New Virus Infects Picture Files
Sent to Symantec by this author, it is a proof-of-principle virus
Embeds virus into jpg picture, increasing its size by 11K.
Cannot propagate yet, because the complete virus, including extractor is not embedded.
Affects on Windows machines. Does not affect Mac, Linux, Unix
Extractor file is sent as an email attachment. It infects every local picture that is viewed by that machine.
KaZaA File Sharing Virus Discovered
Shared via KaZaA voluntary downloads
File apparently poses as song, movies, or other attractive media file.
Previous KazA virus was W32.Elem.Trojan
Klez Virus has a message
The Klez writer, who claims to be Asian, apparently wants a job
An embedded message says: ?I want a good job. I must support my parents. Now you have seen my technical capabilities. My year-salary is no more than $5,500. What do you think of this fact? Don?t call me names. I have no hostility. Can you help me.?
Virus writers want to brag and hence are easier to catch
David Smith fell in love with an Florida stripper, Melissa. He wrote an ode of mourning his lost love
Jan de Wit, author of the Anna Kournikova worm, was alarmed as he watched the damage of his creation. He turned himself in.
Four Israelis teenagers created ?Goner? and ?Pentagonaer.? They were traced by systems administrators while chatting and bragging on their IRC channel, ?Pentagone.?
Perrun, the JPG virus, has already been submitted to Symantec by its author. He presumably wants a job.
Best Buy Reactivates Wireless Cash Registers
Best Buy is now a target
It has implemented VPN technology to security the networks
It has lowered power levels
Best Buy is not releasing any other details.
Some Visual Studio.net CDs infected with Nimda Worm
Two weeks after beginning shipments of the Korean language version of its new Visual Studio .Net developers software in April, Microsoft Corp. learned that the software accidentally included a file that was infected by the destructive Nimda worm.
Patch is now available.
Parents Beware of KaZaA P2P file-sharing
Nathan Good and Aaron Krekelberg have completed a study
KaZaA file sharing menus are confusing
Many user share too many files, including private files, without knowing it
Authors searched for Visa, inbox.dbx, etc and got many hits
Found 20 users who were sharing inbox.dbx (the Outlook Express e-mail inbox)
Of those 9 shared their web cache and cookies
5 shared word processing documents
2 shared data from financial software
1 shared the Windows systems folder
Set up a dummy shared file, Credit Card.xls. Downloaded with minutes.
Parents could be working at home using a VPN and their child is sharing their valuable data to anyone.
War Driving Software
Linux and any card with Prism chip set
Windows and any card with an Lucent Wavelan chip set
Biotech ?dragline? spider silk
Nexia, a biotech firm, has spliced a spider?silk producing gene into cells from the milk producing gland of cows
Genertically altered cows secret a soupy fluid, from which Nexia was able to extract spider silk
The silk has been spun into fibers and armor this is expected to be stronger than steel, lighter than cotton, and harder to teach than Kevlar.
Ruling the Root by Milton L Mueller
Internet politics revealed
Who controls the Domain Name System
In the beginning Jon Postel, under contract to Department of Defense
Later ICANN (Internet Corporation for Assigned Names and Numbers) under contract to Commerce
ICANN, many feel, is controlled by large corporations
Root Domain Servers (13 in all)
DC Metro Area (3 VA, 2 MD)
CA (2 Northern, 2 Southern)
Europe (1 England, 1 Sweden)
South Africa’s domain administrator hides key file
Parliament is passing bill to control Namespace.za
Za administrator believe that is too control and is protesting
Stop Those Probes!!!
Are we headed for National Firewalls?
China and many Middle Eastern countries have one.
Should we block all IP address originated from the Asia, as suggested at a recent computer conference? ?Asis: Just Say No!?
You can monitor you probes and identify the IP address they came from
Go to Geektools to see what ISP owns that address
Report them to the abuse email address that may be listed there.