PureBytes Links
Trading Reference Links
|
<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
<HTML>
<HEAD>
<META content=text/html;charset=iso-8859-1 http-equiv=Content-Type>
<META content='"MSHTML 4.72.3110.7"' name=GENERATOR>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT color=#000000 size=2>Thanks George.</FONT></DIV>
<BLOCKQUOTE
style="BORDER-LEFT: #000000 solid 2px; MARGIN-LEFT: 5px; PADDING-LEFT: 5px">
<DIV><FONT face=Arial size=2><B>-----Original Message-----</B><BR><B>From:
</B>George Ashton <<A
href="mailto:golden1@xxxxxxxxxx">golden1@xxxxxxxxxx</A>><BR><B>To: </B><A
href="mailto:metastock@xxxxxxxxxxxxx">metastock@xxxxxxxxxxxxx</A> <<A
href="mailto:metastock@xxxxxxxxxxxxx">metastock@xxxxxxxxxxxxx</A>><BR><B>Date:
</B>Wednesday, July 28, 1999 6:43 AM<BR><B>Subject: </B>OFF TOPIC intruders
[Fw: Today's WinInfo: July 12]<BR><BR></DIV></FONT>At 23:21 27/07/99 -0600,
you wrote:<BR><FONT size=2>
<BLOCKQUOTE cite type = cite>Guy,</FONT><BR><BR><FONT size=2>How do I
password protect my hard drives ? Is it a Windows feature or is it
achieved via special software ?</FONT><BR><BR><FONT
size=2>Thanks.</FONT><BR><BR><FONT size=2>Augie</FONT><BR><FONT
face=arial size=2><B>
<BLOCKQUOTE cite type = cite>-----Original
Message-----</B><BR>From:</B> Guy Tann <<A
href="mailto:grt@xxxxxxxxxxxx">grt@xxxxxxxxxxxx</A>><BR><B>To:
</B><A
href="mailto:metastock@xxxxxxxxxxxxx">metastock@xxxxxxxxxxxxx</A>
<<A
href="mailto:metastock@xxxxxxxxxxxxx">metastock@xxxxxxxxxxxxx</A>><BR><B>Date:
</B>Tuesday, July 27, 1999 11:13 PM<BR><B>Subject: </B>RE: intruders
[Fw: Today's WinInfo: July 12]<BR><BR></FONT><FONT color=#0000ff
face=arial size=2>Ton</FONT><BR><BR><FONT color=#0000ff face=arial
size=2>I have password protected all of my drives with passwords for
read-only as well as read-write access. I'm still finding
'visitors' in my network neighborhood. I assume they can't get
at anything. When I installed the passwords, I disconnected my
PC from the network (and the Internet) and installed all of the
passwords, etc. Then hooked everything back
up.</FONT><BR><BR><FONT color=#0000ff face=arial size=2>I tried to
locate poledit.exe and that program isn't anywhere to be found in my
Win95 directory.</FONT><BR><BR><FONT color=#0000ff face=arial
size=2>Regards</FONT><BR><BR><FONT color=#0000ff face=arial
size=2>Guy</FONT><BR><BR><FONT face="Times New Roman, Times"
size=2>-----Original Message-----<BR><B>From:</B>
owner-metastock@xxxxxxxxxxxxx [<A
href="mailto:owner-metastock@xxxxxxxxxxxxx%5DOn" eudora =
autourl>mailto:owner-metastock@xxxxxxxxxxxxx]</A><A
href="mailto:owner-metastock@xxxxxxxxxxxxx%5DOn" eudora =
autourl><B>On</A> Behalf Of</B> A.J. Maas<BR><B>Sent:</B> Tuesday,
July 13, 1999 4:12 PM<BR><B>To:</B>
Metastock-List<BR><B>Subject:</B> Re: intruders [Fw: Today's
WinInfo: July 12]<BR><BR></FONT>To clear some
myths..........................<BR><BR><FONT size=2>For as long as
you do not "Share" any files, disks, printers, folders or
even Net-adapters, you are save from</FONT><BR>anyone entering your
PC.<BR>If you haven't done any of the file, folder, disk, printer
and netadapter sharing (also in the Control Panel's
Nethood/<BR>Networking and the Win95/98 Context Menu's options for
"Sharing", then no-one can intrude onto your PC<BR>with
you in command (and as otherwise is described in the article
below).<BR>This "Sharing", apart from the Control Panel's
Nethood and the Win95/98 Context Menu's options,<BR>are privaleges
you can also set for any of the "Users" of your PC's
Windows sessions. The program to do so<BR>is
"C:\Windows\Poledit.exe".<BR><BR><FONT size=2>The above is
for Win95/98 only, for as WIN-NT4/2000 requires a top secret
"NTconfig.pol" file stored on server for</FONT><BR>setting
the "Sharing of the Network's NetHood, Server and WKS's files,
folders, printers and disks".<BR><BR><FONT
size=2>Regards,<BR>Ton Maas<BR><A
href="mailto:ms-irb@xxxxxxxxxxxxx">ms-irb@xxxxxxxxxxxxx</A><BR>Dismiss
the ".nospam" bit (including the dot) when
replying.<BR><BR><BR></FONT>___________________________________________________________________________<BR><BR>WinInfo:
Windows news and information -- Copyright (c) 1995-9 Paul
Thurrott<BR>Visit WinInfo on the Web at WUGNET: <A
href="http://www.wugnet.com/wininfo">http://www.wugnet.com/wininfo</A><BR>___________________________________________________________________________<BR><BR>Today's
WinInfo:<BR> Microsoft challenges BackOrifice myths<BR>
Microsoft bringing USB hardware to the
Macintosh<BR><BR><BR>Microsoft challenges BackOrifice
myths<BR><BR>With the release this week of Windows NT hacking tool
"BackOrifice 2000,"<BR>Microsoft has launched an
informational campaign of its own, designed to<BR>derail myths about
the malicious program. According to a report on<BR>Microsoft's
Security Advisor Web site, BackOrifice 2000 is a remote
control<BR>application that must be stealthily installed so that
attackers can take<BR>over a Windows NT-based network. The program
enables remote hackers to do<BR>anything they could do were they to
be logged onto the machine locally: Run<BR>programs, delete files,
and the like.<BR><BR>"BackOrifice 2000 is a remote-access tool
that was developed with the intent<BR>of harming users," says
Jason Garms, the lead product manager for Windows NT<BR>security at
Microsoft. "It is a tool that has no legitimate purpose
other<BR>than exposing users' machines to people on the Internet.
Users who are<BR>tricked into getting this thing installed on their
system are vulnerable to<BR>the attacker, who can then do anything
that the victim can do--move the<BR>mouse, open files, run programs,
etc.--which is little different from what<BR>legitimate
remote-control software can do. Back Orifice, however,
is<BR>designed to be stealthy and evade detection by the
user."<BR><BR>For BackOrifice to find its way onto your system
the hacker must have<BR>physical access to the machine with a valid
login or you must be tricked<BR>into installing it; typically this
is accomplished by sending users the<BR>program as an email
attachment that must be executed. To prevent this<BR>program from
taking over your system, just use common sense: Always run
an<BR>anti-virus program with up-to-date virus definitions and don't
let anyone<BR>gain unauthorized physical access to your machine.
Perhaps most importantly,<BR>don't execute email attachments from
unknown people.<BR><BR>One of the biggest myths perpetrated by the
makers of BackOrifice is that<BR>program takes advantage of security
inadequacies that are inherent in<BR>Windows and Windows NT. This is
simply not true: BackOrifice could have been<BR>written to attack
*any* kind of computer system. The hackers that wrote it<BR>simply
decided to attack Windows, which is the most popular
computing<BR>platform by far. In fact, as Microsoft notes,
BackOrifice doesn't actually<BR>target Windows per se at all: It
targets users, who often don't understand<BR>security issues well
enough to not execute email attachments from
unknown<BR>sources.<BR><BR>Another common myth centers on the goal
for BackOrifice: In an attempt to<BR>protect themselves from legal
problems, the creators of BackOrifice are<BR>pretending that it is a
legitimate remote control application. However, this<BR>is not the
case: BackOrifice is designed to escape detection and exceeds
the<BR>needs of remote control software. And it doesn't prompt the
user when it<BR>installs on the system.<BR><BR>"The creators
[of BackOrifice] claim that this is a useful administration<BR>tool,
but it doesn't even prompt people when it installs itself on
the<BR>system. It doesn't warn them that it's getting installed.
And, once it's<BR>installed, it makes the system available to other
people on the Internet.<BR>That is a malicious act," says
Garms. "I am personally unaware of any major<BR>customers of
ours who consider this to be a remote administration tool as<BR>the
folks who created it claim. Quite the contrary, they consider it a
piece<BR>of malicious code. Unfortunately, there are some users who
were duped by the<BR>press releases from the organization that
released the software, and did<BR>install it on their
systems."<BR><BR>For more information about Microsoft's
response to BackOrifice 2000, please<BR>visit the Microsoft Security
Advisor Web site:<BR> <A
href="http://www.microsoft.com/security/bulletins/bo2k.asp">http://www.microsoft.com/security/bulletins/bo2k.asp</A><BR><BR><BR><BR><BR>Microsoft
bringing USB hardware to the Macintosh<BR><BR>Microsoft Corporation
will announce the availability of its first USB<BR>hardware for the
Macintosh, the IntelliMouse Explorer, a "no ball"
mouse<BR>that the company will release this fall for Windows as
well. According to<BR>rumors, Microsoft will also be porting other
USB hardware to the Macintosh,<BR>including possibly all of the
company's joystick/entertainment hardware,<BR>such as the FreeStyle
Pro GamePad and the Sidewinder Precision Pro joystick.<BR><BR>Expect
an official announcement from Microsoft at MacWorld New York
next<BR>week.<BR><BR>___________________________________________________________________________<BR><BR>Visit
WinInfo on the Web at WUGNET: <A
href="http://www.wugnet.com/wininfo">http://www.wugnet.com/wininfo</A><BR><BR>To
unsubscribe from the WinInfo list, simply send an E-mail message
to<BR><A
href="mailto:listserv@xxxxxxxxxxxxxxxxxxxx">listserv@xxxxxxxxxxxxxxxxxxxx</A>
with the phrase "unsubscribe wininfo" (no<BR>quotes) in
the body. If you are having problems unsubscribing or any
other<BR>problems with the list, please write Keith Furman at <A
href="mailto:listadmin@xxxxxxxxxx">listadmin@xxxxxxxxxx</A>.<BR>___________________________________________________________________________</BLOCKQUOTE></BLOCKQUOTE><BR></BLOCKQUOTE></BODY></HTML>
</x-html>From ???@??? Wed Jul 28 12:54:46 1999
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
by purebytes.com (8.8.7/8.8.7) with ESMTP id MAA27950
for <neal@xxxxxxxxxxxxx>; Wed, 28 Jul 1999 12:54:53 -0700
Received: (from majordom@xxxxxxxxx)
by listserv.equis.com (8.8.7/8.8.7) id DAA00719
for metastock-outgoing; Thu, 29 Jul 1999 03:45:06 -0600
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
by listserv.equis.com (8.8.7/8.8.7) with ESMTP id DAA00716
for <metastock@xxxxxxxxxxxxxxxxxx>; Thu, 29 Jul 1999 03:45:03 -0600
Received: from basecamp1.netquest.net (netquest.net [204.140.219.1])
by freeze.metastock.com (8.8.5/8.8.5) with ESMTP id NAA13504
for <metastock@xxxxxxxxxxxxx>; Wed, 28 Jul 1999 13:32:54 -0600 (MDT)
Received: from p400 (dsl0037.netquest.net [206.117.109.37]) by basecamp1.netquest.net (8.8.8/8.8.6) with SMTP id MAA01449 for <metastock@xxxxxxxxxxxxx>; Wed, 28 Jul 1999 12:19:56 -0700 (PDT)
From: "Guy Tann" <grt@xxxxxxxxxxxx>
To: <metastock@xxxxxxxxxxxxx>
Subject: RE: intruders
Date: Wed, 28 Jul 1999 12:19:55 -0700
Message-ID: <000401bed92e$2c86b020$256d75ce@xxxxxxxxxxxx>
MIME-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook 8.5, Build 4.71.2377.0
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
In-Reply-To: <002a01becbbf$55479820$f52367d1@xxxxxx>
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:
Walter
Just getting caught up here, but had a quick question for you.
The speeds you mention are K bits per second or K Bytes per second? I'm
currently able to get up to 60KBs (or approximately 480Kbs) on my 768Kbs
connection. I haven't seen much faster than that here. My ISP tells me the
'average' internet speed is around 350Kbs and that your speed is limited to
the speed of the various links, routers, etc.
Guy
-----Original Message-----
From: owner-metastock@xxxxxxxxxxxxx [mailto:owner-metastock@xxxxxxxxxxxxx]
On Behalf Of Walter Lake
Sent: Sunday, July 11, 1999 10:04 AM
To: Metastock bulletin board
Subject: intruders
Here is a copy of part of an email that I received:
"... Walter
Ping plotter traced through 15 hops but the next destination listed as
unreachable. I guess that once a certain amount of progress is made, the
tendency is to move forward at a squared function pace.
Before going on cable modem, my download speeds were between 1.8 and 2.4
Kbs. Then they jumped to 16 to 20 Kbs after installing the cable modem.
Lastly, when the modem repair guy came out and was fiddling with my
computer, he asked why my download speeds were so slow. Then he plugged in
his little laptop and showed me that 150-200 Kbs was easy if everything was
set up properly and to look on Tucows network for a web accelerator that
will automatically detect and optimize computer and web functions.
Loaded up Interquick program and speeds jumped to 150-250 Kbs. A hundred
fold increase in download speed was a very pleasant surprise.
One problem with the cable modem is that you are on line 24 hours a day (I
leave my computers on since they will last longer and I need to collect data
overnight anyway).
One of the hackers websites I watch (it is a site for satellite system
decryption) suggested that all members of the forum load up Intruder Alert
99 and Nuke Nabber to protect their machines.
The first detects an entry attempt, shuts it down, traces the source, and
sends an email to the ISP of that source. ..."
=====
Always more to learn!
Best regards
Walter
|