Month: October 1999

  • And You Thought You Were Safe!

    [This was originally published on Aviary Magazine and mirrored on] The realm of computer security is not an isolated slice of life reserved for geeks and bitheads. Security is all inclusive, no longer a realm of obscure networks or sensitive databases full of nuclear codes and credit card numbers. I know this may be […]

  • Building a Global IDS

    [This was originally published on Aviary Magazine and mirrored on] A good Intrusion Detection System (IDS) is designed to not only warn of known attacks, but to second guess and stop unknown attacks. This is done by utilizing known signatures of existing attacks, and speculating on unseen or new intrusion techniques that have some […]

  • The Last Line of Defense, Broken

    [This was originally published on SecurityFocus and mirrored on] The Last Line of Defense, BrokenThe Public Perception of Security Companies Getting Compromised Every so often, the protectors of your most important digital resources get hit with a little mud in the face. The so-called last line of defense is broken, and the security company […]

  • In Response To: Unplugged! The biggest hack in history

    [This was originally published in Aviary Magazine and mirrored on] Original Article,6061,2345639-2,00.htmlBy John Simons, WSJ Interactive EditionOctober 1, 1999 8:54 AM PT The Phonemasters and I In 1994, I was learning as much about computers and telephony as I could possibly take in. Had an extra 500 page manual? I’d digest it in days. […]

  • Poetry #37: noticed

    [This was originally published in F.U.C.K. poetry Issue #37. The publish date is approximate.] may i borrow a little understanding? please kind lady, i’ll give it back yes i’ll beg or humiliate myself if it will appease your cruel intentions and show you to be better than i just give me a chance, for i […]

  • Why Your Network is Still Vulnerable

    [This was originally published on Hacker News Network (HNN) and mirrored on] You trust the security experts. Their books and articles about security are often the bibles of System Administrators. Their one paragraph biographies tell you of their ten to twenty years doing network security. They take on impressive titles of neat sounding companies […]

  • Subversion of Information Attacks

    [This was originally published on Aviary Magazine and mirrored on] The Real Threat What is the absolute worse consequence of hackers on the Internet? Defacing high profile sites? Deleting a dozen machines effectively shutting down an entire business? Flooding subnets and denying access to an ISP of five thousand people? None of the above. […]