Berkeley CSUA MOTD:Entry 22162
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/04/07 [General] UID:1000 Activity:popular
4/7     

2001/8/18 [Computer/SW/Security, Computer/SW/WWW/Server] UID:22162 Activity:kinda low
8/17    On 18 July, just as Code Red was starting to scan for vulnerable
        web servers, a CSX train carrying hazardous materials was
        derailed in the Howard Street tunnel in Baltimore, US.
        The derailment and subsequent fire severed cables running through
        the tunnel used by seven of the biggest net service providers to
        swap data.
        These companies started reporting disruption to the usual running
        of the net just as Code Red was hitting its stride, leading many
        people to assume that the worm was doing the damage.
        Analysis by Keynote has shown that even at its height, Code Red
        posed no threat to the running of the net.
        (http://news.bbc.co.uk/hi/english/sci/tech/newsid_1470000/1470246.stm
        - anyone else hear about the fire?
        \_ yes
        \_ It was in the news on TV.  But I thought Code Red was later than the
           train accident.
           \_ What they DIDNT SAY, was that the train had a WBEM system,
              hosted under IIS, which caused the derailment once the
              web control interface crashed.
              \_ you gotta be kidding.
                 \_ muah-hahahahahaha.... the sad thing is, it's plausible, eh?
        \_ It was noted right away in the RISKS digest (aka comp.risks)
2025/04/07 [General] UID:1000 Activity:popular
4/7     

You may also be interested in these entries...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
2012/5/8-6/4 [Computer/SW/Unix] UID:54383 Activity:nil
5/8     Hello everyone!  This is Josh Hawn, CSUA Tech VP for Spring 2012.
        About 2 weeks ago, someone brought to my attention that our script
        to periodically merge /etc/motd.public into /etc/motd wasn't
        running.  When I looked into it, the cron daemon was running, but
        there hadn't been any root activity in the log since April 7th.  I
        looked into it for a while, but got lost in other things I was
	...
2012/4/23-6/1 [Computer/SW/WWW/Browsers] UID:54360 Activity:nil
4/19    My Firefox 3.6.28 pops up a Software Update box that reads "Your
        version of Firefox will soon be vulnerable to online attacks."  Are
        they planning to turn off some security feature in my version of
        Firefox?
        \_ Not as such, no, but they're no longer developing this version,
           so if a 3.6.x-targeted hack shows up, you're not going to get
	...
Cache (3638 bytes)
news.bbc.co.uk/hi/english/sci/tech/newsid_1470000/1470246.stm -> news.bbc.co.uk/1/hi/sci/tech/1470246.stm
The disruption of the net initially blamed on the worm was actually caused by a Baltimore tunnel fire, which melted key net cables and left many web companies struggling to swap data. Net monitoring firm Keynote said analysis showed that even when Code Red was at its most rampant last month it had almost no effect on net traffic. Now, anti-virus companies are worrying that the hype could mean people become complacent and do nothing about the continuing security problems plaguing the net. By 1500 GMT on Thursday, the worm had infected 244,727 computers, though it had caused no noticeable disruption to the internet. Any potential threat appears to be tailing off as the rate of infection has slowed down. Train crash not net crash A coincidence is to blame for all the hype and horror associated with the Code Red worm. The July 19 Internet Slowdown was NOT due to the worm Keynote Systems On 18 July, just as Code Red was starting to scan for vulnerable web servers, a CSX train carrying hazardous materials was derailed in the Howard Street tunnel in Baltimore, US. The derailment and subsequent fire severed cables running through the tunnel used by seven of the biggest net service providers to swap data. These companies started reporting disruption to the usual running of the net just as Code Red was hitting its stride, leading many people to assume that the worm was doing the damage. Analysis by Keynote has shown that even at its height, Code Red posed no threat to the running of the net. Train spike "The 19 July Internet Slowdown was not due to the worm," it said bluntly in a statement. Now that the dust is settling some anti-virus and security companies are worrying that the unfulfilled predictions of doom will harm efforts to make the net harder to compromise. Hype not havoc "There's been more hype than havoc," said Graham Cluley, of anti-virus company Sophos. In the past, the NIPC has wrongly predicted that the Y2K bug would be followed by a wave of destructive viruses. In May, it said that Chinese hackers were about to wreak havoc on US websites - again, a prediction that did not come true. David L Smith, the self-confessed author of the Melissa virus, was caught with the help of the NIPC in December 1999. Last month, a US Senate panel criticised the NIPC and said it had not got any better at its job since the GAO report was issued. But, said Mr Cluley, just because the Code Red worm had not wrought havoc people should not assume that there was no danger and they should not do more to protect web servers and their home computers. Figures collected by the Computer Emergency Response Team (Cert), which monitors threats to the internet, show how attacks on the web are escalating. In the whole of 2000, Cert issued warnings about 1,090 vulnerabilities, yet in the first six months of 2001 it has already seen evidence for 1, 151 vulnerabilities. See also: 02 Aug 01 | Sci/Tech 40 Code Red threat tailing off 22 Jul 01 | Americas 41 Baltimore toxic scare abates Internet links: 42 US General Accounting Office report on NIPC 43 National Infrastructure Protection Centre 44 CSX Transportation 45 Internet health report 46 Keynote Systems 47 Internet weather reports The BBC is not responsible for the content of external internet sites Top Sci/Tech stories now: 48 Astronomy's next big thing 49 Ancient rock points to life's origin 50 Mobile spam on the rise 51 Giant telescope project gets boost 52 New hope for Aids vaccine 53 Replace your mouse with your eye 54 Device could detect overdose drugs 55 Wireless internet arrives in China Links to more Sci/Tech stories are at the foot of the page.