SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Amazon.com, Inc. (AMZN) -- Ignore unavailable to you. Want to Upgrade?


To: GST who wrote (66904)7/8/1999 12:30:00 AM
From: Mark Fowler  Read Replies (3) | Respond to of 164684
 
Judge denies Microsoft motion in Caldera case<<

I don't know what to say about this except who else is going to come forward? It's like what we're are seeing in the tobacco industry, i think our society is way too litigious and could be our down fall...



To: GST who wrote (66904)7/8/1999 11:16:00 AM
From: Glenn D. Rudolph  Respond to of 164684
 
July 8, 1999

High-Speed Lines Leave Door Ajar for Hackers

Constant Connections Through Cable or D.S.L. Mean New Security
Headaches for Home Users

By IAN AUSTEN

bout two weeks after Frank Keeney was first connected to cable
modem service in Pasadena, Calif., he discovered that along with the
delights of a 24-hour connection and high-speed Internet access came
the potential for big trouble.

"I went to log in and found
that someone had
compromised my computer,"
he recalled. "When you log
into a Linux system, it will
normally show a short
message stating the last time
logged in and from where.
Since I had not logged in for a
week or so, I knew there was
trouble. I checked to see if
someone else was online and,
sure enough, he was on at the
same time.

"I tried to kill his log-in
session, but it was too late. He
had already issued the
command to erase every file on the computer. I watched while he erased
everything on my hard drive."

Keeney's experience is not isolated, several computer security experts said.
The shift from dial-up Internet connections to cable modems and D.S.L.
(digital subscriber lines -- fast, constant links to the Net that use telephone
lines) are making home computer users vulnerable to the types of attacks
from hackers that in the past were almost exclusively a worry for
corporations.

"Most people aren't thinking at this level yet," said Christopher W. Klaus,
chief technology officer for Internet Security Systems, an Atlanta-based
maker of complex security analysis software used by large corporations.
"Service providers are looking at trying to put as many people on the
Internet as possible. The more security isn't brought up as an issue, the
greater the problems."

Cable modems and D.S.L. lines are presenting two new problems for
ordinary residential users.

The biggest source of trouble comes simply because these lines mean that
users are constantly connected to the Net, so their computers are always
potential targets of hackers..

The second problem has to do with the types of connections used by faster
lines. Communications between computers on the Internet rely on a series of
numbers known as I.P., or Internet protocol, addresses. For dial-up users,
those addresses are constantly shifting, making them their computers elusive
targets.

While it can be a nuisance to dial in to reach the Net every time you want to
check your e-mail, the practice automatically provides its own measure of
security.

Unfortunately the protection afforded by the dial-up shell game largely or
completely vanishes with cable modems or D.S.L. lines. Because their
customers don't flit on and off the Net, many high speed service operators
give them fixed I.P. addresses.

While they may not be publicizing their
new services' security problems with
the vigor they bring to boasting about
the more desirable features, cable
modem and D.S.L. providers
acknowledge that their residential
customers are facing new kinds of
security woes -- even if personal
computers, of course, are less likely to
be the targets of hackers than are
corporate or government systems.

"Where we are today, from a consumer standpoint, is where companies were
back in the late 80's, when firewalls weren't a big issue," said Kevin
McElearney, vice president of network support services at Road Runner, a
cable modem partnership that includes Time Warner Entertainment, the
Mediaone Group, Microsoft, Compaq and Advance/Newhouse. Residential
customers using high-speed services, he said, "are in an environment where
they have to realize that there are security issues."

"Your risk is increased the longer you leave any computer connected," he
said.

"We're learning together in this new world of always being online in the
home," said Jeff Waldhuter, director of technology and engineering at Bell
Atlantic Science and Technology Center, the research branch of the
telephone company and D.S.L. service provider. "Now that we're getting on
with these connections, we're learning that we have to add more security.
We're growing up. These networks are going to be vulnerable."

The move to the always-connected world seems to have come at a somewhat
inopportune time.

Internet Security Systems has been tracking a "dramatic increase" in the use
of a hacking technique known variously as probing, sniffing or scanning,
Klaus said. Probing software automatically scans computers connected to the
Internet and evaluates the level of their security protection, looking for weak
systems vulnerable to easy attack.

"It's not uncommon to have someone twist the doorknob of your home
computer," McElearney said.

For probers, a typical home computer running Apple's Mac OS or Windows
95 or 98 without the maker's latest security updates or additional security
software is the closest thing to an unlocked door they are likely to find.

After his hard drive disaster, Keeney installed
security software on his computer in Pasedena that
tracks and records break-in attempts by probing
software. He has found that unwanted visitors test
his computer's security about twice a day. "Most
computers on cable modems will be probed," he said. "If weaknesses are
found, someone will exploit them."

Unlike people who create and spread viruses or worms, probers don't need
the computer's owner to advance their cause inadvertently by, say, opening a
tainted e-mail attachment. For them, an insecure system offers seemingly
endless potential. Keeney's hard drive crash is an extreme example of what
hackers can do once inside a computer. But others can cause just as much
harm even though they come and go without leaving an immediate trace.

Among other things, Sullivan said, once hackers gain entry they can extract
credit card numbers from stored files, read e-mail, copy files, send e-mail
over your name -- "in short, just about anything," he added.

Most cable and D.S.L. modems also make it easier for hackers to go after
specific computers.

In dial-up systems, the addresses belong to the service provider's modems,
rather than to its customers. When customers dial in for a connection, each
one gets an I.P. address of the modem reached for that session; each modem
is associated with a finite number of I.P. addresses. The next time the
computer may well connect with another modem and get another address,
particularly if the customer has a large service provider operating huge
banks of modems. "To some extent that's security through obscurity,"
McElearney said.

For cable-modem and D.S.L. customers, not only are their addresses fixed,
they are also often easy to learn. The addresses appear in the headers (which
usually aren't displayed) that travel with every e-mail message or newsgroup
posting customers send.

Many service providers have begun to respond to the problem. Some,
including Road Runner, are introducing a system that regularly rotates their
customers' I.P. addresses. Addresses based on this system, however, may not
change for several days and will still appear in the headers.

Klaus is also distressed about one unintended side effect of the steep decline
in computer prices. Inexpensive PC's increasingly mean that some families
now own several computers, all of which can be serviced by a single
high-speed line. To take advantage of that, some people are setting up
mini-networks in their homes, with one computer acting as the go-between
to the Internet for all the others.

The proxy server software that makes that possible, however, often has very
flawed security measures, Klaus said. To obscure their identities,
sophisticated hackers will first log into a home network software before
launching an attack against their ultimate target. Junk-mail spammers can
resort to the same trick. In either case, the result can be highly embarrassing
for the unsuspecting home network owner, who will appear to be the
originator of the hacking or spam.

Right now, there is not a straightforward answer to the question of how to
guarantee security while enjoying high-speed Internet connections. For
Larry Rogers, who tracks Internet security problems at Carnegie Mellon
University's CERT Coordination Center, part of the solution is simply hard
work.

"People with these connections need to play systems administrator," he said.
"It's a matter of vigilance."

That vigilance can include something as simple as having Windows users
make sure that Network Neighborhood -- a file-sharing system -- is turned
off. Rogers also suggested steps like regularly downloading software
security patches from Microsoft's Web site or modifying arcane portions of
the operating system. Not surprisingly, these are just the kind of
housekeeping tasks that many users somehow never get around to.

Some software companies are offering their help. In May, Sybergen
Networks (www.sygate.com), which mostly makes corporate security
protection software, introduced a $29.95 software package for home users
called Syshield. Similar products include Conseal Private Desktop by Signal
9 Solutions (www.signal9.com).

Such software generally blocks the computer from receiving some types of
data, limiting the paths in for hacker.

Syshield can also be set up to in effect disconnect the computer from the
Internet late at night.

The ultimate protection is that now used by Keeney, who has become a
computer-security consultant since his 1997 attack. He has copied, on a much
smaller scale, the system used by most corporations.

All his Internet business now runs on a network with a single computer
operating as a firewall and using the Linux software system. Because it is
difficult for hackers to get past the firewall computer in such set-ups, that
computer acts as a sacrificial lamb of sorts. Keeney freely admits, however,
that most home users are unlikely to adopt such a complex setup.

If the speculation in the industry is correct, they may never have to. Many
believe that "security appliances" -- extremely stripped-down computers
with security software that sit between another computer and its Internet
connection -- may eventually hit the consumer market. Such systems for
business users are already available.

Of course, another answer would simply be to put up with the slow speeds
and petty annoyances of a dial-in modem. But for anyone but the more basic
e-mail user, Klaus does not think that is a great idea.

"There are too many benefits that outweigh the security risks, provided you
take precautions," he said. To prove his point, Klaus added that he was now
shopping for cable modem service for his home.

nytimes.com