[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: OFF TOPIC intruders [Fw: Today's WinInfo: July 12]



PureBytes Links

Trading Reference Links

<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content="text/html; charset=windows-1252" http-equiv=Content-Type>
<META content="MSHTML 5.00.2314.1000" name=GENERATOR></HEAD>
<BODY>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=10154019-28071999>Augie</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=10154019-28071999></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=10154019-28071999>I have 
Sharing allowed through my Network setup.&nbsp; Then g</SPAN></FONT><FONT 
color=#0000ff face=Arial size=2><SPAN class=10154019-28071999>o to Control 
Panel.&nbsp; Double click on each drive, click on sharing and set up your 
passwords.&nbsp; I set up 2 different ones.&nbsp; One for read only and one for 
read/write.&nbsp; I also password protected my CD-ROM (read only) and set my 
floppy up as not being shared.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=10154019-28071999></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=10154019-28071999>My 
printers are on my network, so I'm not sure how you would protect these if 
they're on your system.&nbsp; I did this for all 3 of our 
computers.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=10154019-28071999></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=10154019-28071999>It's 
all Windows stuff.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=10154019-28071999></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=10154019-28071999>Guy</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=10154019-28071999></SPAN></FONT>&nbsp;</DIV>
<DIV class=OutlookMessageHeader><FONT face="Times New Roman" 
size=2>-----Original Message-----<BR><B>From:</B> owner-metastock@xxxxxxxxxxxxx 
[mailto:owner-metastock@xxxxxxxxxxxxx]<B>On Behalf Of</B> George 
Ashton<BR><B>Sent:</B> Wednesday, July 28, 1999 3:58 AM<BR><B>To:</B> 
metastock@xxxxxxxxxxxxx<BR><B>Subject:</B> OFF TOPIC intruders [Fw: Today's 
WinInfo: July 12]<BR><BR></FONT></DIV>At 23:21 27/07/99 -0600, you 
wrote:<BR><FONT size=2>
<BLOCKQUOTE cite type="cite">Guy,</FONT><BR>&nbsp;<BR><FONT size=2>How do I 
  password protect my hard drives ?&nbsp; Is it a Windows feature or is it 
  achieved via special software ?</FONT><BR>&nbsp;<BR><FONT 
  size=2>Thanks.</FONT><BR>&nbsp;<BR><FONT size=2>Augie</FONT><BR><FONT 
  face=arial size=2><B>
  <BLOCKQUOTE cite type="cite">-----Original Message-----</B><BR>From: </B>Guy 
    Tann &lt;<A 
    href="mailto:grt@xxxxxxxxxxxx";>grt@xxxxxxxxxxxx</A>&gt;<BR><B>To: </B><A 
    href="mailto:metastock@xxxxxxxxxxxxx";>metastock@xxxxxxxxxxxxx</A> &lt;<A 
    href="mailto:metastock@xxxxxxxxxxxxx";>metastock@xxxxxxxxxxxxx</A>&gt;<BR><B>Date: 
    </B>Tuesday, July 27, 1999 11:13 PM<BR><B>Subject: </B>RE: intruders [Fw: 
    Today's WinInfo: July 12]<BR><BR></FONT><FONT color=#0000ff face=arial 
    size=2>Ton</FONT><BR>&nbsp;<BR><FONT color=#0000ff face=arial size=2>I have 
    password protected all of my drives with passwords for read-only as well as 
    read-write access.&nbsp; I'm still finding 'visitors' in my network 
    neighborhood.&nbsp; I assume they can't get at anything.&nbsp; When I 
    installed the passwords, I disconnected my PC from the network (and the 
    Internet) and installed all of the passwords, etc.&nbsp; Then hooked 
    everything back up.</FONT><BR>&nbsp;<BR><FONT color=#0000ff face=arial 
    size=2>I tried to locate poledit.exe and that program isn't anywhere to be 
    found in my Win95 directory.</FONT><BR>&nbsp;<BR><FONT color=#0000ff 
    face=arial size=2>Regards</FONT><BR>&nbsp;<BR><FONT color=#0000ff face=arial 
    size=2>Guy</FONT><BR>&nbsp;<BR><FONT face="Times New Roman, Times" 
    size=2>-----Original Message-----<BR><B>From:</B> 
    owner-metastock@xxxxxxxxxxxxx [<A 
    href="mailto:owner-metastock@xxxxxxxxxxxxx%5DOn"; 
    eudora="autourl">mailto:owner-metastock@xxxxxxxxxxxxx]</A><A 
    href="mailto:owner-metastock@xxxxxxxxxxxxx%5DOn"; eudora="autourl"><B>On</A> 
    Behalf Of</B> A.J. Maas<BR><B>Sent:</B> Tuesday, July 13, 1999 4:12 
    PM<BR><B>To:</B> Metastock-List<BR><B>Subject:</B> Re: intruders [Fw: 
    Today's WinInfo: July 12]<BR><BR></FONT>To clear some 
    myths..........................<BR>&nbsp;<BR><FONT size=2>For as long as you 
    do not "Share" any files, disks, printers, folders or even Net-adapters, you 
    are save from</FONT><BR>anyone entering your PC.<BR>If you haven't done any 
    of the file, folder, disk, printer and netadapter sharing (also in the 
    Control Panel's Nethood/<BR>Networking and the Win95/98 Context Menu's 
    options for "Sharing", then no-one can intrude onto your PC<BR>with you in 
    command (and as otherwise is described in the article below).<BR>This 
    "Sharing", apart from the Control Panel's Nethood and the Win95/98 Context 
    Menu's options,<BR>are privaleges you can also set for any of the "Users" of 
    your PC's Windows sessions. The program to do so<BR>is 
    "C:\Windows\Poledit.exe".<BR>&nbsp;<BR><FONT size=2>The above is for 
    Win95/98 only, for as WIN-NT4/2000 requires a top secret "NTconfig.pol" file 
    stored on server for</FONT><BR>setting the "Sharing of the Network's 
    NetHood, Server and WKS's files, folders, printers and 
    disks".<BR>&nbsp;<BR><FONT size=2>Regards,<BR>Ton Maas<BR><A 
    href="mailto:ms-irb@xxxxxxxxxxxxx";>ms-irb@xxxxxxxxxxxxx</A><BR>Dismiss the 
    ".nospam" bit (including the dot) when 
    replying.<BR><BR><BR></FONT>___________________________________________________________________________<BR><BR>WinInfo: 
    Windows news and information -- Copyright (c) 1995-9 Paul Thurrott<BR>Visit 
    WinInfo on the Web at WUGNET: <A 
    href="http://www.wugnet.com/wininfo";>http://www.wugnet.com/wininfo</A><BR>___________________________________________________________________________<BR><BR>Today's 
    WinInfo:<BR>&nbsp; Microsoft challenges BackOrifice myths<BR>&nbsp; 
    Microsoft bringing USB hardware to the Macintosh<BR><BR><BR>Microsoft 
    challenges BackOrifice myths<BR><BR>With the release this week of Windows NT 
    hacking tool "BackOrifice 2000,"<BR>Microsoft has launched an informational 
    campaign of its own, designed to<BR>derail myths about the malicious 
    program. According to a report on<BR>Microsoft's Security Advisor Web site, 
    BackOrifice 2000 is a remote control<BR>application that must be stealthily 
    installed so that attackers can take<BR>over a Windows NT-based network. The 
    program enables remote hackers to do<BR>anything they could do were they to 
    be logged onto the machine locally: Run<BR>programs, delete files, and the 
    like.<BR><BR>"BackOrifice 2000 is a remote-access tool that was developed 
    with the intent<BR>of harming users," says Jason Garms, the lead product 
    manager for Windows NT<BR>security at Microsoft. "It is a tool that has no 
    legitimate purpose other<BR>than exposing users' machines to people on the 
    Internet. Users who are<BR>tricked into getting this thing installed on 
    their system are vulnerable to<BR>the attacker, who can then do anything 
    that the victim can do--move the<BR>mouse, open files, run programs, 
    etc.--which is little different from what<BR>legitimate remote-control 
    software can do. Back Orifice, however, is<BR>designed to be stealthy and 
    evade detection by the user."<BR><BR>For BackOrifice to find its way onto 
    your system the hacker must have<BR>physical access to the machine with a 
    valid login or you must be tricked<BR>into installing it; typically this is 
    accomplished by sending users the<BR>program as an email attachment that 
    must be executed. To prevent this<BR>program from taking over your system, 
    just use common sense: Always run an<BR>anti-virus program with up-to-date 
    virus definitions and don't let anyone<BR>gain unauthorized physical access 
    to your machine. Perhaps most importantly,<BR>don't execute email 
    attachments from unknown people.<BR><BR>One of the biggest myths perpetrated 
    by the makers of BackOrifice is that<BR>program takes advantage of security 
    inadequacies that are inherent in<BR>Windows and Windows NT. This is simply 
    not true: BackOrifice could have been<BR>written to attack *any* kind of 
    computer system. The hackers that wrote it<BR>simply decided to attack 
    Windows, which is the most popular computing<BR>platform by far. In fact, as 
    Microsoft notes, BackOrifice doesn't actually<BR>target Windows per se at 
    all: It targets users, who often don't understand<BR>security issues well 
    enough to not execute email attachments from 
    unknown<BR>sources.<BR><BR>Another common myth centers on the goal for 
    BackOrifice: In an attempt to<BR>protect themselves from legal problems, the 
    creators of BackOrifice are<BR>pretending that it is a legitimate remote 
    control application. However, this<BR>is not the case: BackOrifice is 
    designed to escape detection and exceeds the<BR>needs of remote control 
    software. And it doesn't prompt the user when it<BR>installs on the 
    system.<BR><BR>"The creators [of BackOrifice] claim that this is a useful 
    administration<BR>tool, but it doesn't even prompt people when it installs 
    itself on the<BR>system. It doesn't warn them that it's getting installed. 
    And, once it's<BR>installed, it makes the system available to other people 
    on the Internet.<BR>That is a malicious act," says Garms. "I am personally 
    unaware of any major<BR>customers of ours who consider this to be a remote 
    administration tool as<BR>the folks who created it claim. Quite the 
    contrary, they consider it a piece<BR>of malicious code. Unfortunately, 
    there are some users who were duped by the<BR>press releases from the 
    organization that released the software, and did<BR>install it on their 
    systems."<BR><BR>For more information about Microsoft's response to 
    BackOrifice 2000, please<BR>visit the Microsoft Security Advisor Web 
    site:<BR>&nbsp; <A 
    href="http://www.microsoft.com/security/bulletins/bo2k.asp";>http://www.microsoft.com/security/bulletins/bo2k.asp</A><BR><BR><BR><BR><BR>Microsoft 
    bringing USB hardware to the Macintosh<BR><BR>Microsoft Corporation will 
    announce the availability of its first USB<BR>hardware for the Macintosh, 
    the IntelliMouse Explorer, a "no ball" mouse<BR>that the company will 
    release this fall for Windows as well. According to<BR>rumors, Microsoft 
    will also be porting other USB hardware to the Macintosh,<BR>including 
    possibly all of the company's joystick/entertainment hardware,<BR>such as 
    the FreeStyle Pro GamePad and the Sidewinder Precision Pro 
    joystick.<BR><BR>Expect an official announcement from Microsoft at MacWorld 
    New York 
    next<BR>week.<BR><BR>___________________________________________________________________________<BR><BR>Visit 
    WinInfo on the Web at WUGNET: <A 
    href="http://www.wugnet.com/wininfo";>http://www.wugnet.com/wininfo</A><BR><BR>To 
    unsubscribe from the WinInfo list, simply send an E-mail message to<BR><A 
    href="mailto:listserv@xxxxxxxxxxxxxxxxxxxx";>listserv@xxxxxxxxxxxxxxxxxxxx</A> 
    with the phrase "unsubscribe wininfo" (no<BR>quotes) in the body. If you are 
    having problems unsubscribing or any other<BR>problems with the list, please 
    write Keith Furman at <A 
    href="mailto:listadmin@xxxxxxxxxx";>listadmin@xxxxxxxxxx</A>.<BR>___________________________________________________________________________</BLOCKQUOTE></BLOCKQUOTE><BR></BODY></HTML>
</x-html>From ???@??? Wed Jul 28 13:31:22 1999
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
	by purebytes.com (8.8.7/8.8.7) with ESMTP id NAA28825
	for <neal@xxxxxxxxxxxxx>; Wed, 28 Jul 1999 13:31:03 -0700
Received: (from majordom@xxxxxxxxx)
	by listserv.equis.com (8.8.7/8.8.7) id EAA01125
	for metastock-outgoing; Thu, 29 Jul 1999 04:15:15 -0600
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
	by listserv.equis.com (8.8.7/8.8.7) with ESMTP id EAA01121
	for <metastock@xxxxxxxxxxxxxxxxxx>; Thu, 29 Jul 1999 04:15:11 -0600
Received: from basecamp1.netquest.net (netquest.net [204.140.219.1])
	by freeze.metastock.com (8.8.5/8.8.5) with ESMTP id OAA13539
	for <metastock@xxxxxxxxxxxxx>; Wed, 28 Jul 1999 14:03:04 -0600 (MDT)
Received: from p400 (dsl0037.netquest.net [206.117.109.37]) by basecamp1.netquest.net (8.8.8/8.8.6) with SMTP id MAA03798 for <metastock@xxxxxxxxxxxxx>; Wed, 28 Jul 1999 12:49:53 -0700 (PDT)
From: "Guy Tann" <grt@xxxxxxxxxxxx>
To: <metastock@xxxxxxxxxxxxx>
Subject: RE: intruders [Fw: Today's WinInfo: July 12]
Date: Wed, 28 Jul 1999 12:49:51 -0700
Message-ID: <000901bed932$5b006fa0$256d75ce@xxxxxxxxxxxx>
MIME-Version: 1.0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_000A_01BED8F7.AEA197A0"
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook 8.5, Build 4.71.2377.0
In-Reply-To: <002501bed8ba$177060b0$020101c0@xxxx>
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Importance: Normal
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:   

<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content=text/html;charset=iso-8859-1 http-equiv=Content-Type><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<META content="MSHTML 5.00.2314.1000" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=630324619-28071999>Kent</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=630324619-28071999></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=630324619-28071999>Thanks, but I'm strictly running Win95 sharing between 
my wife's IBM 560 laptop, my 9 year old's HP Pentium system and mine.&nbsp; 
Actually, my wife just backs up her diary onto my hard drive which I back up 
nightly via the Internet.&nbsp; The little guy's computer is strictly used for 
educational and game software.&nbsp; I was primarily interested in protecting my 
data and preventing any access through the other computers on my LAN.&nbsp; I 
have a print server and the DSL modem plugged into the hub as 
well.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=630324619-28071999></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=630324619-28071999>Guy</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=630324619-28071999></SPAN></FONT>&nbsp;</DIV>
<DIV class=OutlookMessageHeader><FONT face="Times New Roman" 
size=2>-----Original Message-----<BR><B>From:</B> owner-metastock@xxxxxxxxxxxxx 
[mailto:owner-metastock@xxxxxxxxxxxxx]<B>On Behalf Of</B> Kent 
Rollins<BR><B>Sent:</B> Tuesday, July 27, 1999 10:29 PM<BR><B>To:</B> 
metastock@xxxxxxxxxxxxx<BR><B>Subject:</B> Re: intruders [Fw: Today's WinInfo: 
July 12]<BR><BR></FONT></DIV>
<DIV><FONT color=#000000 size=2>Guy</FONT></DIV>
<DIV><FONT color=#000000 size=2></FONT>&nbsp;</DIV>
<DIV><FONT size=2>You should also make sure you have changed the password for 
your Adminstrator and Guest accounts on any NT systems you have.&nbsp; This is 
one thing that many people forget to do.&nbsp; This can be done from the User 
Manager.</FONT></DIV>
<DIV><FONT size=2></FONT>&nbsp;</DIV>
<DIV><FONT size=2>Kent</FONT></DIV>
<BLOCKQUOTE 
style="BORDER-LEFT: #000000 2px solid; MARGIN-LEFT: 5px; PADDING-LEFT: 5px">
  <DIV><FONT face=Arial size=2><B>-----Original Message-----</B><BR><B>From: 
  </B>Guy Tann &lt;<A 
  href="mailto:grt@xxxxxxxxxxxx";>grt@xxxxxxxxxxxx</A>&gt;<BR><B>To: </B><A 
  href="mailto:metastock@xxxxxxxxxxxxx";>metastock@xxxxxxxxxxxxx</A> &lt;<A 
  href="mailto:metastock@xxxxxxxxxxxxx";>metastock@xxxxxxxxxxxxx</A>&gt;<BR><B>Date: 
  </B>Wednesday, July 28, 1999 2:41 PM<BR><B>Subject: </B>RE: intruders [Fw: 
  Today's WinInfo: July 12]<BR><BR></DIV></FONT>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999>Ton</SPAN></FONT></DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN class=780561304-28071999>I 
  have password protected all of my drives with passwords for read-only as well 
  as read-write access.&nbsp; I'm still finding 'visitors' in my network 
  neighborhood.&nbsp; I assume they can't get at anything.&nbsp; When I 
  installed the passwords, I disconnected my PC from the network (and the 
  Internet) and installed all of the passwords, etc.&nbsp; Then hooked 
  everything back up.</SPAN></FONT></DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN class=780561304-28071999>I 
  tried to locate poledit.exe and that program isn't anywhere to be found in my 
  Win95 directory.</SPAN></FONT></DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999>Regards</SPAN></FONT></DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999>Guy</SPAN></FONT></DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
  <DIV class=OutlookMessageHeader><FONT face="Times New Roman" 
  size=2>-----Original Message-----<BR><B>From:</B> 
  owner-metastock@xxxxxxxxxxxxx [mailto:owner-metastock@xxxxxxxxxxxxx]<B>On 
  Behalf Of</B> A.J. Maas<BR><B>Sent:</B> Tuesday, July 13, 1999 4:12 
  PM<BR><B>To:</B> Metastock-List<BR><B>Subject:</B> Re: intruders [Fw: Today's 
  WinInfo: July 12]<BR><BR></FONT></DIV>
  <DIV><FONT size=2>To clear some myths..........................</FONT></DIV>
  <DIV><FONT size=2></FONT>&nbsp;</DIV>
  <DIV><FONT size=2>For as long as you do not "Share" any files, disks, 
  printers,&nbsp;folders or even Net-adapters, you are save from</FONT></DIV>
  <DIV><FONT size=2>anyone entering </FONT><FONT size=2>your PC.</FONT></DIV>
  <DIV><FONT size=2>
  <DIV><FONT size=2>If you haven't done any of the&nbsp;file, folder, disk, 
  printer and netadapter </FONT><FONT size=2>sharing (also in the Control 
  Panel's Nethood/</FONT></DIV>
  <DIV><FONT size=2>Networking and the Win95/98 Context Menu's options for 
  "Sharing", then no-one can intrude onto your PC</FONT></DIV>
  <DIV><FONT size=2>with you in command (and as otherwise is described in the 
  article below).</FONT></DIV></FONT></DIV>
  <DIV><FONT size=2>This "Sharing", apart from the Control Panel's Nethood and 
  the Win95/98 Context Menu's options,</FONT></DIV>
  <DIV><FONT size=2>are privaleges you can also set for any of the "Users" 
  of&nbsp;your PC's Windows sessions. </FONT><FONT size=2>The program&nbsp;to do 
  so</FONT></DIV>
  <DIV><FONT size=2>is "C:\Windows\Poledit.exe".</FONT></DIV>
  <DIV>&nbsp;</DIV>
  <DIV><FONT size=2>The above is for Win95/98 only, for as WIN-NT4/2000 requires 
  a top secret "NTconfig.pol" file stored on server for</FONT></DIV>
  <DIV><FONT size=2>setting the&nbsp;"Sharing of the Network's NetHood, Server 
  and&nbsp;WKS's </FONT><FONT size=2>files, folders, printers and 
  disks".</FONT></DIV>
  <DIV>&nbsp;</DIV>
  <DIV><FONT size=2>Regards,<BR>Ton Maas<BR><A 
  href="mailto:ms-irb@xxxxxxxxxxxxx";>ms-irb@xxxxxxxxxxxxx</A><BR>Dismiss the 
  ".nospam" bit (including the dot) when replying.<BR><BR><BR></FONT><FONT 
  size=3>___________________________________________________________________________<BR><BR>WinInfo: 
  Windows news and information -- Copyright (c) 1995-9 Paul Thurrott<BR>Visit 
  WinInfo on the Web at WUGNET: <A 
  href="http://www.wugnet.com/wininfo";>http://www.wugnet.com/wininfo</A><BR>___________________________________________________________________________<BR><BR>Today's 
  WinInfo:<BR>&nbsp; Microsoft challenges BackOrifice myths<BR>&nbsp; Microsoft 
  bringing USB hardware to the Macintosh<BR><BR><BR>Microsoft challenges 
  BackOrifice myths<BR><BR>With the release this week of Windows NT hacking tool 
  "BackOrifice 2000,"<BR>Microsoft has launched an informational campaign of its 
  own, designed to<BR>derail myths about the malicious program. According to a 
  report on<BR>Microsoft's Security Advisor Web site, BackOrifice 2000 is a 
  remote control<BR>application that must be stealthily installed so that 
  attackers can take<BR>over a Windows NT-based network. The program enables 
  remote hackers to do<BR>anything they could do were they to be logged onto the 
  machine locally: Run<BR>programs, delete files, and the 
  like.<BR><BR>"BackOrifice 2000 is a remote-access tool that was developed with 
  the intent<BR>of harming users," says Jason Garms, the lead product manager 
  for Windows NT<BR>security at Microsoft. "It is a tool that has no legitimate 
  purpose other<BR>than exposing users' machines to people on the Internet. 
  Users who are<BR>tricked into getting this thing installed on their system are 
  vulnerable to<BR>the attacker, who can then do anything that the victim can 
  do--move the<BR>mouse, open files, run programs, etc.--which is little 
  different from what<BR>legitimate remote-control software can do. Back 
  Orifice, however, is<BR>designed to be stealthy and evade detection by the 
  user."<BR><BR>For BackOrifice to find its way onto your system the hacker must 
  have<BR>physical access to the machine with a valid login or you must be 
  tricked<BR>into installing it; typically this is accomplished by sending users 
  the<BR>program as an email attachment that must be executed. To prevent 
  this<BR>program from taking over your system, just use common sense: Always 
  run an<BR>anti-virus program with up-to-date virus definitions and don't let 
  anyone<BR>gain unauthorized physical access to your machine. Perhaps most 
  importantly,<BR>don't execute email attachments from unknown 
  people.<BR><BR>One of the biggest myths perpetrated by the makers of 
  BackOrifice is that<BR>program takes advantage of security inadequacies that 
  are inherent in<BR>Windows and Windows NT. This is simply not true: 
  BackOrifice could have been<BR>written to attack *any* kind of computer 
  system. The hackers that wrote it<BR>simply decided to attack Windows, which 
  is the most popular computing<BR>platform by far. In fact, as Microsoft notes, 
  BackOrifice doesn't actually<BR>target Windows per se at all: It targets 
  users, who often don't understand<BR>security issues well enough to not 
  execute email attachments from unknown<BR>sources.<BR><BR>Another common myth 
  centers on the goal for BackOrifice: In an attempt to<BR>protect themselves 
  from legal problems, the creators of BackOrifice are<BR>pretending that it is 
  a legitimate remote control application. However, this<BR>is not the case: 
  BackOrifice is designed to escape detection and exceeds the<BR>needs of remote 
  control software. And it doesn't prompt the user when it<BR>installs on the 
  system.<BR><BR>"The creators [of BackOrifice] claim that this is a useful 
  administration<BR>tool, but it doesn't even prompt people when it installs 
  itself on the<BR>system. It doesn't warn them that it's getting installed. 
  And, once it's<BR>installed, it makes the system available to other people on 
  the Internet.<BR>That is a malicious act," says Garms. "I am personally 
  unaware of any major<BR>customers of ours who consider this to be a remote 
  administration tool as<BR>the folks who created it claim. Quite the contrary, 
  they consider it a piece<BR>of malicious code. Unfortunately, there are some 
  users who were duped by the<BR>press releases from the organization that 
  released the software, and did<BR>install it on their systems."<BR><BR>For 
  more information about Microsoft's response to BackOrifice 2000, 
  please<BR>visit the Microsoft Security Advisor Web site:<BR>&nbsp; <A 
  href="http://www.microsoft.com/security/bulletins/bo2k.asp";>http://www.microsoft.com/security/bulletins/bo2k.asp</A><BR><BR><BR><BR><BR>Microsoft 
  bringing USB hardware to the Macintosh<BR><BR>Microsoft Corporation will 
  announce the availability of its first USB<BR>hardware for the Macintosh, the 
  IntelliMouse Explorer, a "no ball" mouse<BR>that the company will release this 
  fall for Windows as well. According to<BR>rumors, Microsoft will also be 
  porting other USB hardware to the Macintosh,<BR>including possibly all of the 
  company's joystick/entertainment hardware,<BR>such as the FreeStyle Pro 
  GamePad and the Sidewinder Precision Pro joystick.<BR><BR>Expect an official 
  announcement from Microsoft at MacWorld New York 
  next<BR>week.<BR><BR>___________________________________________________________________________<BR><BR>Visit 
  WinInfo on the Web at WUGNET: <A 
  href="http://www.wugnet.com/wininfo";>http://www.wugnet.com/wininfo</A><BR><BR>To 
  unsubscribe from the WinInfo list, simply send an E-mail message to<BR><A 
  href="mailto:listserv@xxxxxxxxxxxxxxxxxxxx";>listserv@xxxxxxxxxxxxxxxxxxxx</A> 
  with the phrase "unsubscribe wininfo" (no<BR>quotes) in the body. If you are 
  having problems unsubscribing or any other<BR>problems with the list, please 
  write Keith Furman at <A 
  href="mailto:listadmin@xxxxxxxxxx";>listadmin@xxxxxxxxxx</A>.<BR>___________________________________________________________________________<BR></DIV></FONT></BLOCKQUOTE></BODY></HTML>
</x-html>From ???@??? Wed Jul 28 13:51:18 1999
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
	by purebytes.com (8.8.7/8.8.7) with ESMTP id NAA29233
	for <neal@xxxxxxxxxxxxx>; Wed, 28 Jul 1999 13:48:28 -0700
Received: (from majordom@xxxxxxxxx)
	by listserv.equis.com (8.8.7/8.8.7) id EAA01553
	for metastock-outgoing; Thu, 29 Jul 1999 04:36:41 -0600
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
	by listserv.equis.com (8.8.7/8.8.7) with ESMTP id EAA01548
	for <metastock@xxxxxxxxxxxxxxxxxx>; Thu, 29 Jul 1999 04:36:38 -0600
Received: from slkcpop4.slkc.uswest.net (slkcpop4.slkc.uswest.net [206.81.128.4])
	by freeze.metastock.com (8.8.5/8.8.5) with SMTP id OAA13559
	for <metastock@xxxxxxxxxxxxx>; Wed, 28 Jul 1999 14:24:32 -0600 (MDT)
Received: (qmail 27068 invoked by alias); 28 Jul 1999 20:11:33 -0000
Delivered-To: fixup-metastock@xxxxxxxxxxxxx@fixme
Received: (qmail 27038 invoked by uid 0); 28 Jul 1999 20:11:33 -0000
Received: from edsl142.slkc.uswest.net (HELO Nicholas) (209.181.81.142)
  by slkcpop4.slkc.uswest.net with SMTP; 28 Jul 1999 20:11:33 -0000
From: "Nicholas Kormanik" <nkormanik@xxxxxxxxxx>
To: <metastock@xxxxxxxxxxxxx>
Subject: RE: intruders
Date: Wed, 28 Jul 1999 14:11:32 -0600
Message-ID: <LMBBKJCLKIJIBBJLAEIJIEFNCHAA.nkormanik@xxxxxxxxxx>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
In-Reply-To: <000401bed92e$2c86b020$256d75ce@xxxxxxxxxxxx>
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:   


Guy,

"I'm currently able to get up to 60KBs (or approximately 480Kbs) on my
768Kbs connection."

What program would you recommend for ascertaining this connection
speed/throughput?

Thanks,
Nicholas