Linux Security - The Community's Center For Security News Network Security, 5/14/2004 1152. Voice Over IP Can Be Vulnerable To Hackers,Too. Published By InformationWeek Posted By David Isecke 5/14/2004 1152. http://www.linuxsecurity.com/articles/network_security_article-9303.html
Extractions: Secure Mail Suite: Real-time virus protection, real-time results. As voice over IP sweeps across the high-tech landscape, many IT managers are being lulled into a dangerous complacency because they look upon Internet phoning as a relatively secure technologynot as an IP service susceptible to the same worms, viruses, and other pestilence that threatens all networked systems. "With VoIP," security specialist Mark Nagiel said Thursday in an interview, "we're inserting a new technology into an unsecured and unprotected environment. VoIP is essentially availability driven, not security driven, and that's the problem." But Nagiel, manager of security consulting at NEC Unified Solutions, said that there are measures that can be taken to protect voice over IP from the threats that confront Web telephoning. The first stepan obvious one, he saysis to secure existing TCP/IP networks. Nagiel is finding that the new government-required regulationssuch as Sarbanes-Oxley, which stipulates improved accounting record-keeping, and HIPAA in health careare helping IT managers because they impose security discipline across-the-board. "The financial and health-care fields are getting secured very quickly," Nagiel said.
't Klaphek Deze opvolger van Hacktic is een blad voor Nederlands Hackers en phreakers, hoewel er al een tijd geen nieuwe editie is uitgebracht. Daarnaast is er op de site een aantal programma's te vinden. http://www.klaphek.nl/
Rootsecure.net | Definition | Hacker Rootsecure . net. The Security News Site For Systems Administrators Hackers, Monday, 17th May 2004 @ 032923 GMT. http://www.rootsecure.net/?p=definition_hacker
Extractions: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites (CNN) Emmanuel Goldstein is the editor-in-chief of 2600: The Hacker Quarterly and hosts a weekly radio program in New York called "Off the Hook." 1. How do you define hacking? Hacking is, very simply, asking a lot of questions and refusing to stop asking. This is why computers are perfect for inquisitive people they don't tell you to shut up when you keep asking questions or inputting commands over and over and over. But hacking doesn't have to confine itself to computers. Anyone with an inquisitive mind, a sense of adventure and strong beliefs in free speech and the right to know most definitely has a bit of the hacker spirit in them. 2. Are there legal or appropriate forms of hacking?
Extractions: Alex, (played by Malcolm McDowell) the narrator of A Clockwork Orange, is the dictatorial leader of a quartet of droogs, a vicious group of young hoodlums who spend their nights stealing, fighting, breaking into houses, killing and raping. Alex, however, is not just some uncivilized ruffian. He absolutely cherishes the music of Ludwig von Beethoven and in particular his 9th Symphony. As the film begins, the Alex and his droogs are preparing to go on one of their nightly rampages through the streets of the city. However, Alexs incarceration does not last long as he is chosen for a controversial rehabilitation treatment, designed to curb violence and sexual behavior, enabling a prisoner to leave prison after only two weeks. Doctors administer Alex a drug that simulates a death-like nausea while he is strait-jacketed and physically forced (with his eyelids clamped open) to watch films depicting scenes of violence, thereby associating the violence with the feeling of death. An unfortunate consequence of the treatment is that the scenes were set to the music of Beethoven, eliciting a similar association between death and Beethoven's music. Following his treatments, Alex is paraded in front of a room of political leaders where he is forced to endure a variety of humiliations. When Alex attempts to act violently according to his instincts, he is overcome with the death sickness and he is forced to give up.
Omaha 2600 Offers local meeting schedule and venue announcements and Hackers guide. http://omaha2600.org/
Extractions: By James Evans (IDG) A Brazilian band of hackers known as Prime Suspectz defaced four Microsoft Corp. Web sites last week, according to Attrition.org, a Web site that documents hacks. The hackers defaced the MSNBC Sports Scoreboard site and evidence of the hack was still apparent as of Friday morning, according to a mirror image of the site defacement. Prime Suspectz slapped a picture of a nuclear explosion, tagged the image with the Prime Suspectz logo and offered a caption that partially read in Portuguese: "Prepare yourself for the Prime Suspectz marathon." MESSAGE BOARD Security on the Net
Extractions: We WILL NOT answer emails from anyone asking about illegal activities, or how to use our products for illegal activities...they will automatically be deleted. All products are designed for testing and exploring the vulnerabilities of CUSTOMER-OWNED equipment, and no illegal use is encouraged or implied. We WILL NOT knowingly sell to anyone with the intent of using our products for illegal activities or uses. It is your responsibility to check the applicable laws in your city, state, and country. At this time we DO NOT have any distributor relationships set up with any company or Web site. Consequently, beware of sites that: 1) claim to be distributors of our products, 2) use our name and logo without permission, 3) download and use our HTML files without permission. The bottom line is: Know who you're dealing with before you send payment.
Extractions: (IDG) The war in Kosovo has intensified as hackers on either side of the conflict try to take over or block Web servers around the world. The federal government said today that Chinese hackers have joined the online war, targeting U.S. government sites over the accidental bombing of the Chinese embassy in Belgrade last Friday. Web sites at the departments of Energy and the Interior and the National Park Service were hijacked on Sunday by intruders claiming to be from mainland China. The Department of Energy (DOE) has sent an alert to other federal agencies and defense contractor warning them of possible mailbombing attacks from China. Meanwhile, the White House shut down www.whitehouse.gov for three days because of security concerns stemming from a non-stop denial-of-service attack. The site only came back up this morning.
Extractions: by Jeff Sengstack (IDG) It was getting late, so Jim Jarrard, president of Cinenet, a stock film footage company in Simi Valley, California, decided to leave his computer on overnight to finish downloading a big file. While Jarrard was gone, a hacker accessed his PC over its DSL Internet connection and loaded a program giving the intruder power to commandeer Jarrard's computer, steal valuable film files, and erase the system's hard drives. Allan Soifer, an Ottawa, Ontario, electronic mailing list administrator, didn't realize a distant hacker had been scanning his home PC for hours. The hacker had found a way in and needed only a password to access Soifer's files. So he pelted the machine with computer-generated words, hoping for a lucky match. Fortunately, neither of the hackers got the goods.
Cyberpunks And Hackers Cyberpunks and Hackers. Cyberpunks. Being a cyberpunk is a lifestyle.Cyberpunks culture. Hackers. Hackers come in many flavors days. http://www.accessorl.net/~cyberwar/cybpunk.htm
Extractions: Cyberpunks and Hackers Cyberpunks Being a cyberpunk is a lifestyle. Cyberpunks are hackers, crackers, and phreakers. Just being a webhead or computer geek is not enough. To really qualify you must be able to not only make computers do what you want, but make them do it when they were told to do something else ie: hacking and cracking. The big difference between a Cyberpunk and a computer geek is in attitude! The cyberpunks are at the core of this thing we call the net. Cyberpunks spend way to much time at their computers. Remember the net has around for a long time, the only thing that has changed is that there are now a lot more people using it. The first use of "cyberpunk" to describe a type of literature is credited to Gardner Dozois, who was the editor of Isaac Asimov's Science Fiction Magazine in the the early '80s. He got it from the title of a short story by Bruce Bethke, "Cyberpunk". The author William Gibson problably the most widely known cyberpunk author. He wrote the trilogy Neuromancer, Count Zero, and Mona Lisa Overdrive
Extractions: By Joris Evers AMSTERDAM, The Netherlands (IDG) Dutch hackers on Tuesday defaced the Safer Internet Exchange, a Web site sponsored by the European Commission that promotes a safer Internet. Security at the site had been increased last week after other hackers raised a red flag about possible vulnerabilities. The cybervandals left a message taunting the server administrators and law enforcement and inserted two hyperlinks, one to a Web site for Hackers at Large 2001, an event to be held in the Netherlands in August, and one to a database elsewhere on SaferInternet.org. The database, which can be downloaded by following the link, contains about 475 e-mail addresses of people who subscribe to the SaferInternet.org mailing list, according to a security expert who examined the database and requested anonymity. IDG.net INFOCENTER