HNS Newsletter Issue 53 - 04.03.2001 http://net-security.org http://security-db.com This is a newsletter delivered to you by Help Net Security. It covers weekly roundups of security events that were in the news the past week. Visit Help Net Security for the latest security news - http://www.net-security.org. Subscribe to this weekly digest on: http://www.net-security.org/text/newsletter Archive of the newsletter in TXT and PDF format is available here: http://www.net-security.org/news/archive/newsletter Current subscriber count to this digest : 1979 Table of contents: 1) General security news 2) Security issues 3) Security world 4) Featured articles 5) Featured books 6) Security software 7) Defaced archives General security news --------------------- ---------------------------------------------------------------------------- ONE-STOP SECURITY? IT managers looking for one-stop security shopping may soon have more superstores to visit. But whether that will mean a more secure enterprise is uncertain. The one-stop security shop is not a new strategy, nor a proven one. Network Associates Inc. went on a vigorous two-year acquisition spree to offer customers soup-to-nuts security only to scrap the plan last year. This time, Vigilinx Inc., a New York-based security consultancy, is giving it a try. Last week, it acquired its second company of this year, LogiKeep Inc., for its security assessment software. Last month, the company acquired IF SEC, another security consulting company, and it has at least one more acquisition pending, officials said. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.com/eweek/stories/general/0,11011,2689558,00.html MR LEGOLAND WINDSOR BANGED UP An Internet fraudster was jailed for a year today after wangling credit card details out of surfers by starting bogus sites under the names of famous companies. Craig Cottrell, also known by the name of Legoland Windsor, received the sentence after Marks & Spencer took matters into its own hands and marched him to the High Court. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.theregister.co.uk/content/8/17186.html INFORMATION DISCOVERY BASICS AND PLANNING This is the seventh installment in SecurityFocus.com's Field Guide for Investigating Computer Crime. The previous installment in this series, "Search and Seizure, Evidence Retrieval and Processing", concluded the overview of search and seizure with a discussion of the retrieval and processing of computer crime scene evidence. In this installment, we will begin our discussion of information discovery, the process of viewing log files, databases, and other data sources on un-seized equipment, in order to find and analyze information that may be of importance to a computer crime investigation. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.securityfocus.com/focus/ih/articles/crimeguide7.html GOVERNMENT E-SECURITY MEASURES INADEQUATE The Government's attempt to fight hackers through the latest anti-terrorism legislation is flawed, according to legal and network security experts. Critics claim that the legislation covers attacks on utilities and hospitals, but has no provision for the prosecution of a cyber terrorist who attacks a bank or business. Link: http://www.computerweekly.com/cwarchive/daily/20010227/cwcontainer.asp?name=C2.HTML&SubSection=6&ct=daily IS HACKER CULTURE A HELP OR HINDRANCE? Everyone knows there's a hacker culture among Linux users. On the whole it's a good thing. However, there are times when it is counterproductive. While many Linux users get by without ever writing a line of code, it's fair to say that, compared with other operating systems, programming plays a much more important role. Before going further, let's be absolutely clear about definitions. Hackers are the clever, possibly mad, yet strangely dedicated people who stay up all night stringing bits of code together. Hacking is about getting noughts and ones to dance and sing. Hacking should not be confused with digital vandalism or other illegal acts - that's something else altogether. Linux could not exist without hackers." Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.linuxtoday.com.au/r/article/jsp/sid/664917 CONTENT BLOCKING IN CHINA The Ministry of Public Security has released new software designed to keep "cults, sex and violence" off the Internet in China, a police official said. Link: http://www.technewsworld.com/story/?sn=949538 'I HIRED A HACKER' Computerworld has a story entitled 'I Hired a Hacker': A Security Manager's Confession', where Mathias Thurman writes about how he found about security hole, which made all the private information on his company's server public. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.computerworld.com/cwi/story/0,1199,NAV47_STO58018,00.html SPACE-SEEKING HACKER TAKES FILES A Web surfer in Sweden got into an unprotected Indiana University computer, removing more than 3,000 student names and identification numbers while leaving behind a cache of downloaded music files. University officials believe the student data was taken by accident, since the person was looking for computer space to store the MP3 files. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.wired.com/news/culture/0,1284,42051,00.html A SHOT IN THE ARM FOR NET VIRUS FIGHTERS The scientists analyzed the statistical incidence of more than 800 computer viruses and found that they lived much longer than current theories predicted - in some cases up to three years. Because "vaccines" for most viruses are usually available within hours or days, the network theoretically should be totally protected within weeks. But that's not what actually happens. PC viruses continue to infect a small but persistent percentage of computers. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.newsbytes.com/news/01/162479.html MAGIC NUMBERS AND RSA DON'T MIX! A recent item on the Bugtraq mailing list, which advises people of security flaws in popular software, has warned of a flaw in the way earlier versions of the SSH protocol use RSA for encryption. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://securityportal.com/articles/magicnumbers20010227.html SRP: PART DEUX "It's been over a year since I spoke to Tom Wu about SRP. In that time it would appear he's been hard at work, like a beaver on crystal meth, and it's starting to pay off. SRP still has a long trip ahead of it, however. For a protocol to gain wide acceptance there need to be many implementations and available software packages that support it. Of course that usually doesn't happen until it's widely accepted. Hopefully in the near future we'll see more vendors shipping SRP support in telnet and so on." Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://securityportal.com/closet/closet20010228.html SQL SERVER 6.5 SECURITY MODES In this article, Alexander Chigrik shows you the various security models in SQL Server 6.5 and how to change models after installation. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.swynk.com/friends/achigrik/SQL65SecurityModes.asp TREK 2000 THUMBDRIVE SECURE REVIEW Radeonic has posted a review of the aptly named Trek 2000 Thumbdrive Secure storage device which is pretty tiny and can store anywhere from 8 to 512MB with USB connectivity. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.radeonic.com/tdrive.htm ACTIVISTS TARGET BANK'S WEB SITE Hacktivists have targeted the Web site of a US investment bank which saved a controversial drug testing company from liquidation with an attack designed to make its site unavailable. The Web site of investment bank Stephens, which provides finance for Huntingdon Life Sciences, was yesterday subject to an attempted "virtual sit-in" by cyberactivists using a tool called Floodnet. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.theregister.co.uk/content/8/17243.html TOO MUCH SECURITY IS HOLDING BACK ECOMMERCE Evidian, a subsidiary of Groupe Bull, has completed a survey of 40 blue chip companies and found that two in five of them think complicated security is "the most irritating aspect of conducting business online". Multiple password entry and excessive authorisation procedures were recorded as particular irritants to respondents to Evidian's survey, ahead in annoyance of factors like downtime and poor customer service in doing business online. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.theregister.co.uk/content/8/17242.html VIRUS PROTECTION FOR SMALL ENTERPRISES With the recent proliferation of .VBS exploits, virus protection for small enterprises has become increasingly important. After a recent outbreak of the VBS.plan virus at his company, SecurityFocus writer Chris Jackson conducted a review of his organization's procedures in order to assess their network's security against viruses. This article represents an analysis of a virus outbreak at the firm, including a breakdown of how the outbreak occurred, what conditions facilitated the outbreak, and what could have been done to protect the firm against outbreak. It is hoped that this analysis will provide some insight into what other small to medium sized enterprises can do to avoid a similar incident. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.securityfocus.com/focus/virus/articles/smallent.html ANTICRYPTOGRAPHY Ever since Mosaic, the computer industry has been obsessed with cryptography. The crusade to put strong encryption technology in the hands of ordinary computer users is a noble and important cause. Yet in our obsession with encryption and electronic anonymity, we've overlooked something equally important, the idea of creating complex messages that decode themselves. Anticryptography is based on the idea of making a message that decodes itself. The goal in anticryptography is to create a message that can be easily deciphered, even by somebody (or something) who has no prior knowledge of how the message is composed or what information it contains. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.oreilly.com/news/seti_0201.html UPDATING A BSD/OS SYSTEM WITH MODS BSDi's BSD/OS has an easy-to-use system for updating a system with important fixes. It is especially useful for administrators who do not want to (or can not) compile the entire system. In addition, the BSD/OS patches are able to back out to undo changes. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.bsdtoday.com/2001/February/Features422.html NETWORK MONITORING, ACCESS CONTROL, AND BOOBY TRAPS TCP Wrappers is one of the most common methods of access control on your Unix box. A wrapper program 'wraps' around existing daemons and interfaces between clients and the server. Good access control and logging are strong points. In this first part, we introduce you to the concept behind TCP Wrappers. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.freeos.com/articles/3729/ A BRIEF HISTORY OF COMPUTER HACKERISM The staff at Linux.com are proud to publish the first of four excerpts from the acclaimed new work, "The Hacker Ethic and the Spirit of the Information Age" by Pekka Himanen, Linus Trovalds and Manuel Castells. Link: http://www.linux.com/news/newsitem.phtml?sid=1&aid=11832 FUNDS FOR E-GOVERNMENT, COMPUTER SECURITY Trillion-dollar tax cut notwithstanding, President Bush recommends hiking federal spending for e-government and computer security initiatives in his proposed budget, released by the White House. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.newsbytes.com/news/01/162551.html ZEN AND THE ART OF BREAKING SECURITY - PART I Designing a secure solution, be it a protocol, algorithm or enterprise architecture, is far from trivial. Apart from the technical or scientific difficulties to overcome, there is a mental trap easy to fall into: looking at the picture through the eyes of the designer. The designer often works with concepts, not with the real thing. We look at an algorithm's specifications and we mistake it for its implementation in a particular program. We read several RFCs and we say, this is TCP/IP. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://securityportal.com/articles/zenandsecurity20010301.html NETWORK MANAGERS RAPPED OVER LAX SECURITY Network managers have been ignoring warnings to download a Microsoft security patch and have been hammered by attackers over the last few weeks as a result. Intel, Hewlett Packard, Compaq, Gateway and the New York Times were all attacked because they used unpatched versions of Netscape Enterprise Server or Microsoft IIS. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.vnunet.com/News/1118379 PRIVACY AT WORK? BE SERIOUS If you feel your privacy at work has been eroding lately, it's probably more than just your imagination. Experts say companies are under increasing pressure to monitor employees electronically, and workers should assume they are being watched. Concerns about liability in harassment suits, skyrocketing losses from employee theft, and productivity losses from employees shopping or peeping at porn from their cubicles have led to an explosion in the number of companies conducting some form of electronic monitoring on their employees. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.wired.com/news/business/0,1367,42029,00.html SAN SECURITY ARCHITECTURES Security within the monitoring and management of storage and storage area network devices is still evolving and still somewhat limited. Progress is being made and it would be advantageous to emulate current security practices incorporated within the LAN/WAN arenas. Until then, storage managers should use every and any available method to carefully defend their devices. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://industry.java.sun.com/javanews/stories/story2/0,1072,35188,00.html SEC ATTACKS ONLINE SCAMMERS Federal securities regulators have taken action against con artists who used Internet and e-mail campaigns to perpetrate some rather old-fashioned investment scams. On Thursday, the U.S. Securities and Exchange Commission filed charges against 23 companies and individuals who used spam e-mails, phony Internet press releases, fallacious message board postings and other online means to pump up stock prices and defraud investors. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.wired.com/news/politics/0,1283,42107,00.html LINUX 2.4: NEXT GENERATION KERNEL SECURITY This document outlines the kernel security improvements that have been made in the 2.4 kernel. A number of significant improvements including cryptography and access control make 2.4 a serious contender for secure corporate environments as well as private virtual networking. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.linuxsecurity.com/feature_stories/kernel-24-security.html SYMANTEC TO OFFER SMS NOTIFICATION OF VIRUSES Symantec in the second quarter of this year will offer live notification of Internet borne viruses and virus fixes to its customers outside North America and Europe, using Short Message Service to send alerts to mobile phones. The company also plans to offer the new service to some customers in the U.S. and Europe. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.cnn.com/2001/TECH/internet/03/01/symantec.SMS.idg/index.html TRUSTIX SECURE LINUX 1.2 [REVIEW] Trustix Secure Linux is a distribution that has one focus and one focus only - to provide a server distribution that is secure. There are no frills with this distribution. When you install Trustix, you very quickly realize that you are on the business end of the server. There is no GUI, nor are there any real configuration tools. What you get is very close to a traditional UNIX server. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.thedukeofurl.org/reviews/misc/trustix12/ ARE U.S. AGENCIES HACKER-PROOF? A congressional subcommittee asked 15 federal agencies Friday to report how they've been testing and securing their computer systems from outside attack. Under a federal law passed last year, agencies have to do their own security testing and hire an outside auditor to do "penetration testing," in which hackers are paid to try to break into a network. Its passage came amid a flurry of reports that federal computers were open to devastating attacks. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.wired.com/news/politics/0,1283,42148,00.html STUDY: DOMAIN NAME SYSTEM SECURITY STILL LAX Companies rushed to upgrade Domain Name System software after warnings were issued in late January about a flaw in widely used DNS software. In the past weeks, however, upgrading has come to a halt, concludes the Iceland DNS consultancy and software firm Men & Mice. Men & Mice tested the DNS systems for the Web sites of Fortune 1000 companies and random, .com domains at set dates after the alerts were released. The results were made public on the company's site. The CERT at Carnegie Mellon University, meanwhile, said this week that it has begun receiving reports of Berkeley Internet Name Domain (BIND) holes being successfully exploited. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.cnn.com/2001/TECH/internet/03/02/lax.on.DNS.idg/index.html LEARN ABOUT SAMBA Want to know what Samba is? Want to know how to integrate Linux into a Windows network? Join #linux.com-live! on irc.openprojects.net to answer these questions and more. When? March 14th at 6:00 pm US/Pacific time. 12 KEYS FOR LOCKING UP TIGHT In a perfect world, a bit of common sense and a dash of due diligence would protect us from hackers, saboteurs and the common cold. Well, the world isn't perfect, and we know we can never be completely secure. There is a measure of safety to be gained by following a formula of threat education, security breach prevention and risk mitigation. "There's no single answer," says Bruce Schneier, CTO of security consultancy Counterpane Internet Security. "I can't say, 'Do these seven steps and you'll be magically secure.'" Although every organization's security infrastructure must be unique to be effective, Schneier and other experts point to the following essential ingredients. Pay close attention to these basic security issues. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.cio.com/archive/030101/keys.html MICROSOFT MAY DISABLE UPGRADED PCS Users who upgrade their PCs may find they will not work when switched back on, under the software giant's plan to use an artificial intelligence engine to deactivate illegal copies of Windows XP. Microsoft's Windows XP will control how many times users can reinstall the operating system by using an artificial intelligence engine, similar to those used to monitor credit card transactions, it emerged this week. Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.co.uk/news/2001/8/ns-21343.html ---------------------------------------------------------------------------- Security issues --------------- All vulnerabilities are located at: http://net-security.org/text/bugs ---------------------------------------------------------------------------- THE SIMPLE SERVER HTTPD VULNERABILITY Adding the string "/../" to an URL allows an attacker to view any file on the server provided you know where the file is at in the first place. Link: http://www.net-security.org/text/bugs/983288289,59607,.shtml LACK OF SECURITY ON IBM HOST ON DEMAND "A major healthcare organization asked my employer's tech support staff to start using an IBM Host on Demand server to access their hospital's critical systems to provide support. While using Ethereal to watch one of our tech support people use this service, I made a few disturbing observations." Link: http://www.net-security.org/text/bugs/983288309,36674,.shtml LINUX MANDRAKE - ZOPE UPDATE A new Hotfix for Zope has been released that fixes a very important security issue that affects all versions of Zope prior to and including 2.3.1b1. Users can use through-the-web scripting capabilities on a Zope site to view and assign class attributes to ZClasses, possibly allowing them to make inappropriate changes to ZClass instances. As well, perceived security problems with the ObjectManager, Property Manager and PropertySheet classes have been fixed as well. It is highly recommended that all Linux-Mandrake users using Zope upgrade to these new packages immediately. Link: http://www.net-security.org/text/bugs/983364382,86386,.shtml RED HAT LINUX - NEW ZOPE PACKAGES Link: http://www.net-security.org/text/bugs/983288428,22428,.shtml CONECTIVA LINUX - ZOPE UPDATE http://www.net-security.org/text/bugs/983591051,6556,.shtml TRUSTIX - SUDO UPDATE "sudo" is a program used to delegate superuser privileges to ordinary users and only for specific commands. There is a buffer overflow vulnerability in sudo which could be used by an attacker to obtain higher privileges. Link: http://www.net-security.org/text/bugs/983288461,42454,.shtml LINUX MANDRAKE - SUDO UPDATE Link: http://www.net-security.org/text/bugs/983288493,43832,.shtml CONECTIVA LINUX - SUDO UPDATE Link: http://www.net-security.org/text/bugs/983288542,17892,.shtml SLACKWARE - SUDO UPDATE Link: http://www.net-security.org/text/bugs/983288600,96836,.shtml IMMUNIX OS - SUDO UPDATE Link: http://www.net-security.org/text/bugs/983368835,52950,.shtml ORANGE WEB SERVER V2.1 DOS Orange Web Server v2.1 is vulnerable to a very simple Denial of Service attack where its possible to cause the server to shut down at once and cause a invalid page fault. Link: http://www.net-security.org/text/bugs/983368813,42791,.shtml A1 SERVER V1.0A HTTPD VULNERABILITIES A1 Server v1.0a is vulnerable to a nasty Denial of Service attack where it can be flooded with useless junk until the server crashes promptly. Once it has been crashed it needs to be restarted again for it to work properly. All windows versions apear to be affected. Link: http://www.net-security.org/text/bugs/983368906,39469,.shtml JOE'S OWN EDITOR FILE HANDLING ERROR joe looks for its configuration file in ./.joerc (CWD), $HOME/.joerc, and /usr/local/lib/joerc in that order. Users could be tricked into execute commands if they open/edit a file with joe in a directory where other users can write. Link: http://www.net-security.org/text/bugs/983410681,78639,.shtml SLACKWARE HAS UPDATED IMAPD A remote exploit exists for the previously included version of imapd, so all sites running imapd are urged to upgrade to the new version immediately. Note that imapd has been installed to run by default in previous versions of Slackware, including 7.1. Link: http://www.net-security.org/text/bugs/983411116,25599,.shtml SURGEFTP DENIAL OF SERVICE Due to a design issue in the SurgeFTP server a denial of service condition exists in it which could allow any user with local or shell access to the host to crash the server. The problem resides in the local handling of the directory listing command, which after first being successfully initialized will die if followed by a "malformed" request. Link: http://www.net-security.org/text/bugs/983590606,62264,.shtml VULNERABILITY IN TYPSOFT FTP SERVER A vulnerability exists which allows a remote attacker to break out of the ftp root using relative paths (ie: '...'). Link: http://www.net-security.org/text/bugs/983477514,3945,.shtml VULNERABILITY IN FTPXQ SERVER A vulnerability exists which allows an attacker to download files outside the ftp root. Link: http://www.net-security.org/text/bugs/983590668,76525,.shtml VULNERABILITY IN SLIMSERVE FTPD A vulnerability exists which allows an attacker to break out of the ftp root using relative paths (ie: '...'). Link: http://www.net-security.org/text/bugs/983590732,23207,.shtml CALDERA - BUFFER OVERFLOW IN /BIN/MAIL There is a buffer overflow in /bin/mail which allows a local attacker to read, modify and delete mails of other users on the system. Link: http://www.net-security.org/text/bugs/983591002,3815,.shtml RED HAT LINUX - UPDATED JOE PACKAGES When starting, joe looks for a configuration file in the current working directory, the user's home directory, and /etc/joe. A malicious user could create a .joerc file in a world writable directory such as /tmp and make users running joe inside that directory using a .joerc file that is customized to execute commands with their own userids. The current working directory has been removed from the list of possible directories with the .joerc configuration file. Link: http://www.net-security.org/text/bugs/983591090,68864,.shtml WINZIP32 ZIPANDEMAIL BUFFER OVERFLOW The /zipandemail option in winzip contains a buffer overflow flaw when handling very long filenames. The EIP is overwritten and a carefully crafted filename could allow for execution of arbitrary code. The probability of this happening "in the wild" is very low, as the overflow only triggers if winzip is used with this option. Theoretically, this could occur when a .jpg with a malformed filename is 'zipped and emailed'. Alternatively if an attacker managed to place a malicious file in the log directory on an automated logging system´ then the automated zipping and emailing of the log would trigger the overflow. Link: http://www.net-security.org/text/bugs/983591239,59525,.shtml ---------------------------------------------------------------------------- Security world -------------- All press releases are located at: http://net-security.org/text/press ---------------------------------------------------------------------------- SECURITY VISIONARIES LAUNCH CORRENT CORP. - [26.02.2001] Corrent Corp., a semiconductor start-up company founded by a group of leading visionaries in the Internet security field, Monday announced the formal launch of its operations and the opening of its headquarters in Tempe. The company is developing a family of high-performance security processors based on a new patent-pending architecture designed specifically for securing the exchange of private Internet information in next-generation optical network systems. Press release: < http://www.net-security.org/text/press/983189279,31735,.shtml > ---------------------------------------------------------------------------- NOKIA EXPANDS FAMILY OF VPN SOLUTIONS - [26.02.2001] Nokia announced the expansion of its award winning line of VPN solutions for seamless network connectivity. The extended offering includes the new Nokia CC5205 Gigabit Ethernet VPN appliance and Windows 2000-compliant Nokia VPN Policy Manager. This expansion addresses the demands of enterprise customers everywhere by providing high performance, encryption processing power, unlimited network scalability and bulletproof reliability. Nokia's extended VPN line further demonstrates Nokia's commitment to delivering a new level of security and reliability. Press release: < http://www.net-security.org/text/press/983189470,83180,.shtml > ---------------------------------------------------------------------------- WELLMED SELECTS PGP SECURITY - [26.02.2001] PGP Security, a Network Associates business, announced that WellMed, Inc., a leading provider of online consumer health management tools, has chosen PGP Security's E-Business Server to secure the transfer of personal health information. Health care organizations, self-insured employers, pharmaceutical companies and consumer Web sites license the WellMed Personal Health Manager to empower their members and employees with personalized, up-to-date, accessible health information, self-care tools and communication channels. The Personal Health Manager enables individuals to check their health status, store personal health records, identify their health risks and obtain accurate, detailed information relevant to their unique needs in a private and secure environment. Press release: < http://www.net-security.org/text/press/983197382,70931,.shtml > ---------------------------------------------------------------------------- MICROSOFT SUPPORTS COMMITMENT TO SECURITY - [26.02.2001] Today at the InfoSec World security trade show in Orlando, Microsoft Corp. announced the general availability of its enterprise firewall and Web cache, Internet Security and Acceleration (ISA) Server, along with more than 30 add-on security solutions that extend and tailor networks to customers' IT security needs. In addition, the recently announced Microsoft(R) Security Services Partner Program, which gives customers a place to turn for immediate network security support, has been extended to include support for ISA Server. Press release: < http://www.net-security.org/text/press/983197468,21074,.shtml > ---------------------------------------------------------------------------- BOOSTING BEA WEBLOGIC SERVER 6.0 SECURITY - [26.02.2001] Entegrity Solutions(R) Corporation, a leader in application security software and services, today announced support for BEA WebLogic Server(R) 6.0, the industry's most advanced Java application server. Entegrity AssureAccess boosts the native security of WebLogic Server, providing businesses with integrated single sign on (SSO) for Web and application server environments. AssureAccess also provides centrally managed and policy-based access management for WebLogic application security that scales to meet the high-volume demands of mission-critical application servers and Web servers. Press release: < http://www.net-security.org/text/press/983197585,73630,.shtml > ---------------------------------------------------------------------------- FIRST ANNUAL SECURITY EXCELLENCE AWARDS - [27.02.2001] Information Security magazine announced yesterday the winners of its first annual Information Security Excellence Awards. Selected via online balloting by the magazine's subscribers, the winning info security products and services represent the "best-in-class" solutions in each of eight categories. "Combating the constant barrage of cyber threats to corporate networks and information resources requires robust, time-tested security solutions," says Andy Briney, editor-in-chief of Information Security. "The winning products and services represent, in our readers' estimations, the best-of-breed technologies for securing the enterprise." Press release: < http://www.net-security.org/text/press/983287711,95723,.shtml > ---------------------------------------------------------------------------- SECURANT SECURES BEA WEBLOGIC 6.0 - [27.02.2001] Securant Technologies, the company that secures eBusiness, announced here at BEA eWorld 2001 that the award winning ClearTrust SecureControl user access management system has been certified to seamlessly inter operate with and support the BEA WebLogic 6.0 application server platform. The 100 percent JAVA-based ClearTrust SecureControl product is the industry's only access management system that provides native integration for the BEA WebLogic Platform, via a plug-in module. This unique capability enables enterprises to centrally manage, from ClearTrust SecureControl, the security policies that govern user access permissions for all their BEA WebLogic applications - without writing any code. In addition, as new applications are developed and deployed they can be "snapped" into and immediately protected by ClearTrust SecureControl. Press release: < http://www.net-security.org/text/press/983287831,47464,.shtml > ---------------------------------------------------------------------------- NORTON ANTIVIRUS SUPPORTS WINDOWS ME - [27.02.2001] Symantec Corp., a world leader in Internet security technology, announced the availability of Norton AntiVirus Corporate Edition now including support for the Microsoft Windows Millennium Edition operating system. Symantec's Norton AntiVirus Corporate Edition, the first corporate anti-virus solution to support the Windows Me platform, is a key component of Symantec Enterprise Security, a comprehensive and modular Internet security solution for enterprise computing environments. "Symantec's Norton AntiVirus Corporate Edition, with support for the Microsoft Windows Millennium Edition Platform, is one more example of Symantec's leadership in providing its enterprise customers with the best protection possible against new and unknown threats," said Gail Hamilton, senior vice president, Enterprise Solutions Division, Symantec. Press release: < http://www.net-security.org/text/press/983287945,9365,.shtml > ---------------------------------------------------------------------------- BALTIMORE SECURES ERICSSON SMARTPHONE R380 - [27.02.2001] Baltimore Technologies, a global leader in e-security, and Ericsson, Inc., one of the leading mobile phone manufacturers, announced that Baltimore's digital certificate technology is embedded in the Ericsson smartphone R380 to allow secure and trusted transactions. This agreement enables Ericsson customers worldwide to benefit from advanced security and authentication features provided by the award winning Baltimore Telepathy wireless e-security product and service offering. Future Ericsson phones, such as the GPRS phone R520, will also be secured using Baltimore root certificates. Press release: < http://www.net-security.org/text/press/983288063,11640,.shtml > ---------------------------------------------------------------------------- VIGILANTE INTEGRATES NESSUS - [27.02.2001] VIGILANTe today announced the integration of the leading open-source security scanner, Nessus, into its premier automated Internet security assessment service, SecureScan. This addition to SecureScan bolsters an arsenal of commercially available, open- source and proprietary assessment tools. The combination of these tools with VIGILANTe's intelligent testing methodologies and reporting delivers the most advanced, automated, thorough, and reliable security assessment. "As a security service provider, we have recognized that one tool alone can not find all known vulnerabilities," said Michelle Drolet, CEO of CONQWEST Inc. By implementing best of breed tools into one integrated solution, SecureScan allows us to provide more comprehensive security assessments of our clients' environment. By automatically configuring the tests and compiling results into a single report, our invaluable security resources can focus on helping our companies resolve their security problems, not just testing." Press release: < http://www.net-security.org/text/press/983290634,416,.shtml > ---------------------------------------------------------------------------- PENTASAFE PARTNERS WITH BEA SYSTEMS - [27.02.2001] PentaSafe Security Technologies, Inc., the leading developer of enterprise security infrastructure solutions, announced a strategic marketing relationship with BEA Systems, Inc., one of the world's leading e-business infrastructure software companies. The relationship is announced in conjunction with the release of PentaSafe's VigilEnt Security Agent (VSA) for BEA WebLogic. VSA is designed to ensure security policy compliance for applications deployed on the BEA WebLogic Server platform, BEA's market- leading Java application server. VSA provides developers with exceptional security management capabilities that have never before been available on the market. Press release: < http://www.net-security.org/text/press/983290705,15978,.shtml > ---------------------------------------------------------------------------- MAXIMUM SECURITY CONFERENCE SPONSORING - [28.02.2001] As "maximum security" becomes the theme of the Web-enabled financial world, CyberGuard Corporation, the technology leader in network security, will co sponsor the Maximum Security conference slated for March 7-9, 2001 in San Francisco. Paul Henry, Director of Asian Operations for CyberGuard, will be presenting "Understanding and Applying the Ideal Firewall for your Network." "With new security threats constantly emerging, it is crucial for institutions to protect themselves as well as their customers by investing in the most current technologies," said Henry. Press release: < http://www.net-security.org/text/press/983369017,8744,.shtml > ---------------------------------------------------------------------------- CHECK POINT UNVEILS NEW USER INTERFACE - [28.02.2001] Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, announced a ground-breaking user interface that meets the industry's next generation Internet security requirements, including simplified security management for increasingly complex environments. Built upon Check Point's Secure Virtual Network (SVN) architecture, the Next Generation User Interface revolutionizes the way security administrators define and manage enterprise security by further integrating management functions into a security dashboard and creating a visual picture of security operations. The Next Generation User Interface delivers unparalleled ease-of-use, improved security and true end- to-end security management. Press release: < http://www.net-security.org/text/press/983369089,120,.shtml > ---------------------------------------------------------------------------- ORACLE LABEL SECURITY FOR US GOVERNMENT - [28.02.2001] Oracle Corp., the largest provider of software for e-business, announced the immediate availability of Oracle Label Security, a powerful Oracle9i Database option for controlling access to critical data. Developed for the U.S. government to protect highly confidential information, Oracle Label Security is now commercially available to organizations looking to achieve the right balance between sharing and securely separating data for confidentiality or privacy reasons. This option requires no programming and allows customers to use sensitivity tags, known as labels, to secure mission-critical data at the row level, instead of at the table level, whether the data resides within the e-business or at an online service provider's facility. Press release: < http://www.net-security.org/text/press/983369530,92213,.shtml > ---------------------------------------------------------------------------- SOPHOS: TOP TEN VIRUSES IN FEBRUARY - [01.03.2001] This is the latest in a series of monthly charts counting down the ten most frequently occurring viruses as compiled by Sophos, a world leader in corporate anti-virus protection. Press release: < http://www.net-security.org/text/press/983402714,63948,.shtml > ---------------------------------------------------------------------------- SOPHOS PARTNERS WITH IT DIRECT AT LLOYD'S - [01.03.2001] Sophos, a world leader in corporate anti-virus protection is partnering with IT Direct at Lloyd's to provide anti-virus software to more than 250 of the Lloyd's of London Market companies. This relationship sees IT Direct at Lloyd's providing Sophos Anti-Virus as part of its wide portfolio of technology products and services. Bob Blatchford, MD of IT Direct, said "It is our aim to ensure that every one of the Lloyd's Market companies has access to best-of-breed software and service at a competitive price. Our customers have requested the addition of Sophos Anti-Virus to our range due to its reputation for reliability and after-sales support." Press release: < http://www.net-security.org/text/press/983477655,72177,.shtml > ---------------------------------------------------------------------------- PROGINET SECURPASS SUPPORTS LDAP - [01.03.2001] Proginet Corporation, a leader in password management software and Internet file transfer software, announced that its SecurPass password management software product supports LDAP (Light Directory Access Protocol), the Internet standard for accessing inter-network directory services that has been universally endorsed by leading industry players. Proginet's responsiveness to the needs of today's global enterprises with SecurPass support of LDAP significantly expands the Company's reach into the security market, estimated at $3 billion, comprised of increasingly Internet-dependent enterprises. Press release: < http://www.net-security.org/text/press/983477704,29626,.shtml > ---------------------------------------------------------------------------- HIGH-PERFORMANCE SECURITY PROCESSOR - [01.03.2001] SonicWALL, Inc., a leading provider of Internet security solutions, announced its new high performance security processor. This custom Application Specific Integrated Circuit (ASIC) will be incorporated into SonicWALL's full line of Internet security appliances to create the industry's most advanced hardware platform for integrating firewall, VPN and a range of other value-added security services. SonicWALL will also license the ASIC to OEM partners to incorporate strong, high performance security into their networking and security products. Press release: < http://www.net-security.org/text/press/983477807,54779,.shtml > ---------------------------------------------------------------------------- SPONSORING INTERNET SECURITY CONFERENCE - [02.03.2001] The Internet Security Conference announced the addition of Interop, a Key3Media Group, Inc. brand, as a media sponsor for its upcoming conference to be held June 4-8, 2001 at the Century Plaza Hotel in Los Angeles. Interop is the world's leading brand in the networking, Internet and telecommunications event and educational marketplace, staging events such as NetWorld+Interop and Interop NetResults and the community resource interop.com. Press release: < http://www.net-security.org/text/press/983554019,88144,.shtml > ---------------------------------------------------------------------------- Featured articles ----------------- All articles are located at: http://www.net-security.org/text/articles Articles can be contributed to staff@net-security.org Below is the list of the recently added articles. ---------------------------------------------------------------------------- GNUTELLA USERS WARNING: BEWARE OF THE MANDRAGORE WORM! Kaspersky Labs announces the discovery of a new worm "Mandragore" spreading across the popular Gnutella file exchange network that uses the Peer-to-Peer technology. Read more: < http://www.net-security.org/text/articles/viruses/gnutella.shtml > ---------------------------------------------------------------------------- THE "LOVELETTER" NEVER DIES Kaspersky Labs warns computer users about the possible recurrence of the epidemic of the LoveLetter worm caused by its new modification - "Myba"! Kaspersky Lab has already received several reports of the worm "in-the-wild". Read more: < http://www.net-security.org/text/articles/viruses/loveletter.shtml > ---------------------------------------------------------------------------- Featured books ---------------- The HNS bookstore is located at: http://net-security.org/various/bookstore Suggestions for books to be included into our bookstore can be sent to staff@net-security.org ---------------------------------------------------------------------------- SSH, THE SECURE SHELL: THE DEFINITIVE GUIDE Secure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well. "Our book is written for all SSH users, from technically-inclined beginners up to experienced sysadmins. We begin with the basics for Unix (SSH, SSH2, OpenSSH, F-Secure) as well as Windows and the Mac. Then we go far beyond the SSH man pages, providing in-depth coverage of advanced topics." Book: < http://www.amazon.com/exec/obidos/ASIN/0596000111/netsecurity > ---------------------------------------------------------------------------- CISCO SWITCHING: BLACK BOOK A practical in-depth guide to configuring, operating, and managing Cisco LAN switches. Covers basic to advanced ISL, spanning tree, switch configuration, and switch technologies featuring Cisco's line of Catalyst switches. It's also an excellent guide for Cisco WAN and ATM switches. No other book thoroughly covers the advanced topics required to achieve this level of comprehensive Cisco knowledge or certification in the new CCNP and CCIE curricula. Book: < http://www.amazon.com/exec/obidos/ASIN/157610706X/netsecurity > ---------------------------------------------------------------------------- SATELLITE ENCRYPTION The book explains the need for secure satellite communications, including ways of implementing them, and discusses their implications (in business, government, and warfare). Author John Vacca focuses on United States satellite encryption policies. This is far more than a networking or government-policy text, though its contents have bearing upon wide area network (WAN) designers and legislators alike. Vacca explains the physics involved in getting a satellite into the most desirable orbit, the computing techniques used for cracking keys, and various key-escrow strategies (including Clipper). In addition, there's a lot of background information on national security topics other than satellite encryption, including missile-defense satellites and the purchase of dangerous military surplus by terrorist groups. There's a somewhat breathless warning of year 2000 mayhem, but Vacca's approach is generally very deliberate and informative. Topics covered: The importance of secure satellite communications, government encryption policies, implementation of satellite encryption, information-theft techniques, use and abuse of key-escrow schemes, and the role of satellite encryption in the future of business and government. Book: < http://www.amazon.com/exec/obidos/ASIN/0127100113/netsecurity > ---------------------------------------------------------------------------- LINUX SYSTEM ADMINISTRATION HANDBOOK More and more businesses are turning to Linux as a cost-effective, rock-solid solution for Internal networks and Internet connectivity. This is the first book that systematically teaches Linux system administrators the real-world skills they need to succeed. The Linux System Administration Handbook covers Linux networking, file service, E-mail, security, backups, print sharing, Web, FTP, NetNews, and much more.... Book: < http://www.amazon.com/exec/obidos/ASIN/0136805965/netsecurity > ---------------------------------------------------------------------------- LINUX: NETWORKING FOR YOUR OFFICE SOHO Linux Networking provides all the answers you need when setting up a Linux server in a SOHO (small office, home office) environment, or as a subnetwork off of a larger organization's network. This book combines information documented in existing Linux material such as HOWTOs, individual package documentation, and other books into a single package, complete with Red Hat Linux on CD. Book: < http://www.amazon.com/exec/obidos/ASIN/0672317923/netsecurity > ---------------------------------------------------------------------------- Security Software ------------------- All programs are located at: http://net-security.org/various/software ---------------------------------------------------------------------------- LANGUARD NETWORK SCANNER LANguard network scanner is a freeware security scanner to audit your network security. It scans entire networks and provides NETBIOS information for each computer such as hostname, shares, logged on user name. It does OS detection, tests password strength, detects registry issues and much more. Reports are outputted in HTML. Info/Download: < http://www.net-security.org/various/software/983589788,4876,windows.shtml > ---------------------------------------------------------------------------- PROGRAM LOCK PRO 2.0 Lock and unlock any program on your pc so it cannot be used. You can also choose your own message to display if anyone attempts to run one of your locked programs. Includes password protection so only you can unlock the program when you are ready to use it. Allows the entire PC to remain active and running, and it only locks and prevents access to the programs that you specify. Info/Download: < http://www.net-security.org/various/software/983589926,19650,windows.shtml > ---------------------------------------------------------------------------- IMSAFE 0.2.2 Imsafe is a host-based intrusion detection tool for Linux which does anomaly detection at the process level and tries to detect various type of attacks. Since Imsafe doesn't know anything about specific attacks, it can detect unknown and unpublished attacks or any other form of malicious use of the monitored application. Created for Linux systems but works on almost every UNIX flavor by watching strace outputs. Info/Download: < http://www.net-security.org/various/software/983590047,62882,linux.shtml > ---------------------------------------------------------------------------- QUICKENCRYPT V3.1 QuickEncrypt is a feature-packed, yet easy to use, file encryption utility. If you have files that you want to keep private, QuickEncrypt will help you achieve your goal. In short, it's simple enough for anyone to use right away, but it has a zillion configuration options that will satisfy the power user. Info/Download: < http://www.net-security.org/various/software/983590312,57629,mac.shtml > ---------------------------------------------------------------------------- MACWASHER V2.1 MacWasher is a powerful tool for covering your Internet tracks. Every time you use the Net, you're sending information about yourself and your online activities to people in the form of cookies. You are also leaving a potential gold mine of information about yourself on your Mac in places like e-mail cache files, history logs, etc. You are even leaving evidence of applications you recently used, etc. MacWasher "washes" all of these tracks away, including the ability to securely delete files using the approved techniques of the National Security Agency. While the interface is a little garish, such minor flaws are offset by the power and versatility of the program. A great tool for people concerned about security on the Net, or who want to make sure that they aren't leaving potentially damaging (or just embarrassing) evidence on their Mac. Info/Download: < http://www.net-security.org/various/software/983590427,59420,mac.shtml > ---------------------------------------------------------------------------- Defaced archives ------------------------ [26.02.2001] Original: http://www.sony.fr/ Defaced: http://defaced.alldas.de/mirror/2001/02/26/www.sony.fr/ OS: Windows Original: http://www.venezuela.gov.ve/ Defaced: http://defaced.alldas.de/mirror/2001/02/26/www.venezuela.gov.ve/ OS: Solaris Original: http://www.aiwa.com.pa/ Defaced: http://defaced.alldas.de/mirror/2001/02/26/www.aiwa.com.pa/ OS: Unknown Original: http://www.erd.gov.lk/ Defaced: http://defaced.alldas.de/mirror/2001/02/26/www.erd.gov.lk/ OS: Windows Original: http://html.it/ Defaced: http://defaced.alldas.de/mirror/2001/02/26/html.it/ OS: Windows [27.02.2001] Original: http://www.samsung.it/ Defaced: http://defaced.alldas.de/mirror/2001/02/27/www.samsung.it/ OS: Windows Original: http://www.israel.dk/ Defaced: http://defaced.alldas.de/mirror/2001/02/27/www.israel.dk/ OS: Unknown Original: http://www.casio.cl/ Defaced: http://defaced.alldas.de/mirror/2001/02/27/www.casio.cl/ OS: Windows Original: http://www.imi.gov.my/ Defaced: http://defaced.alldas.de/mirror/2001/02/27/www.imi.gov.my/ OS: Unknown Original: http://www.olivetti.ru/ Defaced: http://defaced.alldas.de/mirror/2001/02/27/www.olivetti.ru/ OS: Windows Original: http://www.oman-tv.gov.om/ Defaced: http://defaced.alldas.de/mirror/2001/02/27/www.oman-tv.gov.om/ OS: Windows Original: http://perldev.digitalcreators.com/ Defaced: http://defaced.alldas.de/mirror/2001/02/27/perldev.digitalcreators.com/ OS: Linux [28.02.2001] Original: http://www.feds.co.za/ Defaced: http://defaced.alldas.de/mirror/2001/02/28/www.feds.co.za/ OS: Windows Original: http://www.3wire.net/ Defaced: http://defaced.alldas.de/mirror/2001/02/28/www.3wire.net/ OS: Unknown Original: http://mothernature.com/ Defaced: http://defaced.alldas.de/mirror/2001/02/28/mothernature.com/ OS: Windows Original: http://www.shjpolice.gov.ae/ Defaced: http://defaced.alldas.de/mirror/2001/02/28/www.shjpolice.gov.ae/ OS: Unknown Original: http://www.rainforestalliance.com/ Defaced: http://defaced.alldas.de/mirror/2001/02/28/www.rainforestalliance.com/ OS: Windows Original: http://www.moeacgs.gov.tw/ Defaced: http://defaced.alldas.de/mirror/2001/02/28/www.moeacgs.gov.tw/ OS: Windows [01.03.2001] Original: http://www.coca-cola.it/ Defaced: http://defaced.alldas.de/mirror/2001/03/01/www.coca-cola.it/ OS: Windows Original: http://www.eti.gov.ee/ Defaced: http://defaced.alldas.de/mirror/2001/03/01/www.eti.gov.ee/ OS: Windows Original: http://www.funmrd.gov.ve/ Defaced: http://defaced.alldas.de/mirror/2001/03/01/www.funmrd.gov.ve/ OS: Linux Original: http://www.labor.gov.tw/ Defaced: http://defaced.alldas.de/mirror/2001/03/01/www.labor.gov.tw/ OS: Windows Original: http://www.eti.gov.ee/ Defaced: http://defaced.alldas.de/mirror/2001/03/01/www.eti.gov.ee/ OS: Windows Original: http://site4.nyc.gov.tw/ Defaced: http://defaced.alldas.de/mirror/2001/03/01/site4.nyc.gov.tw/ OS: Windows Original: http://www.faber-castell.com.au/ Defaced: http://defaced.alldas.de/mirror/2001/03/01/www.faber-castell.com.au/ OS: Windows Original: http://www.canon.com.br/ Defaced: http://defaced.alldas.de/mirror/2001/03/01/www.canon.com.br/ OS: Windows Original: http://www.burgerking.co.uk/ Defaced: http://defaced.alldas.de/mirror/2001/03/01/www.burgerking.co.uk/ OS: Windows [02.03.2001] Original: http://www.vipfe.gov.bo/ Defaced: http://defaced.alldas.de/mirror/2001/03/02/www.vipfe.gov.bo/ OS: Windows Original: http://uslocator.com/ Defaced: http://defaced.alldas.de/mirror/2001/03/02/uslocator.com/ OS: Windows Original: http://www.atlantica.fr/ Defaced: http://defaced.alldas.de/mirror/2001/03/02/www.atlantica.fr/ OS: Windows Original: http://www.health.gov.bh/ Defaced: http://defaced.alldas.de/mirror/2001/03/02/www.health.gov.bh/ OS: Windows Original: http://www.bible.org/ Defaced: http://defaced.alldas.de/mirror/2001/03/02/www.bible.org/ OS: Windows Original: http://www.intershop.nl/ Defaced: http://defaced.alldas.de/mirror/2001/03/02/www.intershop.nl/ OS: Windows [03.03.2001] Original: http://www.nameyourprice.co.uk/ Defaced: http://defaced.alldas.de/mirror/2001/03/03/www.nameyourprice.co.uk/ OS: Linux Original: http://www.health.gov.bh/ (Redefacement) Defaced: http://defaced.alldas.de/mirror/2001/03/03/www.health.gov.bh/ OS: Windows Original: http://www.goldencard.gov.cn/ Defaced: http://defaced.alldas.de/mirror/2001/03/03/www.goldencard.gov.cn/ OS: Solaris Original: http://www.sansui.co.jp/ Defaced: http://defaced.alldas.de/mirror/2001/03/03/www.sansui.co.jp/ OS: Windows Original: http://www.lordoftherings.gr/ Defaced: http://defaced.alldas.de/mirror/2001/03/03/www.lordoftherings.gr/ OS: Windows Original: http://www.usacpw.belvoir.army.mil/ Defaced: http://defaced.alldas.de/mirror/2001/03/03/www.usacpw.belvoir.army.mil/ OS: Windows [04.03.2001] Original: http://power.lucent.com/ Defaced: http://defaced.alldas.de/mirror/2001/03/04/power.lucent.com/ OS: Windows Original: http://www.xtnews.gov.cn/ Defaced: http://defaced.alldas.de/mirror/2001/03/04/www.xtnews.gov.cn/ OS: Unknown Original: http://www.alcatel.co.kr/ Defaced: http://defaced.alldas.de/mirror/2001/03/04/www.alcatel.co.kr/ OS: Windows Original: http://www.cdhb.gov.cn/ Defaced: http://defaced.alldas.de/mirror/2001/03/04/www.cdhb.gov.cn/ OS: Solaris ---------------------------------------------------------------------------- Questions, contributions, comments or ideas go to: Help Net Security staff staff@net-security.org http://net-security.org http://security-db.com