remote 
            control<BR>application that must be stealthily installed so that 
            attackers can take<BR>over a Windows NT-based network. The program 
            enables remote hackers to do<BR>anything they could do were they to 
            be logged onto the machine locally: Run<BR>programs, delete files, 
            and the like.<BR><BR>&quot;BackOrifice 2000 is a remote-access tool 
            that was developed with the intent<BR>of harming users,&quot; says 
            Jason Garms, the lead product manager for Windows NT<BR>security at 
            Microsoft. &quot;It is a tool that has no legitimate purpose 
            other<BR>than exposing users' machines to people on the Internet. 
            Users who are<BR>tricked into getting this thing installed on their 
            system are vulnerable to<BR>the attacker, who can then do anything 
            that the victim can do--move the<BR>mouse, open files, run programs, 
            etc.--which is little different from what<BR>legitimate 
            remote-control software can do. Back Orifice, however, 
            is<BR>designed to be stealthy and evade detection by the 
            user.&quot;<BR><BR>For BackOrifice to find its way onto your system 
            the hacker must have<BR>physical access to the machine with a valid 
            login or you must be tricked<BR>into installing it; typically this 
            is accomplished by sending users the<BR>program as an email 
            attachment that must be executed. To prevent this<BR>program from 
            taking over your system, just use common sense: Always run 
            an<BR>anti-virus program with up-to-date virus definitions and don't 
            let anyone<BR>gain unauthorized physical access to your machine. 
            Perhaps most importantly,<BR>don't execute email attachments from 
            unknown people.<BR><BR>One of the biggest myths perpetrated by the 
            makers of BackOrifice is that<BR>program takes advantage of security 
            inadequacies that are inherent in<BR>Windows and Windows NT. This is 
            simply not true: BackOrifice could have been<BR>written to attack 
            *any* kind of computer system. The hackers that wrote it<BR>simply 
            decided to attack Windows, which is the most popular 
            computing<BR>platform by far. In fact, as Microsoft notes, 
            BackOrifice doesn't actually<BR>target Windows per se at all: It 
            targets users, who often don't understand<BR>security issues well 
            enough to not execute email attachments from 
            unknown<BR>sources.<BR><BR>Another common myth centers on the goal 
            for BackOrifice: In an attempt to<BR>protect themselves from legal 
            problems, the creators of BackOrifice are<BR>pretending that it is a 
            legitimate remote control application. However, this<BR>is not the 
            case: BackOrifice is designed to escape detection and exceeds 
            the<BR>needs of remote control software. And it doesn't prompt the 
            user when it<BR>installs on the system.<BR><BR>&quot;The creators 
            [of BackOrifice] claim that this is a useful administration<BR>tool, 
            but it doesn't even prompt people when it installs itself on 
            the<BR>system. It doesn't warn them that it's getting installed. 
            And, once it's<BR>installed, it makes the system available to other 
            people on the Internet.<BR>That is a malicious act,&quot; says 
            Garms. &quot;I am personally unaware of any major<BR>customers of 
            ours who consider this to be a remote administration tool as<BR>the 
            folks who created it claim. Quite the contrary, they consider it a 
            piece<BR>of malicious code. Unfortunately, there are some users who 
            were duped by the<BR>press releases from the organization that 
            released the software, and did<BR>install it on their 
            systems.&quot;<BR><BR>For more information about Microsoft's 
            response to BackOrifice 2000, please<BR>visit the Microsoft Security 
            Advisor Web site:<BR>&nbsp; <A 
            href="http://www.microsoft.com/security/bulletins/bo2k.asp";>http://www.microsoft.com/security/bulletins/bo2k.asp</A><BR><BR><BR><BR><BR>Microsoft 
            bringing USB hardware to the Macintosh<BR><BR>Microsoft Corporation 
            will announce the availability of its first USB<BR>hardware for the 
            Macintosh, the IntelliMouse Explorer, a &quot;no ball&quot; 
            mouse<BR>that the company will release this fall for Windows as 
            well. According to<BR>rumors, Microsoft will also be porting other 
            USB hardware to the Macintosh,<BR>including possibly all of the 
            company's joystick/entertainment hardware,<BR>such as the FreeStyle 
            Pro GamePad and the Sidewinder Precision Pro joystick.<BR><BR>Expect 
            an official announcement from Microsoft at MacWorld New York 
            next<BR>week.<BR><BR>___________________________________________________________________________<BR><BR>Visit 
            WinInfo on the Web at WUGNET: <A 
            href="http://www.wugnet.com/wininfo";>http://www.wugnet.com/wininfo</A><BR><BR>To 
            unsubscribe from the WinInfo list, simply send an E-mail message 
            to<BR><A 
            href="mailto:listserv@xxxxxxxxxxxxxxxxxxxx";>listserv@xxxxxxxxxxxxxxxxxxxx</A> 
            with the phrase &quot;unsubscribe wininfo&quot; (no<BR>quotes) in 
            the body. If you are having problems unsubscribing or any 
            other<BR>problems with the list, please write Keith Furman at <A 
            href="mailto:listadmin@xxxxxxxxxx";>listadmin@xxxxxxxxxx</A>.<BR>___________________________________________________________________________</BLOCKQUOTE></BLOCKQUOTE><BR></BLOCKQUOTE></BODY></HTML>
</x-html>From ???@??? Wed Jul 28 12:54:46 1999
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
	by purebytes.com (8.8.7/8.8.7) with ESMTP id MAA27950
	for <neal@xxxxxxxxxxxxx>; Wed, 28 Jul 1999 12:54:53 -0700
Received: (from majordom@xxxxxxxxx)
	by listserv.equis.com (8.8.7/8.8.7) id DAA00719
	for metastock-outgoing; Thu, 29 Jul 1999 03:45:06 -0600
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
	by listserv.equis.com (8.8.7/8.8.7) with ESMTP id DAA00716
	for <metastock@xxxxxxxxxxxxxxxxxx>; Thu, 29 Jul 1999 03:45:03 -0600
Received: from basecamp1.netquest.net (netquest.net [204.140.219.1])
	by freeze.metastock.com (8.8.5/8.8.5) with ESMTP id NAA13504
	for <metastock@xxxxxxxxxxxxx>; Wed, 28 Jul 1999 13:32:54 -0600 (MDT)
Received: from p400 (dsl0037.netquest.net [206.117.109.37]) by basecamp1.netquest.net (8.8.8/8.8.6) with SMTP id MAA01449 for <metastock@xxxxxxxxxxxxx>; Wed, 28 Jul 1999 12:19:56 -0700 (PDT)
From: "Guy Tann" <grt@xxxxxxxxxxxx>
To: <metastock@xxxxxxxxxxxxx>
Subject: RE: intruders
Date: Wed, 28 Jul 1999 12:19:55 -0700
Message-ID: <000401bed92e$2c86b020$256d75ce@xxxxxxxxxxxx>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook 8.5, Build 4.71.2377.0
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
In-Reply-To: <002a01becbbf$55479820$f52367d1@xxxxxx>
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:   

Walter

Just getting caught up here, but had a quick question for you.

The speeds you mention are K bits per second or K Bytes per second?  I'm
currently able to get up to 60KBs (or approximately 480Kbs) on my 768Kbs
connection.  I haven't seen much faster than that here.  My ISP tells me the
'average' internet speed is around 350Kbs and that your speed is limited to
the speed of the various links, routers, etc.

Guy


-----Original Message-----
From:	owner-metastock@xxxxxxxxxxxxx [mailto:owner-metastock@xxxxxxxxxxxxx]
On Behalf Of Walter Lake
Sent:	Sunday, July 11, 1999 10:04 AM
To:	Metastock bulletin board
Subject:	intruders

Here is a copy of part of an email that I received:

"... Walter

Ping plotter traced through 15 hops but the next destination listed as
unreachable.  I guess that once a certain amount of progress is made, the
tendency is to move forward at a squared function pace.

Before going on cable modem, my download speeds were between 1.8 and 2.4
Kbs.  Then they jumped to 16 to 20 Kbs after installing the cable modem.
Lastly, when the modem repair guy came out and was fiddling with my
computer, he asked why my download speeds were so slow.  Then he plugged in
his little laptop and showed me that 150-200 Kbs was easy if everything was
set up properly and to look on Tucows network for a web accelerator that
will automatically detect and optimize computer and web functions.

Loaded up Interquick program and speeds jumped to 150-250 Kbs.  A hundred
fold increase in download speed was a very pleasant surprise.

One problem with the cable modem is that you are on line 24 hours a day (I
leave my computers on since they will last longer and I need to collect data
overnight anyway).

One of the hackers websites I watch (it is a site for satellite system
decryption) suggested that all members of the forum load up Intruder Alert
99 and Nuke Nabber to protect their machines.

 The first detects an entry attempt, shuts it down, traces the source, and
sends an email to the ISP of that source.  ..."

=====

Always more to learn!

Best regards

Walter