SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : Cents and Sensibility - Kimberly and Friends' Consortium -- Ignore unavailable to you. Want to Upgrade?


To: Marshall001 who wrote (79359)2/25/2000 7:30:00 PM
From: If only I'd held  Read Replies (2) | Respond to of 108040
 
There's only 700 left of them. This kills me. That's guaranteed money there, and I feel restricted. I placed an order to buy them 4 or 5 times and it kept getting deleted. You should buy them. I can't see you losing. Call it lunch money....about 1,000 worth of lunch



To: Marshall001 who wrote (79359)2/25/2000 8:29:00 PM
From: Mike E.  Respond to of 108040
 
Nice bit of "camera time" for NTPL:

(COMTEX) B: Denial-Of-Service Program Expands To PCs
B: Denial-Of-Service Program Expands To PCs

Feb 25, 2000 (Tech Web - CMP via COMTEX) -- The cracker tools used in
the denial-of-service attacks on Yahoo and other websites earlier this
month have migrated from servers to Windows 98-based PCs.

In the Internet attacks earlier this month, crackers planted programs
on servers, turning them into "zombies" they commanded to attack Yahoo
and others with a barrage of bogus messages, consuming bandwidth and
shutting down legitimate traffic.

"Those original programs worked on Windows NT and flavors of Unix,"
said Patrick Taylor, a vice president at Internet Security Systems, an
Atlanta-based security vendor. "Now someone has created a version that
works on Windows 98 and transmitted via e-mail attachments. The
ultimate outcome is your Windows 98 box becomes a zombie and, thus,
potentially part of a DoS attack on a third computer."

James Madison University, Harrisonburg, Va., discovered 16
student-owned Windows-based PCs were infected with an agent that may be
a variant of the Trin00 denial-of-service tool.

With hackers able to use Windows 98-based PCs in DoS attacks, it
changes the kind of threat DoS presents, Taylor said. It expands the
"range of possibilities."

While it likely takes several big servers to launch a major DoS attack,
a gang of PCs still could prove annoying to a particular ISP, he said.

Computer users can protect their systems from becoming infected by
taking precautions with e-mail attachments, configuring their computers
with proper security settings, and using antivirus software, Taylor
said.

Ken Cutler, director of information security professional services with
the NetPlex Group, in McLean, Va., said the James Madison University
incident is a reminder for end-users to keep up with current antivirus
software.

"What it's signaling is we have to keep up our continuing vigilance for
using the best and most current anti-malicious defenses that's
available so you don't become an accomplice," he said.




Copyright (C) 2000 CMP Media Inc.
techweb.com


-0-

*** end of story ***