Berkeley CSUA MOTD:Entry 37725
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/25 [General] UID:1000 Activity:popular
5/25    

2005/5/17-18 [Computer/SW/Security, Computer/SW/OS/Windows] UID:37725 Activity:low
5/17    http://blogs.washingtonpost.com/securityfix
        "A system administrator, angered by his diminished role in a thriving
        defense manufacturing firm whose computer network he alone had
        developed and managed, centralized the software that supported the
        company's manufacturing processes on a single server, and then
        intimidated a coworker into giving him the only backup tapes for that
        software. Following the system administrator's termination for
        inappropriate and abusive treatment of his coworkers, a logic bomb
        previously planted by the insider detonated, deleting the only
        remaining copy of the critical software from the company's server. The
        company estimated the cost of damage in excess of $10 million, which
        led to the layoff of some 80 employees."
        \_ Whose fault was this?  Now consider:  whose responsibility is it
           (not for failing to look over his shoulder, but for allowing this
           much "power" to concentrate in one set of hands)?  -John
           \- fault is not zero sum. poor decision making on part of the
              company doesn't remove his culpability. legally it may be
              up in the air to what extent can say a shareholder hold
              the negligent management responsible vs the malicious employee
              but ethically, the failure is on the "evil employee".
              \_ Well, the company holds the evil employee liable in its
                 turn, but it's kind of a case of where the buck stops.  That
                 said, dingdingding.  -John
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/05/25 [General] UID:1000 Activity:popular
5/25    

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
2012/4/23-6/1 [Computer/SW/WWW/Browsers] UID:54360 Activity:nil
4/19    My Firefox 3.6.28 pops up a Software Update box that reads "Your
        version of Firefox will soon be vulnerable to online attacks."  Are
        they planning to turn off some security feature in my version of
        Firefox?
        \_ Not as such, no, but they're no longer developing this version,
           so if a 3.6.x-targeted hack shows up, you're not going to get
	...
2013/3/25-5/18 [Computer/SW/OS/Windows] UID:54639 Activity:nil
3/25    It's strange that only every other Windows version is a hit.
        NT 4.0: hit
        2000:   flop
        XP:     hit
        Vista:  flop
        7:      hit
	...
2013/2/19-3/26 [Computer/SW/OS/OsX] UID:54611 Activity:nil
2/19    I program a lot by sshing to a Linux cluster.  So I'm used to using
        Xemacs to code.  This works fine from a Linux or Windows workstation,
        but sometimes I have to use a Mac.  On Mac, the meta is usually
        bound to option, but that often doesn't work over ssh for some reason.
        This makes using emacs a real pain.  Any suggestions on how to fix it?
        (Other than "use vi")
	...
2012/3/15-6/1 [Computer/SW/Languages, Computer/SW/OS/Windows] UID:54340 Activity:nil
3/15    Why does MS put double-quotes around the '8' in Windows Server 8, like
        the following?
        - Windows 8
        - Windows Server "8"
        \_ Because when they didn't do it, code didn't see the '\0'
           and went over?  Looks better than '8','\0' *shrug*
	...
2012/2/23-3/26 [Computer/SW/OS/Windows] UID:54312 Activity:nil
2/23    fixboot wrote FAT boot sector to my WinXP hard drive.  How can I convert
        the drive back to NTFS?
        \_ Does C:\WINDOWS\system32\convert.exe work?
	...
2011/12/21-2012/2/6 [Computer/HW/Laptop, Computer/SW/Editors/Emacs] UID:54269 Activity:nil
12/21   In Emacs, how do I make it so that it will resize its screen
        when the maximum resolution of my monitor changes? When I
        use my laptop, my emacs is too big (and I can't resize it
        because the bottom-right corner is not accessible).
        \_ Which OS?  Can't you drag the top border (not a corner) to resize
           the height to be smaller?
	...
2011/12/23-2012/2/6 [Computer/Rants] UID:54271 Activity:nil
12/23   http://venturebeat.com/2011/12/22/uc-berkeley-google-apps
        Oh noes! What Would Bill Gates Do?
        \_ http://lauren.vortex.com/archive/000701.html
           Microsoft to Transition Corporate IT to Google Apps
	...
2011/11/27-2012/1/10 [Computer/HW/Drives] UID:54244 Activity:nil
11/27   CalMail has been down for a few days (hardware failure and database
        corruption -- sounds like fun!) and is starting to come back online.
        Looks like they're planning to outsource all campus mail to either
        Google Apps or Microsoft 365 as part of Operational Excellence.
        <DEAD>kb.berkeley.edu/jivekb/entry!default.jspa?externalID=2915<DEAD>
        \_ http://ist.berkeley.edu/ciocalmailupdates/november-30-2011
	...
2011/11/8-30 [Computer/SW/Security, Computer/SW/OS/Windows] UID:54218 Activity:nil
11/8    ObM$Sucks
        http://technet.microsoft.com/en-us/security/bulletin/ms11-083
        \_ How is this different from the hundreds of other M$ security
           vulnerabilities that people have been finding?
           \_ "The vulnerability could allow remote code execution if an
               attacker sends a continuous flow of specially crafted UDP
	...
2011/5/19-7/30 [Computer/SW/Security] UID:54110 Activity:nil
5/19    Uh, is anyone still using this? Please mark here if you post and
        haven't added this yet. I'll start:
        \_ person k
        \_ ausman, I check in about once a week.
        \_ erikred, twice a week or so.
        \_ mehlhaff, I login when I actually own my home directory instead of
	...
Cache (8192 bytes)
blogs.washingtonpost.com/securityfix -> blogs.washingtonpost.com/securityfix/
Security Fix Brian Krebs on Computer Security Posted at 10:58 AM ET, 05/17/2005 Before You Fire the Company Geek... If you notice a fellow employee suddenly freaking out or acting really su spicious, he may be having personal problems -- or he may be in the proc ess of hacking the company. The study examined 49 insider attacks, carried out between 1996 and 2002, where disgruntled employees took advantage of their access to the compa ny's network and computer resources to destroy data or embarrass fellow employees or their employer. The study focused less on the incidence of hacking committed by trusted employees than on the motivation of insider hackers and the circumstances that allowed them to inflict damage on th e affected companies. As such, it includes some interesting anecdotes, b ut also a lot of "no duh" findings. For example of the latter, the study's "executive summary" notes that in 62 percent of the cases, "a negative work-related event triggered most o f the insiders' actions." The study also found that 82 percent of the ti me the people who hacked their company "exhibited unusual behavior in th e workplace prior to carrying out their activities." The survey surmises that's probably because the insiders were angry at someone they worked with or for: 84 percent of attacks were motivated by a desire to seek re venge, and in 85 percent of the cases the insider had a documented griev ance against their employer or a co-worker. Part of that "unusual behavior" was no doubt a result of the employee try ing to hit "alt-tab" fast enough to hide their screen when the boss walk s by. In 27% of the cases, "the overt behaviors were technical actions t aken to set up the attack, including constructing and testing a logic bo mb on the network, centralizing critical assets and sabotaging backups, or installing backdoors." For the uninitiated, a "logic bomb" is a destr uctive computer program -- like a virus -- designed to go off at a time predetermined by the attacker, usually after said attacker is no longer employed by the target. A "backdoor" is a simple program that allows the attacker to secretly gain access to the company's network, even if the credentials given to them by their employer to access the network have b een revoked. To get to the more interesting findings, forget the executive summary and the 10 pages of methodology and check out some of the real-life anecdot es upon which the report was based. For instance: "A system administrator, angered by his diminished role in a thriving def ense manufacturing firm whose computer network he alone had developed an d managed, centralized the software that supported the company's manufac turing processes on a single server, and then intimidated a coworker int o giving him the only backup tapes for that software. Following the syst em administrator's termination for inappropriate and abusive treatment o f his coworkers, a logic bomb previously planted by the insider detonate d, deleting the only remaining copy of the critical software from the co mpany's server. The company estimated the cost of damage in excess of $1 0 million, which led to the layoff of some 80 employees." As it turns out, the report's title is a bit of a misnomer: In almost 60 percent of the time, the attacks were launched by contractors or people who had recently been fired (48 percent). Eighty-six percent of insiders were techie types, including system administrators, programmers, engine ers and IT specialists. Accordi ng to the report, if you're going to fire someone (particularly company geeks who have the motive, means and access to inflict pain on your comp uter systems) make double sure you cut off their e-mail and network acce ss at the same time you hand them their walking papers. Some other interesting (although not particularly surprising) tidbits: Al most all -- 96 percent -- of the insiders were men, and 30 percent of th em had previously been arrested, including arrests for violent offenses (18 percent), alcohol or drug-related offenses (11 percent), and non-fin ancial-fraud related theft offenses (11 percent. Ninety percent of the i nsiders faced formal criminal charges, and 61 percent of those charged f aced penalties under federal law. Eight-three percent of those charged w ere convicted, and another 5 percent didn't contest the charges. Safari Web browser, and the default mail a nd address book program. As always, Mac users can download and install by clicking on the software update tab, located in system preferences. Firefox Web browser didn't include links to where people can go to download the updated version fo r Mac or Linux systems. Here's one comment: Ok guys, if you post a link to a download you have to tell us thats its not for Mac - so now the question is are your instruc tions for updates in Gates language only? Shame on me for thinking our readers are mostly Windows users. series of video guides demonstrating some of the basi c steps users need to take to stay safe online, including brief primers on choosing and using firewall and anti-virus software, downloading and installing the latest Microsoft Windows patches, and taking advantage of free anti-spyware tools. These videos are by no means definitive guides, but I hope they will be o f some use to those who find themselves completely intimidated by comput er security. Download and install it manually, or use Firefox's updater tool, by clicking on "Tools" in th e menu at the top of the browser window, then "options," then the "Advan ced" tab. Then hit the button that says "check now" and it should find the upda te for you. Alternatively, if you see a little red arrow in the upper right hand corn er of your screen, click on that and it will prompt you to download the update. Updated extensions are usu ally available within a few days of a Firefox upgrade, so keep an eye ou t for that little red arrow to show up again soon after you update if yo u have extensions installed. underground market for credit card accounts gleaned from phishing sc ams. Sergio Pinon, MasterCard's senior vice president of security and risk ser vices, said that while the number of scams using the company's brand and trademarks has skyrocketed over the past year, the actual losses associ ated with compromised account numbers have remained flat. Anti-Phishing Working Gro up, there were 13,141 new and unique phishing e-mails sent in February. The number of phishing attacks have increased an average of 26 percent e ach month since July 2004, the APWG found. Not all of the credit card numbers found online are posted by criminals; for example, Pinon said that in several cases the company stumbled on ac count numbers sitting in poorly secured databases run by companies that organize meetings and conferences. last month's deluge of patches, when Microsoft dumped a total of ei ght fixes -- five of them "critical" -- to plug 18 different holes in it s software. Microsoft rated today's patch "important," which generally means hackers could use it to break into vulnerable computers, but that at least some action on the part of the victim would be required. The problem also is mainly resident in certain versions of Windows 2000, which is mostly use d by businesses. The problem does appear to affect users of Windows98, W indows SE and Windows ME, but those users may be out of luck: Microsoft no longer offers support or patches for non-critical security flaws in t hose operating systems. Microsoft also used the occasion to launch a pilot project called "Micros oft Security Advisories," which the company said aims "to provide guidan ce and information about security related changes that may not require a security bulletin but that may still impact customers' overall security ." Translation: Some "features" we've intentionally designed into our so ftware are being abused, and here are some ways to make sure said featur es don't turn into a liability for you or your organization. anti-virus companies rece ntly called attention to the fact that hackers and unscrupulous online m arketers are spreading spyware by taking advantage of how the "digital r ights management" (DRM) tech...