[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: intruders [Fw: Today's WinInfo: July 12]



PureBytes Links

Trading Reference Links

<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content="text/html; charset=iso-8859-1" http-equiv=Content-Type>
<META content="MSHTML 5.00.2614.3401" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT size=2>Its in one of the CAB-files in the W95-CdRom's 
"Win95"-folder.<BR>(I have got all CAB's contents listed, so I can have a look 
for it if you like).</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT size=2>Share can only be set to enabled and unabled (eg active or not 
active). This gives the utmost</FONT></DIV>
<DIV><FONT size=2>best protection.</FONT></DIV>
<DIV><FONT size=2>If however, you have shared any disk- or hardware parts, and 
protected it via a Password, then</FONT></DIV>
<DIV><FONT size=2>the software-manufacturer's quality for its known 
savety-encryption power will be the answer as</FONT></DIV>
<DIV><FONT size=2>for&nbsp;</FONT><FONT size=2>how much your Share's are 
safe(What men can make, men can also undo).</FONT></DIV>
<DIV><FONT size=2>Also, i</FONT><FONT size=2>f you have set the required 
arrangements via Share, then you will not need the PoleEditor</FONT></DIV>
<DIV><FONT size=2>program, eg unless </FONT><FONT size=2>you want to further 
fine-tune&nbsp;any&nbsp;User-settings.&nbsp; </FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT size=2>Note too, that your connection to the Internet is also 
"accessing a network (by itself)", and as such</FONT></DIV>
<DIV><FONT size=2>many search-engines are always actively searching 
for&nbsp;sites that comply to "their to be searched for word",</FONT></DIV>
<DIV><FONT size=2>as such </FONT><FONT size=2>will most likely ping&nbsp;search 
your&nbsp;ISP's unique IP-number (server), as well as your own</FONT></DIV>
<DIV><FONT size=2>PC's unique </FONT><FONT size=2>number.</FONT></DIV>
<DIV><FONT size=2></FONT>&nbsp;</DIV>
<DIV><FONT size=2>E</FONT><FONT size=2>xample:</FONT></DIV>
<DIV><FONT size=2>Say that in IE5 I type&nbsp;"AV HardCopy", then Alta Vista 
will search any sites on the entire Internet containing</FONT></DIV>
<DIV><FONT size=2>the word HardCopy.</FONT></DIV>
<DIV><FONT size=2>Since one of my homepage's articles is about 
HardCopy,&nbsp;then naturaly my homepage will be found as well</FONT></DIV>
<DIV><FONT size=2>as many others (sites and/or homepages). This happens because 
my ISP's IP-number will then be "pinged"</FONT></DIV>
<DIV><FONT size=2>searched for, as well as </FONT><FONT size=2>that many other 
</FONT><FONT size=2>ISP's IP-numbers will be "pinged" searched for, </FONT><FONT 
size=2>eg if not all ISP's</FONT></DIV>
<DIV><FONT size=2>on this planet.</FONT></DIV>
<DIV><FONT size=2>Note than also from the above, that this doesn't make me or 
Alta Vista an intruder, </FONT><FONT size=2>eg all "we" did was 
perform</FONT></DIV>
<DIV><FONT size=2>a search</FONT><FONT size=2> (action) and from such a search, 
many (lots of) IP-addresses will get "pinged" searched for the 
existance</FONT></DIV>
<DIV><FONT size=2>of the word Hardcopy, </FONT><FONT size=2>and </FONT><FONT 
size=2>thus this will&nbsp;also include (many of) your ISP (servers) and your 
ISP's subscribers</FONT></DIV>
<DIV><FONT size=2>(eg their PC's as server's </FONT><FONT size=2>own&nbsp;unique 
IP numbers).</FONT></DIV>
<DIV><FONT size=2>My own PC is not linked to my homepage (as that page is stored 
on my ISP's server), and therefore will not be</FONT></DIV>
<DIV><FONT size=2>included in the above search action. </FONT><FONT size=2>It 
can also always be search-pinged, like any one else's IP-number,</FONT></DIV>
<DIV><FONT size=2>once I am on &lt;on-line&gt; on the Internet. This will not 
</FONT><FONT size=2>harm me, my PC or my PC's contents, tho.</FONT></DIV>
<DIV><FONT size=2>(see further my previous mail).</FONT></DIV>
<DIV><BR>Regards,<BR>Ton Maas<BR><A 
href="mailto:ms-irb@xxxxxxxxxxxxx";>ms-irb@xxxxxxxxxxxxx</A><BR>Dismiss the 
".nospam" bit (including the dot) when replying.</DIV>
<DIV>&nbsp;</DIV>
<DIV>&nbsp;</DIV>
<BLOCKQUOTE 
style="BORDER-LEFT: #000000 2px solid; MARGIN-LEFT: 5px; MARGIN-RIGHT: 0px; PADDING-LEFT: 5px; PADDING-RIGHT: 0px">
  <DIV style="FONT: 10pt arial">----- Original Message ----- </DIV>
  <DIV 
  style="BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: black"><B>From:</B> 
  Guy Tann </DIV>
  <DIV style="FONT: 10pt arial"><B>To:</B> <A 
  href="mailto:metastock@xxxxxxxxxxxxx"; 
  title=metastock@xxxxxxxxxxxxx>metastock@xxxxxxxxxxxxx</A> </DIV>
  <DIV style="FONT: 10pt arial"><B>Sent:</B> woensdag 28 juli 1999 6:16</DIV>
  <DIV style="FONT: 10pt arial"><B>Subject:</B> RE: intruders [Fw: Today's 
  WinInfo: July 12]</DIV>
  <DIV><BR></DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999>Ton</SPAN></FONT></DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN class=780561304-28071999>I 
  have password protected all of my drives with passwords for read-only as well 
  as read-write access.&nbsp; I'm still finding 'visitors' in my network 
  neighborhood.&nbsp; I assume they can't get at anything.&nbsp; When I 
  installed the passwords, I disconnected my PC from the network (and the 
  Internet) and installed all of the passwords, etc.&nbsp; Then hooked 
  everything back up.</SPAN></FONT></DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN class=780561304-28071999>I 
  tried to locate poledit.exe and that program isn't anywhere to be found in my 
  Win95 directory.</SPAN></FONT></DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999>Regards</SPAN></FONT></DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999>Guy</SPAN></FONT></DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
  <DIV class=OutlookMessageHeader><FONT face="Times New Roman" 
  size=2>-----Original Message-----<BR><B>From:</B> 
  owner-metastock@xxxxxxxxxxxxx [mailto:owner-metastock@xxxxxxxxxxxxx]<B>On 
  Behalf Of</B> A.J. Maas<BR><B>Sent:</B> Tuesday, July 13, 1999 4:12 
  PM<BR><B>To:</B> Metastock-List<BR><B>Subject:</B> Re: intruders [Fw: Today's 
  WinInfo: July 12]<BR><BR></FONT></DIV>
  <DIV><FONT size=2>To clear some myths..........................</FONT></DIV>
  <DIV><FONT size=2></FONT>&nbsp;</DIV>
  <DIV><FONT size=2>For as long as you do not "Share" any files, disks, 
  printers,&nbsp;folders or even Net-adapters, you are save from</FONT></DIV>
  <DIV><FONT size=2>anyone entering </FONT><FONT size=2>your PC.</FONT></DIV>
  <DIV><FONT size=2>
  <DIV><FONT size=2>If you haven't done any of the&nbsp;file, folder, disk, 
  printer and netadapter </FONT><FONT size=2>sharing (also in the Control 
  Panel's Nethood/</FONT></DIV>
  <DIV><FONT size=2>Networking and the Win95/98 Context Menu's options for 
  "Sharing", then no-one can intrude onto your PC</FONT></DIV>
  <DIV><FONT size=2>with you in command (and as otherwise is described in the 
  article below).</FONT></DIV></FONT></DIV>
  <DIV><FONT size=2>This "Sharing", apart from the Control Panel's Nethood and 
  the Win95/98 Context Menu's options,</FONT></DIV>
  <DIV><FONT size=2>are privaleges you can also set for any of the "Users" 
  of&nbsp;your PC's Windows sessions. </FONT><FONT size=2>The program&nbsp;to do 
  so</FONT></DIV>
  <DIV><FONT size=2>is "C:\Windows\Poledit.exe".</FONT></DIV>
  <DIV>&nbsp;</DIV>
  <DIV><FONT size=2>The above is for Win95/98 only, for as WIN-NT4/2000 requires 
  a top secret "NTconfig.pol" file stored on server for</FONT></DIV>
  <DIV><FONT size=2>setting the&nbsp;"Sharing of the Network's NetHood, Server 
  and&nbsp;WKS's </FONT><FONT size=2>files, folders, printers and 
  disks".</FONT></DIV>
  <DIV>&nbsp;</DIV>
  <DIV><FONT size=2>Regards,<BR>Ton Maas<BR><A 
  href="mailto:ms-irb@xxxxxxxxxxxxx";>ms-irb@xxxxxxxxxxxxx</A><BR>Dismiss the 
  ".nospam" bit (including the dot) when replying.<BR><BR><BR></FONT><FONT 
  size=3>___________________________________________________________________________<BR><BR>WinInfo: 
  Windows news and information -- Copyright (c) 1995-9 Paul Thurrott<BR>Visit 
  WinInfo on the Web at WUGNET: <A 
  href="http://www.wugnet.com/wininfo";>http://www.wugnet.com/wininfo</A><BR>___________________________________________________________________________<BR><BR>Today's 
  WinInfo:<BR>&nbsp; Microsoft challenges BackOrifice myths<BR>&nbsp; Microsoft 
  bringing USB hardware to the Macintosh<BR><BR><BR>Microsoft challenges 
  BackOrifice myths<BR><BR>With the release this week of Windows NT hacking tool 
  "BackOrifice 2000,"<BR>Microsoft has launched an informational campaign of its 
  own, designed to<BR>derail myths about the malicious program. According to a 
  report on<BR>Microsoft's Security Advisor Web site, BackOrifice 2000 is a 
  remote control<BR>application that must be stealthily installed so that 
  attackers can take<BR>over a Windows NT-based network. The program enables 
  remote hackers to do<BR>anything they could do were they to be logged onto the 
  machine locally: Run<BR>programs, delete files, and the 
  like.<BR><BR>"BackOrifice 2000 is a remote-access tool that was developed with 
  the intent<BR>of harming users," says Jason Garms, the lead product manager 
  for Windows NT<BR>security at Microsoft. "It is a tool that has no legitimate 
  purpose other<BR>than exposing users' machines to people on the Internet. 
  Users who are<BR>tricked into getting this thing installed on their system are 
  vulnerable to<BR>the attacker, who can then do anything that the victim can 
  do--move the<BR>mouse, open files, run programs, etc.--which is little 
  different from what<BR>legitimate remote-control software can do. Back 
  Orifice, however, is<BR>designed to be stealthy and evade detection by the 
  user."<BR><BR>For BackOrifice to find its way onto your system the hacker must 
  have<BR>physical access to the machine with a valid login or you must be 
  tricked<BR>into installing it; typically this is accomplished by sending users 
  the<BR>program as an email attachment that must be executed. To prevent 
  this<BR>program from taking over your system, just use common sense: Always 
  run an<BR>anti-virus program with up-to-date virus definitions and don't let 
  anyone<BR>gain unauthorized physical access to your machine. Perhaps most 
  importantly,<BR>don't execute email attachments from unknown 
  people.<BR><BR>One of the biggest myths perpetrated by the makers of 
  BackOrifice is that<BR>program takes advantage of security inadequacies that 
  are inherent in<BR>Windows and Windows NT. This is simply not true: 
  BackOrifice could have been<BR>written to attack *any* kind of computer 
  system. The hackers that wrote it<BR>simply decided to attack Windows, which 
  is the most popular computing<BR>platform by far. In fact, as Microsoft notes, 
  BackOrifice doesn't actually<BR>target Windows per se at all: It targets 
  users, who often don't understand<BR>security issues well enough to not 
  execute email attachments from unknown<BR>sources.<BR><BR>Another common myth 
  centers on the goal for BackOrifice: In an attempt to<BR>protect themselves 
  from legal problems, the creators of BackOrifice are<BR>pretending that it is 
  a legitimate remote control application. However, this<BR>is not the case: 
  BackOrifice is designed to escape detection and exceeds the<BR>needs of remote 
  control software. And it doesn't prompt the user when it<BR>installs on the 
  system.<BR><BR>"The creators [of BackOrifice] claim that this is a useful 
  administration<BR>tool, but it doesn't even prompt people when it installs 
  itself on the<BR>system. It doesn't warn them that it's getting installed. 
  And, once it's<BR>installed, it makes the system available to other people on 
  the Internet.<BR>That is a malicious act," says Garms. "I am personally 
  unaware of any major<BR>customers of ours who consider this to be a remote 
  administration tool as<BR>the folks who created it claim. Quite the contrary, 
  they consider it a piece<BR>of malicious code. Unfortunately, there are some 
  users who were duped by the<BR>press releases from the organization that 
  released the software, and did<BR>install it on their systems."<BR><BR>For 
  more information about Microsoft's response to BackOrifice 2000, 
  please<BR>visit the Microsoft Security Advisor Web site:<BR>&nbsp; <A 
  href="http://www.microsoft.com/security/bulletins/bo2k.asp";>http://www.microsoft.com/security/bulletins/bo2k.asp</A><BR><BR><BR><BR><BR>Microsoft 
  bringing USB hardware to the Macintosh<BR><BR>Microsoft Corporation will 
  announce the availability of its first USB<BR>hardware for the Macintosh, the 
  IntelliMouse Explorer, a "no ball" mouse<BR>that the company will release this 
  fall for Windows as well. According to<BR>rumors, Microsoft will also be 
  porting other USB hardware to the Macintosh,<BR>including possibly all of the 
  company's joystick/entertainment hardware,<BR>such as the FreeStyle Pro 
  GamePad and the Sidewinder Precision Pro joystick.<BR><BR>Expect an official 
  announcement from Microsoft at MacWorld New York 
  next<BR>week.<BR><BR>___________________________________________________________________________<BR><BR>Visit 
  WinInfo on the Web at WUGNET: <A 
  href="http://www.wugnet.com/wininfo";>http://www.wugnet.com/wininfo</A><BR><BR>To 
  unsubscribe from the WinInfo list, simply send an E-mail message to<BR><A 
  href="mailto:listserv@xxxxxxxxxxxxxxxxxxxx";>listserv@xxxxxxxxxxxxxxxxxxxx</A> 
  with the phrase "unsubscribe wininfo" (no<BR>quotes) in the body. If you are 
  having problems unsubscribing or any other<BR>problems with the list, please 
  write Keith Furman at <A 
  href="mailto:listadmin@xxxxxxxxxx";>listadmin@xxxxxxxxxx</A>.<BR>___________________________________________________________________________<BR></DIV></BLOCKQUOTE></FONT></BODY></HTML>
</x-html>From ???@??? Fri Jul 30 21:46:32 1999
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
	by purebytes.com (8.8.7/8.8.7) with ESMTP id VAA17157
	for <neal@xxxxxxxxxxxxx>; Fri, 30 Jul 1999 21:29:41 -0700
Received: (from majordom@xxxxxxxxx)
	by listserv.equis.com (8.8.7/8.8.7) id MAA16140
	for metastock-outgoing; Sat, 31 Jul 1999 12:10:23 -0600
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
	by listserv.equis.com (8.8.7/8.8.7) with ESMTP id MAA16133
	for <metastock@xxxxxxxxxxxxxxxxxx>; Sat, 31 Jul 1999 12:10:20 -0600
Received: from smtp02.wxs.nl (smtp02.wxs.nl [195.121.6.60])
	by freeze.metastock.com (8.8.5/8.8.5) with ESMTP id VAA15202
	for <metastock@xxxxxxxxxxxxx>; Fri, 30 Jul 1999 21:58:26 -0600 (MDT)
Received: from escom ([195.121.180.191]) by smtp02.wxs.nl
          (Netscape Messaging Server 3.61)  with SMTP id AAB6FBE
          for <metastock@xxxxxxxxxxxxx>; Sat, 31 Jul 1999 05:44:55 +0200
Message-ID: <000e01bedb06$d5dbef80$bfb479c3@xxxxx>
From: "A.J. Maas" <anthmaas@xxxxxx>
To: <metastock@xxxxxxxxxxxxx>
References: <000b01beda64$3a6a91c0$53cba2d0@xxxxxx>
Subject: Re: EOD zip file quotes via email providers
Date: Fri, 30 Jul 1999 23:49:01 +0200
Organization: Ms-IRB
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2014.211
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2014.211
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:   

www.quote.com
(last that I know of) you can receive via email as well as also
download from their (protected) FTP-site.

Regards,
Ton Maas
ms-irb@xxxxxxxxxxxxx
Dismiss the ".nospam" bit (including the dot) when replying.


----- Original Message ----- 
From: Raidak <raidak@xxxxxxxxx>
To: Metastock List <metastock@xxxxxxxxxxxxx>
Sent: vrijdag 30 juli 1999 10:18
Subject: EOD zip file quotes via email providers


> Hi
> 
> I am looking for a good eod provider who can email direct zip file of all active stocks.
> I did some search but i couldn't find any such service.
> is there anyone know of such providers
> 
> thanks
> 
> raidak
> 
> 
>