Berkeley CSUA MOTD:Entry 21921
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/25 [General] UID:1000 Activity:popular
5/25    

2001/7/24 [Computer/SW/Security] UID:21921 Activity:nil
7/23    All .mil sites no longer accessible to public!
        http://abcnews.go.com/sections/world/DailyNews/militarycyberattack_010723.html
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/05/25 [General] UID:1000 Activity:popular
5/25    

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
2012/4/23-6/1 [Computer/SW/WWW/Browsers] UID:54360 Activity:nil
4/19    My Firefox 3.6.28 pops up a Software Update box that reads "Your
        version of Firefox will soon be vulnerable to online attacks."  Are
        they planning to turn off some security feature in my version of
        Firefox?
        \_ Not as such, no, but they're no longer developing this version,
           so if a 3.6.x-targeted hack shows up, you're not going to get
	...
Cache (1981 bytes)
abcnews.go.com/sections/world/DailyNews/militarycyberattack_010723.html
Space Command, which provides security for military computers, instructed all military organizations to block public access after a number of sites had contracted the virus, called the "Code Red" bug, according to an official. The virus is known as a "denial of service" bug, because it replicates itself by reading the log files on a network server and sending copies to other servers -- thereby multiplying and sometimes crashing a system -- and denying access to legitimate users of the site. One version of the virus, experts say, emblazons on sites it attacks the message: "HELLO! The flaw was announced last month when a patch was released to fix it. Authorized Department of Defense personnel continue to have access to the sites, Venable said. Pike says he first noticed blocked access to some sites Thursday morning. The Defense Department then expended "enormous efforts" at containing and then recovering from that virus, with personnel across the military pulled away from their primary responsibilities, according to a subsequent congressional report. At Least 225,000 Computer Systems Believed Infected In recent weeks, variations of the virus are believed to have infected at least 225,000 business and institutional computer systems. Last Thursday, infected computers were 15 instructed to flood the White House Web site, but with minutes to spare the White House was able to protect itself. Venable could not say when public access to the sites would resume. The effectiveness of the Code Red virus in exploiting network weaknesses has been known by the military since June, according to Venable. The fact the military did not have the patch fully installed, and then its decision to block public access to all of its networks, was received uncharitably from a critic of the Pentagon's cybersecurity policies. Submit RELATED STORIES 20 Viruses Target White House and Consumers 21 Pentagon Braces for Chinese Computer Attacks 22 Hacktivists Plotting Over Spy Plane?