PureBytes Links
Trading Reference Links
|
<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content="text/html; charset=windows-1252" http-equiv=Content-Type>
<META content="MSHTML 5.00.2314.1000" name=GENERATOR></HEAD>
<BODY>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=10154019-28071999>Augie</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=10154019-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=10154019-28071999>I have
Sharing allowed through my Network setup. Then g</SPAN></FONT><FONT
color=#0000ff face=Arial size=2><SPAN class=10154019-28071999>o to Control
Panel. Double click on each drive, click on sharing and set up your
passwords. I set up 2 different ones. One for read only and one for
read/write. I also password protected my CD-ROM (read only) and set my
floppy up as not being shared.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=10154019-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=10154019-28071999>My
printers are on my network, so I'm not sure how you would protect these if
they're on your system. I did this for all 3 of our
computers.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=10154019-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=10154019-28071999>It's
all Windows stuff.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=10154019-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=10154019-28071999>Guy</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=10154019-28071999></SPAN></FONT> </DIV>
<DIV class=OutlookMessageHeader><FONT face="Times New Roman"
size=2>-----Original Message-----<BR><B>From:</B> owner-metastock@xxxxxxxxxxxxx
[mailto:owner-metastock@xxxxxxxxxxxxx]<B>On Behalf Of</B> George
Ashton<BR><B>Sent:</B> Wednesday, July 28, 1999 3:58 AM<BR><B>To:</B>
metastock@xxxxxxxxxxxxx<BR><B>Subject:</B> OFF TOPIC intruders [Fw: Today's
WinInfo: July 12]<BR><BR></FONT></DIV>At 23:21 27/07/99 -0600, you
wrote:<BR><FONT size=2>
<BLOCKQUOTE cite type="cite">Guy,</FONT><BR> <BR><FONT size=2>How do I
password protect my hard drives ? Is it a Windows feature or is it
achieved via special software ?</FONT><BR> <BR><FONT
size=2>Thanks.</FONT><BR> <BR><FONT size=2>Augie</FONT><BR><FONT
face=arial size=2><B>
<BLOCKQUOTE cite type="cite">-----Original Message-----</B><BR>From: </B>Guy
Tann <<A
href="mailto:grt@xxxxxxxxxxxx">grt@xxxxxxxxxxxx</A>><BR><B>To: </B><A
href="mailto:metastock@xxxxxxxxxxxxx">metastock@xxxxxxxxxxxxx</A> <<A
href="mailto:metastock@xxxxxxxxxxxxx">metastock@xxxxxxxxxxxxx</A>><BR><B>Date:
</B>Tuesday, July 27, 1999 11:13 PM<BR><B>Subject: </B>RE: intruders [Fw:
Today's WinInfo: July 12]<BR><BR></FONT><FONT color=#0000ff face=arial
size=2>Ton</FONT><BR> <BR><FONT color=#0000ff face=arial size=2>I have
password protected all of my drives with passwords for read-only as well as
read-write access. I'm still finding 'visitors' in my network
neighborhood. I assume they can't get at anything. When I
installed the passwords, I disconnected my PC from the network (and the
Internet) and installed all of the passwords, etc. Then hooked
everything back up.</FONT><BR> <BR><FONT color=#0000ff face=arial
size=2>I tried to locate poledit.exe and that program isn't anywhere to be
found in my Win95 directory.</FONT><BR> <BR><FONT color=#0000ff
face=arial size=2>Regards</FONT><BR> <BR><FONT color=#0000ff face=arial
size=2>Guy</FONT><BR> <BR><FONT face="Times New Roman, Times"
size=2>-----Original Message-----<BR><B>From:</B>
owner-metastock@xxxxxxxxxxxxx [<A
href="mailto:owner-metastock@xxxxxxxxxxxxx%5DOn"
eudora="autourl">mailto:owner-metastock@xxxxxxxxxxxxx]</A><A
href="mailto:owner-metastock@xxxxxxxxxxxxx%5DOn" eudora="autourl"><B>On</A>
Behalf Of</B> A.J. Maas<BR><B>Sent:</B> Tuesday, July 13, 1999 4:12
PM<BR><B>To:</B> Metastock-List<BR><B>Subject:</B> Re: intruders [Fw:
Today's WinInfo: July 12]<BR><BR></FONT>To clear some
myths..........................<BR> <BR><FONT size=2>For as long as you
do not "Share" any files, disks, printers, folders or even Net-adapters, you
are save from</FONT><BR>anyone entering your PC.<BR>If you haven't done any
of the file, folder, disk, printer and netadapter sharing (also in the
Control Panel's Nethood/<BR>Networking and the Win95/98 Context Menu's
options for "Sharing", then no-one can intrude onto your PC<BR>with you in
command (and as otherwise is described in the article below).<BR>This
"Sharing", apart from the Control Panel's Nethood and the Win95/98 Context
Menu's options,<BR>are privaleges you can also set for any of the "Users" of
your PC's Windows sessions. The program to do so<BR>is
"C:\Windows\Poledit.exe".<BR> <BR><FONT size=2>The above is for
Win95/98 only, for as WIN-NT4/2000 requires a top secret "NTconfig.pol" file
stored on server for</FONT><BR>setting the "Sharing of the Network's
NetHood, Server and WKS's files, folders, printers and
disks".<BR> <BR><FONT size=2>Regards,<BR>Ton Maas<BR><A
href="mailto:ms-irb@xxxxxxxxxxxxx">ms-irb@xxxxxxxxxxxxx</A><BR>Dismiss the
".nospam" bit (including the dot) when
replying.<BR><BR><BR></FONT>___________________________________________________________________________<BR><BR>WinInfo:
Windows news and information -- Copyright (c) 1995-9 Paul Thurrott<BR>Visit
WinInfo on the Web at WUGNET: <A
href="http://www.wugnet.com/wininfo">http://www.wugnet.com/wininfo</A><BR>___________________________________________________________________________<BR><BR>Today's
WinInfo:<BR> Microsoft challenges BackOrifice myths<BR>
Microsoft bringing USB hardware to the Macintosh<BR><BR><BR>Microsoft
challenges BackOrifice myths<BR><BR>With the release this week of Windows NT
hacking tool "BackOrifice 2000,"<BR>Microsoft has launched an informational
campaign of its own, designed to<BR>derail myths about the malicious
program. According to a report on<BR>Microsoft's Security Advisor Web site,
BackOrifice 2000 is a remote control<BR>application that must be stealthily
installed so that attackers can take<BR>over a Windows NT-based network. The
program enables remote hackers to do<BR>anything they could do were they to
be logged onto the machine locally: Run<BR>programs, delete files, and the
like.<BR><BR>"BackOrifice 2000 is a remote-access tool that was developed
with the intent<BR>of harming users," says Jason Garms, the lead product
manager for Windows NT<BR>security at Microsoft. "It is a tool that has no
legitimate purpose other<BR>than exposing users' machines to people on the
Internet. Users who are<BR>tricked into getting this thing installed on
their system are vulnerable to<BR>the attacker, who can then do anything
that the victim can do--move the<BR>mouse, open files, run programs,
etc.--which is little different from what<BR>legitimate remote-control
software can do. Back Orifice, however, is<BR>designed to be stealthy and
evade detection by the user."<BR><BR>For BackOrifice to find its way onto
your system the hacker must have<BR>physical access to the machine with a
valid login or you must be tricked<BR>into installing it; typically this is
accomplished by sending users the<BR>program as an email attachment that
must be executed. To prevent this<BR>program from taking over your system,
just use common sense: Always run an<BR>anti-virus program with up-to-date
virus definitions and don't let anyone<BR>gain unauthorized physical access
to your machine. Perhaps most importantly,<BR>don't execute email
attachments from unknown people.<BR><BR>One of the biggest myths perpetrated
by the makers of BackOrifice is that<BR>program takes advantage of security
inadequacies that are inherent in<BR>Windows and Windows NT. This is simply
not true: BackOrifice could have been<BR>written to attack *any* kind of
computer system. The hackers that wrote it<BR>simply decided to attack
Windows, which is the most popular computing<BR>platform by far. In fact, as
Microsoft notes, BackOrifice doesn't actually<BR>target Windows per se at
all: It targets users, who often don't understand<BR>security issues well
enough to not execute email attachments from
unknown<BR>sources.<BR><BR>Another common myth centers on the goal for
BackOrifice: In an attempt to<BR>protect themselves from legal problems, the
creators of BackOrifice are<BR>pretending that it is a legitimate remote
control application. However, this<BR>is not the case: BackOrifice is
designed to escape detection and exceeds the<BR>needs of remote control
software. And it doesn't prompt the user when it<BR>installs on the
system.<BR><BR>"The creators [of BackOrifice] claim that this is a useful
administration<BR>tool, but it doesn't even prompt people when it installs
itself on the<BR>system. It doesn't warn them that it's getting installed.
And, once it's<BR>installed, it makes the system available to other people
on the Internet.<BR>That is a malicious act," says Garms. "I am personally
unaware of any major<BR>customers of ours who consider this to be a remote
administration tool as<BR>the folks who created it claim. Quite the
contrary, they consider it a piece<BR>of malicious code. Unfortunately,
there are some users who were duped by the<BR>press releases from the
organization that released the software, and did<BR>install it on their
systems."<BR><BR>For more information about Microsoft's response to
BackOrifice 2000, please<BR>visit the Microsoft Security Advisor Web
site:<BR> <A
href="http://www.microsoft.com/security/bulletins/bo2k.asp">http://www.microsoft.com/security/bulletins/bo2k.asp</A><BR><BR><BR><BR><BR>Microsoft
bringing USB hardware to the Macintosh<BR><BR>Microsoft Corporation will
announce the availability of its first USB<BR>hardware for the Macintosh,
the IntelliMouse Explorer, a "no ball" mouse<BR>that the company will
release this fall for Windows as well. According to<BR>rumors, Microsoft
will also be porting other USB hardware to the Macintosh,<BR>including
possibly all of the company's joystick/entertainment hardware,<BR>such as
the FreeStyle Pro GamePad and the Sidewinder Precision Pro
joystick.<BR><BR>Expect an official announcement from Microsoft at MacWorld
New York
next<BR>week.<BR><BR>___________________________________________________________________________<BR><BR>Visit
WinInfo on the Web at WUGNET: <A
href="http://www.wugnet.com/wininfo">http://www.wugnet.com/wininfo</A><BR><BR>To
unsubscribe from the WinInfo list, simply send an E-mail message to<BR><A
href="mailto:listserv@xxxxxxxxxxxxxxxxxxxx">listserv@xxxxxxxxxxxxxxxxxxxx</A>
with the phrase "unsubscribe wininfo" (no<BR>quotes) in the body. If you are
having problems unsubscribing or any other<BR>problems with the list, please
write Keith Furman at <A
href="mailto:listadmin@xxxxxxxxxx">listadmin@xxxxxxxxxx</A>.<BR>___________________________________________________________________________</BLOCKQUOTE></BLOCKQUOTE><BR></BODY></HTML>
</x-html>From ???@??? Wed Jul 28 13:31:22 1999
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
by purebytes.com (8.8.7/8.8.7) with ESMTP id NAA28825
for <neal@xxxxxxxxxxxxx>; Wed, 28 Jul 1999 13:31:03 -0700
Received: (from majordom@xxxxxxxxx)
by listserv.equis.com (8.8.7/8.8.7) id EAA01125
for metastock-outgoing; Thu, 29 Jul 1999 04:15:15 -0600
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
by listserv.equis.com (8.8.7/8.8.7) with ESMTP id EAA01121
for <metastock@xxxxxxxxxxxxxxxxxx>; Thu, 29 Jul 1999 04:15:11 -0600
Received: from basecamp1.netquest.net (netquest.net [204.140.219.1])
by freeze.metastock.com (8.8.5/8.8.5) with ESMTP id OAA13539
for <metastock@xxxxxxxxxxxxx>; Wed, 28 Jul 1999 14:03:04 -0600 (MDT)
Received: from p400 (dsl0037.netquest.net [206.117.109.37]) by basecamp1.netquest.net (8.8.8/8.8.6) with SMTP id MAA03798 for <metastock@xxxxxxxxxxxxx>; Wed, 28 Jul 1999 12:49:53 -0700 (PDT)
From: "Guy Tann" <grt@xxxxxxxxxxxx>
To: <metastock@xxxxxxxxxxxxx>
Subject: RE: intruders [Fw: Today's WinInfo: July 12]
Date: Wed, 28 Jul 1999 12:49:51 -0700
Message-ID: <000901bed932$5b006fa0$256d75ce@xxxxxxxxxxxx>
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="----=_NextPart_000_000A_01BED8F7.AEA197A0"
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook 8.5, Build 4.71.2377.0
In-Reply-To: <002501bed8ba$177060b0$020101c0@xxxx>
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Importance: Normal
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:
<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content=text/html;charset=iso-8859-1 http-equiv=Content-Type><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<META content="MSHTML 5.00.2314.1000" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=630324619-28071999>Kent</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=630324619-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=630324619-28071999>Thanks, but I'm strictly running Win95 sharing between
my wife's IBM 560 laptop, my 9 year old's HP Pentium system and mine.
Actually, my wife just backs up her diary onto my hard drive which I back up
nightly via the Internet. The little guy's computer is strictly used for
educational and game software. I was primarily interested in protecting my
data and preventing any access through the other computers on my LAN. I
have a print server and the DSL modem plugged into the hub as
well.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=630324619-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=630324619-28071999>Guy</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=630324619-28071999></SPAN></FONT> </DIV>
<DIV class=OutlookMessageHeader><FONT face="Times New Roman"
size=2>-----Original Message-----<BR><B>From:</B> owner-metastock@xxxxxxxxxxxxx
[mailto:owner-metastock@xxxxxxxxxxxxx]<B>On Behalf Of</B> Kent
Rollins<BR><B>Sent:</B> Tuesday, July 27, 1999 10:29 PM<BR><B>To:</B>
metastock@xxxxxxxxxxxxx<BR><B>Subject:</B> Re: intruders [Fw: Today's WinInfo:
July 12]<BR><BR></FONT></DIV>
<DIV><FONT color=#000000 size=2>Guy</FONT></DIV>
<DIV><FONT color=#000000 size=2></FONT> </DIV>
<DIV><FONT size=2>You should also make sure you have changed the password for
your Adminstrator and Guest accounts on any NT systems you have. This is
one thing that many people forget to do. This can be done from the User
Manager.</FONT></DIV>
<DIV><FONT size=2></FONT> </DIV>
<DIV><FONT size=2>Kent</FONT></DIV>
<BLOCKQUOTE
style="BORDER-LEFT: #000000 2px solid; MARGIN-LEFT: 5px; PADDING-LEFT: 5px">
<DIV><FONT face=Arial size=2><B>-----Original Message-----</B><BR><B>From:
</B>Guy Tann <<A
href="mailto:grt@xxxxxxxxxxxx">grt@xxxxxxxxxxxx</A>><BR><B>To: </B><A
href="mailto:metastock@xxxxxxxxxxxxx">metastock@xxxxxxxxxxxxx</A> <<A
href="mailto:metastock@xxxxxxxxxxxxx">metastock@xxxxxxxxxxxxx</A>><BR><B>Date:
</B>Wednesday, July 28, 1999 2:41 PM<BR><B>Subject: </B>RE: intruders [Fw:
Today's WinInfo: July 12]<BR><BR></DIV></FONT>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999>Ton</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=780561304-28071999>I
have password protected all of my drives with passwords for read-only as well
as read-write access. I'm still finding 'visitors' in my network
neighborhood. I assume they can't get at anything. When I
installed the passwords, I disconnected my PC from the network (and the
Internet) and installed all of the passwords, etc. Then hooked
everything back up.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=780561304-28071999>I
tried to locate poledit.exe and that program isn't anywhere to be found in my
Win95 directory.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999>Regards</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999>Guy</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV class=OutlookMessageHeader><FONT face="Times New Roman"
size=2>-----Original Message-----<BR><B>From:</B>
owner-metastock@xxxxxxxxxxxxx [mailto:owner-metastock@xxxxxxxxxxxxx]<B>On
Behalf Of</B> A.J. Maas<BR><B>Sent:</B> Tuesday, July 13, 1999 4:12
PM<BR><B>To:</B> Metastock-List<BR><B>Subject:</B> Re: intruders [Fw: Today's
WinInfo: July 12]<BR><BR></FONT></DIV>
<DIV><FONT size=2>To clear some myths..........................</FONT></DIV>
<DIV><FONT size=2></FONT> </DIV>
<DIV><FONT size=2>For as long as you do not "Share" any files, disks,
printers, folders or even Net-adapters, you are save from</FONT></DIV>
<DIV><FONT size=2>anyone entering </FONT><FONT size=2>your PC.</FONT></DIV>
<DIV><FONT size=2>
<DIV><FONT size=2>If you haven't done any of the file, folder, disk,
printer and netadapter </FONT><FONT size=2>sharing (also in the Control
Panel's Nethood/</FONT></DIV>
<DIV><FONT size=2>Networking and the Win95/98 Context Menu's options for
"Sharing", then no-one can intrude onto your PC</FONT></DIV>
<DIV><FONT size=2>with you in command (and as otherwise is described in the
article below).</FONT></DIV></FONT></DIV>
<DIV><FONT size=2>This "Sharing", apart from the Control Panel's Nethood and
the Win95/98 Context Menu's options,</FONT></DIV>
<DIV><FONT size=2>are privaleges you can also set for any of the "Users"
of your PC's Windows sessions. </FONT><FONT size=2>The program to do
so</FONT></DIV>
<DIV><FONT size=2>is "C:\Windows\Poledit.exe".</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>The above is for Win95/98 only, for as WIN-NT4/2000 requires
a top secret "NTconfig.pol" file stored on server for</FONT></DIV>
<DIV><FONT size=2>setting the "Sharing of the Network's NetHood, Server
and WKS's </FONT><FONT size=2>files, folders, printers and
disks".</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Regards,<BR>Ton Maas<BR><A
href="mailto:ms-irb@xxxxxxxxxxxxx">ms-irb@xxxxxxxxxxxxx</A><BR>Dismiss the
".nospam" bit (including the dot) when replying.<BR><BR><BR></FONT><FONT
size=3>___________________________________________________________________________<BR><BR>WinInfo:
Windows news and information -- Copyright (c) 1995-9 Paul Thurrott<BR>Visit
WinInfo on the Web at WUGNET: <A
href="http://www.wugnet.com/wininfo">http://www.wugnet.com/wininfo</A><BR>___________________________________________________________________________<BR><BR>Today's
WinInfo:<BR> Microsoft challenges BackOrifice myths<BR> Microsoft
bringing USB hardware to the Macintosh<BR><BR><BR>Microsoft challenges
BackOrifice myths<BR><BR>With the release this week of Windows NT hacking tool
"BackOrifice 2000,"<BR>Microsoft has launched an informational campaign of its
own, designed to<BR>derail myths about the malicious program. According to a
report on<BR>Microsoft's Security Advisor Web site, BackOrifice 2000 is a
remote control<BR>application that must be stealthily installed so that
attackers can take<BR>over a Windows NT-based network. The program enables
remote hackers to do<BR>anything they could do were they to be logged onto the
machine locally: Run<BR>programs, delete files, and the
like.<BR><BR>"BackOrifice 2000 is a remote-access tool that was developed with
the intent<BR>of harming users," says Jason Garms, the lead product manager
for Windows NT<BR>security at Microsoft. "It is a tool that has no legitimate
purpose other<BR>than exposing users' machines to people on the Internet.
Users who are<BR>tricked into getting this thing installed on their system are
vulnerable to<BR>the attacker, who can then do anything that the victim can
do--move the<BR>mouse, open files, run programs, etc.--which is little
different from what<BR>legitimate remote-control software can do. Back
Orifice, however, is<BR>designed to be stealthy and evade detection by the
user."<BR><BR>For BackOrifice to find its way onto your system the hacker must
have<BR>physical access to the machine with a valid login or you must be
tricked<BR>into installing it; typically this is accomplished by sending users
the<BR>program as an email attachment that must be executed. To prevent
this<BR>program from taking over your system, just use common sense: Always
run an<BR>anti-virus program with up-to-date virus definitions and don't let
anyone<BR>gain unauthorized physical access to your machine. Perhaps most
importantly,<BR>don't execute email attachments from unknown
people.<BR><BR>One of the biggest myths perpetrated by the makers of
BackOrifice is that<BR>program takes advantage of security inadequacies that
are inherent in<BR>Windows and Windows NT. This is simply not true:
BackOrifice could have been<BR>written to attack *any* kind of computer
system. The hackers that wrote it<BR>simply decided to attack Windows, which
is the most popular computing<BR>platform by far. In fact, as Microsoft notes,
BackOrifice doesn't actually<BR>target Windows per se at all: It targets
users, who often don't understand<BR>security issues well enough to not
execute email attachments from unknown<BR>sources.<BR><BR>Another common myth
centers on the goal for BackOrifice: In an attempt to<BR>protect themselves
from legal problems, the creators of BackOrifice are<BR>pretending that it is
a legitimate remote control application. However, this<BR>is not the case:
BackOrifice is designed to escape detection and exceeds the<BR>needs of remote
control software. And it doesn't prompt the user when it<BR>installs on the
system.<BR><BR>"The creators [of BackOrifice] claim that this is a useful
administration<BR>tool, but it doesn't even prompt people when it installs
itself on the<BR>system. It doesn't warn them that it's getting installed.
And, once it's<BR>installed, it makes the system available to other people on
the Internet.<BR>That is a malicious act," says Garms. "I am personally
unaware of any major<BR>customers of ours who consider this to be a remote
administration tool as<BR>the folks who created it claim. Quite the contrary,
they consider it a piece<BR>of malicious code. Unfortunately, there are some
users who were duped by the<BR>press releases from the organization that
released the software, and did<BR>install it on their systems."<BR><BR>For
more information about Microsoft's response to BackOrifice 2000,
please<BR>visit the Microsoft Security Advisor Web site:<BR> <A
href="http://www.microsoft.com/security/bulletins/bo2k.asp">http://www.microsoft.com/security/bulletins/bo2k.asp</A><BR><BR><BR><BR><BR>Microsoft
bringing USB hardware to the Macintosh<BR><BR>Microsoft Corporation will
announce the availability of its first USB<BR>hardware for the Macintosh, the
IntelliMouse Explorer, a "no ball" mouse<BR>that the company will release this
fall for Windows as well. According to<BR>rumors, Microsoft will also be
porting other USB hardware to the Macintosh,<BR>including possibly all of the
company's joystick/entertainment hardware,<BR>such as the FreeStyle Pro
GamePad and the Sidewinder Precision Pro joystick.<BR><BR>Expect an official
announcement from Microsoft at MacWorld New York
next<BR>week.<BR><BR>___________________________________________________________________________<BR><BR>Visit
WinInfo on the Web at WUGNET: <A
href="http://www.wugnet.com/wininfo">http://www.wugnet.com/wininfo</A><BR><BR>To
unsubscribe from the WinInfo list, simply send an E-mail message to<BR><A
href="mailto:listserv@xxxxxxxxxxxxxxxxxxxx">listserv@xxxxxxxxxxxxxxxxxxxx</A>
with the phrase "unsubscribe wininfo" (no<BR>quotes) in the body. If you are
having problems unsubscribing or any other<BR>problems with the list, please
write Keith Furman at <A
href="mailto:listadmin@xxxxxxxxxx">listadmin@xxxxxxxxxx</A>.<BR>___________________________________________________________________________<BR></DIV></FONT></BLOCKQUOTE></BODY></HTML>
</x-html>From ???@??? Wed Jul 28 13:51:18 1999
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
by purebytes.com (8.8.7/8.8.7) with ESMTP id NAA29233
for <neal@xxxxxxxxxxxxx>; Wed, 28 Jul 1999 13:48:28 -0700
Received: (from majordom@xxxxxxxxx)
by listserv.equis.com (8.8.7/8.8.7) id EAA01553
for metastock-outgoing; Thu, 29 Jul 1999 04:36:41 -0600
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
by listserv.equis.com (8.8.7/8.8.7) with ESMTP id EAA01548
for <metastock@xxxxxxxxxxxxxxxxxx>; Thu, 29 Jul 1999 04:36:38 -0600
Received: from slkcpop4.slkc.uswest.net (slkcpop4.slkc.uswest.net [206.81.128.4])
by freeze.metastock.com (8.8.5/8.8.5) with SMTP id OAA13559
for <metastock@xxxxxxxxxxxxx>; Wed, 28 Jul 1999 14:24:32 -0600 (MDT)
Received: (qmail 27068 invoked by alias); 28 Jul 1999 20:11:33 -0000
Delivered-To: fixup-metastock@xxxxxxxxxxxxx@fixme
Received: (qmail 27038 invoked by uid 0); 28 Jul 1999 20:11:33 -0000
Received: from edsl142.slkc.uswest.net (HELO Nicholas) (209.181.81.142)
by slkcpop4.slkc.uswest.net with SMTP; 28 Jul 1999 20:11:33 -0000
From: "Nicholas Kormanik" <nkormanik@xxxxxxxxxx>
To: <metastock@xxxxxxxxxxxxx>
Subject: RE: intruders
Date: Wed, 28 Jul 1999 14:11:32 -0600
Message-ID: <LMBBKJCLKIJIBBJLAEIJIEFNCHAA.nkormanik@xxxxxxxxxx>
MIME-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
In-Reply-To: <000401bed92e$2c86b020$256d75ce@xxxxxxxxxxxx>
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:
Guy,
"I'm currently able to get up to 60KBs (or approximately 480Kbs) on my
768Kbs connection."
What program would you recommend for ascertaining this connection
speed/throughput?
Thanks,
Nicholas
|