SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : All About Sun Microsystems -- Ignore unavailable to you. Want to Upgrade?


To: JC Jaros who wrote (31615)5/7/2000 3:15:00 AM
From: tiquer  Read Replies (1) | Respond to of 64865
 
Microsoft left YOUR front door wide open. -JCJ

Right on the mark JC...

Roger



To: JC Jaros who wrote (31615)5/7/2000 6:14:00 AM
From: JDN  Read Replies (1) | Respond to of 64865
 
Dear JC: Quiksand said it all. The electronic equivalent of road rage.
As to your comment, anything devised by man can be overcome by man. The internet has become or is becoming the single most important event in mans ability to communicate. It is so precious IMHO that extreme measures must be taken to protect it. I can assure you that if this hacking continues at this level ultimately honest people like ourselves will be the ones to pay the price, perhaps even our ability to enter and use the internet will be restricted somehow. JDN



To: JC Jaros who wrote (31615)5/7/2000 10:57:00 AM
From: rudedog  Read Replies (2) | Respond to of 64865
 
JC - 100% on your comments. The person who created that virus could have been anyone - it was not particularly sophisticated. He or she may have had no idea that it would take off like it did. And in any event, the people poking at the foundations of our software world do the rest of us a service, even if we are inconvenienced a little.

Bank of America had a guy who hacked into their systems a ways back and actually transferred a bunch of money. When they finally caught up with the guy, they offered him a deal - if he returned the funds, they would drop charges and hire him to head an internal "hacker's team" to try and do the same thing again. He took them up on the deal and as far as I know, he is still working there.

I had a similar experience about 15 years ago. My team contracted to do a control program for a Department of Defense system being built. The Prime (Stone and Webster) had a bunch of crap in their procedures about how tight their security was and how we should all be quaking in our boots if we even THOUGHT about stepping out of line. My two top programmers (neither of whom had a degree or formal computer training) got into a contest (unknown to me) to see if they could cut the system administrators down to size. They hacked into the main development machine and reset priorities on all the Stone and Webster initiated tasks to snail mode. Then they started subtly altering the environment itself. Then they created a phantom shell which captured all the Stone and Webster sessions and put all the content in a log file - including accounts and passwords.

It was about that time that I figured out what they were doing. Initially I was pretty upset - this was the DoD after all - but then decided that if these guys could take control of the system, anyone could. So I just monitored their activity and made sure they didn't do anything which actually damaged the project.

After about a month, the program administrators finally figured out that something was up and called a big pow-wow with the DoD auditors to talk about "the problem". They were ready to point the finger at us - but they had only discovered the initial hacks, not the phantom shell.

With the auditor present, my guys showed that they had gotten control of the administrative accounts, the mail system, and had access to all of the program documentation including material that required a higher level of clearance than we had, and that even after discovering the simple level of tricks that they had initially done, the system administrators did not know that their whole system had been breached.

The upshot was that the DoD auditor recommended that we get an additional contract to continue attempts to break the security, and "advise" Stone and Webster on where their security holes were.



To: JC Jaros who wrote (31615)5/7/2000 12:38:00 PM
From: Bill Fischofer  Read Replies (2) | Respond to of 64865
 
Re: Viruses

Hackers hack what's available. If Linux, MacOS, Solaris, OS/2 etc. ran 90% of user desktops then most viruses, worms, trojans, etc. would be based on those OSes rather than Windows. Folks can rail at MSFT all they want, but the reason Windows is the target is because Windows is the environment. To claim that an OS that (statistically speaking) nobody runs is "more secure" than Windows is meaningless because virus propagation is as much a sociological problem as it is a technology problem.

Viruses are successful in the real world for two reasons only:

1. Most people never apply any service to their software. If they treated their cars the way they treat their computers they'd never change the oil and wonder why the engine after a time simply died "for no reason".

2. The average person will execute anything without thinking. There's simply no substitute for common sense precautions when it comes to using the net safely. Mothers used to tell their kids not to accept candy from strangers. In the online world it's amazing how that simple wisdom is ignored, but it is at the root of virtually all successful virus "attacks".

Keep your software on current service and never execute random files sent to you or otherwise "found" on the net and you're very likely to remain virus-free for your entire online life. Technology will never substitute for common sense in this area.