[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: persistent intruder attack



PureBytes Links

Trading Reference Links

<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content="text/html; charset=iso-8859-1" http-equiv=Content-Type>
<META content="MSHTML 5.00.2314.1000" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT face=Arial size=2>Do I take this to mean that those with dial up 
service are less at risk than those who are online via Cable or other continuous 
connection means?</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT face=Arial size=2>Respectfully</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT face=Arial size=2>Gerrit Marks</FONT></DIV>
<DIV>&nbsp;</DIV>
<BLOCKQUOTE 
style="BORDER-LEFT: #000000 2px solid; MARGIN-LEFT: 5px; MARGIN-RIGHT: 0px; PADDING-LEFT: 5px; PADDING-RIGHT: 0px">
  <DIV style="FONT: 10pt arial">----- Original Message ----- </DIV>
  <DIV 
  style="BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: black"><B>From:</B> 
  <A href="mailto:vitaly@xxxxxxxxxxxxx"; title=vitaly@xxxxxxxxxxxxx>Vitaly 
  Larichev</A> </DIV>
  <DIV style="FONT: 10pt arial"><B>To:</B> <A 
  href="mailto:metastock@xxxxxxxxxxxxx"; 
  title=metastock@xxxxxxxxxxxxx>metastock@xxxxxxxxxxxxx</A> </DIV>
  <DIV style="FONT: 10pt arial"><B>Sent:</B> Sunday, August 22, 1999 3:50 
  PM</DIV>
  <DIV style="FONT: 10pt arial"><B>Subject:</B> Re: persistent intruder 
  attack</DIV>
  <DIV><BR></DIV><BR>&gt;From a recent post<BR><BR>&gt; &gt; ...<BR>&gt; &gt; I 
  immediately disconnected from the internet.<BR>&gt; &gt; ...<BR><BR>Do we 
  overreact to dangers of intrusion?<BR><BR>I should admit that I know little on 
  the subject. So, the above is a question, indeed. Still, a<BR>common sense 
  makes me wonder, how real are these dangers?<BR><BR>What concerns me is a 
  possibility of giving somebody an access to private information kept on my 
  PC:<BR>personal data, financial records (# of credit cards, bank, brokerage 
  accounts). As some might have a<BR>bad luck to learn, this may spell a long, 
  long trouble in contrast to just temporary unpleasantness<BR>of restoring data 
  on HD damaged by a virus, from your backups. Yep, I do backups regularly after 
  I<BR>was taught a hard way (two HD crashes with total loss of all data) a 
  lesson on "What these freaking<BR>backups are for?"<BR><BR>As I understand, 
  for an outsider to ,say, read files on my PC connected to Internet, he should 
  be<BR>able to take over, at least partially, PC's operational system. For it, 
  PC should have installed a<BR>remote telecommunication program specially 
  tailored for these needs (an ability to transmit<BR>covertly, etc.). Not just 
  something standard, available on each computer like Hyperterminal in<BR>Win95. 
  Also, it cannot get there without your, though involuntary, participation - 
  you may put it in<BR>there when opening e-mail, downloading stuff from a Web 
  site, and so forth. Only then, I believe,<BR>you are ripe for being picked up 
  by an intruder. If you are "clean", the intruder may sniff out all<BR>your 
  ports, upper and lower, but no chances to succeed. Am I wrong on this? 
  Perhaps, most of these<BR>"attacks" are really innocent (like searching for a 
  partner to play a game), and we shouldn't get<BR>obsessed with it? Maybe, it's 
  a way the Web lives that we've just discovered to our confusion?<BR><BR>Also, 
  mind that even an intruder with an access cannot visit your PC casually, from 
  time to time.<BR>Each time you get connected to the Web, you get a new 
  Internet address, so next time you are lost<BR>for the intruder. It's true as 
  well for "always on" Internet connections like cable modems: as soon<BR>as you 
  turn off/on your PC (not sure if closing a browser does the trick), you get a 
  new address<BR>also.<BR><BR>Thanks for your patience.<BR><BR>Cheers, 
  Vitaly<BR><BR><BR><BR><BR><BR><BR></BLOCKQUOTE></BODY></HTML>
</x-html>From ???@??? Sun Aug 22 22:10:03 1999
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
	by purebytes.com (8.8.7/8.8.7) with ESMTP id TAA08020
	for <neal@xxxxxxxxxxxxx>; Sun, 22 Aug 1999 19:56:35 -0700
Received: (from majordom@xxxxxxxxx)
	by listserv.equis.com (8.8.7/8.8.7) id KAA30593
	for metastock-outgoing; Mon, 23 Aug 1999 10:48:57 -0600
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
	by listserv.equis.com (8.8.7/8.8.7) with ESMTP id KAA30590
	for <metastock@xxxxxxxxxxxxxxxxxx>; Mon, 23 Aug 1999 10:48:54 -0600
Received: from hme0.mailrouter01.sprint.ca (hme0.mailrouter01.sprint.ca [207.107.250.16])
	by freeze.metastock.com (8.8.5/8.8.5) with ESMTP id UAA02192
	for <metastock@xxxxxxxxxxxxx>; Sun, 22 Aug 1999 20:39:09 -0600 (MDT)
Received: from walter (spc-isp-mtl-58-5-401.sprint.ca [149.99.141.148])
	by hme0.mailrouter01.sprint.ca (8.8.8/8.8.8) with SMTP id WAA22182
	for <metastock@xxxxxxxxxxxxx>; Sun, 22 Aug 1999 22:25:49 -0400 (EDT)
Message-ID: <001501beed0e$971df300$948d6395@xxxxxx>
From: "Walter Lake" <wlake@xxxxxxxxx>
To: <metastock@xxxxxxxxxxxxx>
References: <001b01beec35$75dea560$256d75ce@xxxxxxxxxxxx> <002501beecae$8d10b6a0$ae2167d1@xxxxxx> <002401beece6$af4f5e00$32b679c3@xxxxx>
Subject: Re: VB vs VBA
Date: Sun, 22 Aug 1999 22:24:11 -0400
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2314.1300
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:   

Hi Ton

Thanks for your hierarchy description.

You're right, I remember how much spare-time Metastock took up when I first
cracked it open. I guess that we have all been on "steep learning curves".
I'm going to avoid the web based functions in VB and stick strictly with
those lovely spinners and sliders, etc.

This site

http://www.mission-software.com/GettingStarted.htm

has a program similar to what I want to "tuck-into-bed" with Metastock and
Excel. I figure that with a few user forms and number crunching I can put
together a real "blivet" ... you know ... one of those patchworks with wires
hanging out the side.

Thanks again

Walter


----- Original Message -----
From: A.J. Maas <anthmaas@xxxxxxxxx>
To: <metastock@xxxxxxxxxxxxx>
Sent: Sunday, August 22, 1999 5:34 PM
Subject: Re: VB vs VBA
>
> Indeed, one must pocess plenty of spare-time, to be able to work with
these very advanced
> programs "that can truly program" and each slightly differ from oneanother
for "writing code".
> Thus, for simplicity sakes, to continue on (with automation programs):