home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 52.9 KB | 1,233 lines |
- 2 Problem - CIAC Informational Notice
-
- 27 07-03-90 Disk Killer (Ogre) Virus on MS DOS Computers
-
- 28 07-12-90 Jerusalem virus on Novell LAN
-
- 29 07-19-90 4096 (4k, Stealth, etc.) virus on MS DOS Computers
-
-
- 74 min left
- ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
- ------*>>> RBBS-PC MAIN MENU <<<*------ ░░
- ───── MAIL ────────── SYSTEM ────────── UTILITIES ────── ELSEWHERE ─── ░░
- [E]nter Messages [A]nswer Questions [H]elp (or ?) [*]oors ░░
- [K]ill Messages [B]ulletins [*]oin Conferences [F]iles ░░
- [P]ersonal Mail [C]omment to Sysop [V]iew Conf. Mail [G]oodbye ░░
- [R]ead Messages [I]nitial Welcome [X]pert on/off [Q]uit ░░
- [S]can Messages [*]perator Page [U]tilities ░░
- [T]opic of Msgs [W]ho's on * = unavailable [*]Library ░░
- ────────────────────────────────────────────────────────────────────── ░░
- Current time: 09:59 AM Minutes remaining: 74 Security: 5 ░░
- ░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░
-
- MAIN command <?,A,B,C,E,F,H,I,K,P,Q,R,S,T,U,V,W,X>! s
- Message base MAIN
- Msg # 26-644 (H)elp,S)ince,L)ast, T)o,F)rom,M)ine, text, [Q]uit)? s
- 38 03-02 TIM GRALL -> ALL SHIBBOLETH
- 40 03-02 KURT FRIEDMAN -> LARRY HELP ME
- 82 03-13 ROB RICHARDS -> ALL HELP
- 86 03-15 ART STIFFEL -> ALL WANG AND IBM INTERFACE
- 87 03-15 ART STIFFEL -> ALL MAINFRAME ALTERNATE SITE
- 101 03-22 ROB RICHARDS -> ALL INFLATION
- 134 04-02 ERNEST PASKEY -> ALL FOCIS
- 140 04-04 JACQUES GUERETTE -> ALL VAX/VMS NASTIES
- 188 04-19 JON JESSUP -> ALL NEW BOARD UP.
- 252 06-01 JUDIE BLINCOE -> ALL SECURITY ORG
- 260 06-04 LARRY DEMPSEY -> ALL PC TO MAINFRAME SECURITY
- 265 06-05 JOHN TURNER -> ALL BIOS COMPUTER SUPPORT
- 268 06-06 KURT HENKE -> ALL AFCEA CONFERENCE
- 289 06-12 KURT HENKE -> KENNETH HAYES (R)NCSC
- 307 06-17 KEN HAYES -> RICHARD LORD (R)JOLT
- 321 06-25 ERIC HAMBRIGHT -> KEN HAYES (R)JOLT
- !338 07-10 MATT STECKER -> DAVID ROLLINS <PASSWORD>
- 359 07-29 JUNE REBEL -> SYSOP TELIX
- 368 08-04 KEVIN WATSON -> SYSOP (R)COMMENT
- 377 08-14 TOM HEROD -> ALL NATURAL LANGUAGE
- 408 09-01 RICHARD COLEMAN -> ALL AUDIT TRAIL ?
- 415 09-06 IRA DOWNING -> ALL VENDOR RELATIONS
- 441 09-16 JOSEPH COSSETTE -> ALL GOVERNMENT SOFTWARE
- More [Y]es,N)o,C)ont,A)bort,#(s) to read? y 469 09-26 ANGUS MACDONALD -> ALL CERTUS SOFTWARE
- 470 09-26 ANGUS MACDONALD -> ALL SECURE MSDOS LANS
- 496 10-02 JOSEPH SEANOR -> ALL NEW MEMBER
- 527 10-16 CLARK WOODS -> ALL "ORANGE BOOK"
- 572 10-30 DAVID WEISSMAN -> ALL BITNET WORM?
- 599 11-01 SIDNEY PASSMAN -> ALL UNESCO INFORMATICS
- 609 11-05 VALERIE WATERS -> ALL MAINFRAME SECURITY
- 631 11-14 VALARIE COOK -> VALERIE WATERS (R)MAINFRAME SECURITY
- 632 11-14 SCOTT ALLISON -> ALL DNSIX INFO WANTED
-
- End Msgs
-
- Msg #: 140 MAIN
- From: JACQUES GUERETTE Sent: 04-04-90 14:35
- To: ALL Rcvd: 11-15-90 18:45
- Re: VAX/VMS NASTIES
-
- I am looking for a definitive list of VAX/VMS worms, viruses, etc. I
- have already searched through this BBS (I am also a new user). Can
- anyone help me out??
-
-
- Msg #: 359 MAIN
- From: JUNE REBEL Sent: 07-29-90 01:08
- To: SYSOP Rcvd: 07-30-90 07:47
- Re: TELIX
-
- Hi everybody !
- I've used Fax card on my PC, and i wonder if there
- is a similar card for telex .
- if any one knows about it and how can i get it
- please leave me a message on this board.
-
- Bullet # Last Updated Topic
- -------- ------------ -----
- 21 10-09-90 Virus Propagation in Novelle and Other Networks -
- CIAC Informational Bulletin
-
- 22 10-09-90 Security Problem on the NeXT Operating System -
- CIAC Informational Bulletin
-
- 23 10-24-90 UNIX Security Problem with Silicon Graphics
- Mail - CIAC Informational Bulletin
-
- 24 10-24-90 VMS Security Problem with ANALYZE/PROCESS_DUMP -
- CIAC Informational Bulletin
-
- 25 10-31-90 Report of a Vulnerability with IRIX Mail -
- CERT Advisory
-
- 26 10-31-90 HP-UX Trusted System 6.5 or 7.0, Authorization
- More [Y]es,N)o,C)ont,A)bort,J)ump! 2 Problem - CIAC Informational Notice
-
- 27 07-03-90 Disk Killer (Ogre) Virus on MS DOS Computers
-
- 28 07-12-90 Jerusalem virus on Novell LAN
-
- 29 07-19-90 4096 (4k, Stealth, etc.) virus on MS DOS Computers
-
- _____________________________________________________
- The Computer Incident Advisory Capability
- ___ __ __ _ ___
- / | / \ /
- \___ __|__ /___\ \___
- _____________________________________________________
- Informational Bulletin
-
- Virus Propagation in Novelle and Other Networks
-
- September 21, 1990, 1000 PST Number A-33
-
- Problem: Virus propagation on write-protected file systems
- Types: Many known viruses, most frequently variants of the Jerusalem
- (Israeli) virus
- Platform: MS-DOS computers
- Damage: Files that use software write-protection schemes cannot be
- assumed safe from damage due to virus infection
- Symptoms: Virus infection on write-protected files
- Detection: VIRHUNT, RESSCAN, CodeSafe, Vi-Spy, IBM Scan, FPROT
- More [Y]es,N)o,C)ont,A)bort,J)ump! y Eradication: VIRHUNT, CodeSafe, FPROT, and others (see text in p. 2 of
- this bulletin for recommended procedures)
-
- Critical Virus Propagation Facts
-
-
- This bulletin is to warn of a virus threat to networks for MS-DOS
- systems. File servers (e.g., Novell file servers) use attribute bits
- to perform write protection on files stored on server machines. Many
- viruses will clear these attribute protection bits before they attempt
- infection, thus circumventing the write protection scheme. Thus,
- write-protecting a program does not guarantee that the file is not
- infected with the virus.
-
- The following is a common scenario reported to CIAC: a floppy infected
- with the Jerusalem-B virus is inserted into a user's PC attached to a
- Novell network. Once this virus is executed, it resides in the PC's
- memory. When the user attempts to logon to the file server (running
- the program login.exe), the virus infects this program, even though the
- program is write-protected. Login.exe is a shared program that is
- executed by each user as s/he connects to the Novell network. Thus,
- each time a user logs in to the network, his/her machine immediately
- More [Y]es,N)o,C)ont,A)bort,J)ump! y becomes infected with the Jerusalem-B virus. The network allows the
- Jerusalem-B virus to spread considerably more quickly than if it had
- spread through exchange of floppy disks.
-
- When someone disinfects a system of PCs or PC clones on a Novell or
- similar file system, CIAC recommends the following procedures:
-
- 1) Detect the virus using one of the recommended packages for
- detecting and identifying the virus. Determine exactly which virus has
- infected the system, and that all virus types have been detected.
- Contact CIAC if you need assistance.
-
- 2) Deactivate the network connecting the PCs/PC clones together.
- This includes shutting down the file servers and unmounting the
- partitions from the users' PCs/PC clones.
-
- 3) Disinfect the server machines using an anti-virus package known
- to be effective against the detected virus. Alternately, reformat the
- server disks and re-install the system from original diskettes, then
- restore the data files from a recent backup. Do not attempt to restore
- programs (i.e., executable files) from a backup, as this is likely to
- reinfect your system.
- More [Y]es,N)o,C)ont,A)bort,J)ump! y
- 4) Disinfect each user's PC/PC clone using the same procedure as
- in step 2.
-
- 5) Verify that the virus does not reside on the file server or any
- user's PC/PC clone.
-
- 6) Bring the network file system back up.
-
- For additional information or assistance, please contact CIAC:
-
- Tom Longstaff
- (415) 423-4416 or (FTS) 543-4416
- FAX: (415) 423-0913 or (FTS) 543-0913
-
- Send e-mail to:
-
- ciac@tiger.llnl.gov
-
- ________________________________________________________________________
- THE COMPUTER INCIDENT ADVISORY CAPABILITY
-
- CIAC
-
- INFORMATION BULLETIN
- ________________________________________________________________________
-
- The Disk Killer (Orge) Virus on MS DOS Computers
-
-
- June 28, 1990, 1000 PST Number A-27
-
- ________________________________________________________________________
- Name: Disk Killer virus (also known as the Ogre virus)
- Types: Only one known variant
- Platform: MS DOS computers
- Damage: Overwrites mounted disks
- Symptoms: Writes "COMPUTER OGRE 04/01/89" on screen and overwrites disk
- More [Y]es,N)o,C)ont,A)bort,J)ump! Detection/Eradication: VIRALERT, VIRHUNT, RESSCAN, CodeSafe, CleanUp,
- F-Prot, IBM Scan, Pro-Scan, and others (contact CIAC for information
- about these products)
- Critical Disk Killer Facts
- ________________________________________________________________________
-
- The Disk Killer virus is a destructive virus affecting MS DOS
- computers. This virus infects the boot sector, then hides itself by
- marking unused blocks on floppy or hard disks as bad. After remaining
- dormant for approximately 48 hours of operation (not calendar) time
- after the initial infection, Disk Killer executes upon the first boot
- or reboot after this period. Upon execution, this virus displays the
- following message:
-
- Disk Killer -- Version 1.00 by COMPUTER OGRE 04/01/89
-
- Warning!!
-
- Don't turn off the power or remove the diskette while Disk Killer
- is Processing!
-
- Next, the word "PROCESSING" will be displayed, followed by this message:
- More [Y]es,N)o,C)ont,A)bort,J)ump!
- Now you can turn off the power. I wish you Luck!
-
- Disk Killer overwrites the boot sector, then the file allocation table
- (FAT), then the directory randomly with blocks of a single character.
-
- The proper procedure depends upon when you detect Disk Killer:
-
- 1. If your machine is infected before it executes and you detect this
- virus through a scan package (such as CodeSafe, RESSCAN, VIRHUNT, or
- IBM Scan)---TURN YOUR MACHINE OFF. Then use a write-protected bootable
- floppy disk to boot your system; otherwise, you will have disk Killer
- in memory, causing re-infection. Remove Disk Killer by installing and
- executing a PC virus eradication package such as VIRHUNT.
-
- 2. If the message shown above appears on your computer's screen, Disk
- Killer has already executed---LEAVE YOUR MACHINE ON AND ALLOW THIS
- VIRUS TO EXECUTE WITHOUT INTERRUPTION (i.e., until "Now you can turn
- off the power..." is displayed). It is true that Disk Killer will
- overwrite your disk, but don't worry---you can restore all data and
- files from your disk (floppy or hard disk) using a recovery package
- such as UNKILL. Reboot from a write-protected master floppy, and
- More [Y]es,N)o,C)ont,A)bort,J)ump! remove the virus using virus eradication software.
-
- Regardless of which particular procedure (1 or 2) you use, be sure to
- scan any disks (in particular, bootable floppies) before resuming
- normal activity with your computer.
-
- Note: Because this virus modifies every byte in every sector on your
- disk, Norton Utilities not a feasible means of recovering from the Disk
- Killer virus. Note also that a considerable amount of incorrect
- information about responding to Disk Killer has already been
- distributed. If you follow this incorrect information, which advises
- you to turn your machine off as soon as Disk Killer begins to execute,
- it is extremely likely that you will not be able to fully recover from
- this virus.
-
- Additional Note: The CIAC team first became aware of this virus early
- last Fall. At that time, however, we chose to briefly describe this
- virus in the CIAC Bulletin Board (FELIX) and CIAC Bulletin A-15, rather
- than to issue a separate bulletin; infections at that time appeared to
- be limited to MS DOS computers equipped with hard disks made by a
- particular manufacturer in Taiwan.
-
- More [Y]es,N)o,C)ont,A)bort,J)ump! y For additional information or assistance, please contact CIAC:
-
- David S. Brown
- (415) 423-9878 or (FTS) 543-9878
- FAX: (415) 423-0913, (FTS) 543-0913 or (415) 422-4294
-
- Send e-mail to:
-
- ciac@tiger.llnl.gov
-
-
- Bullet # Last Updated Topic
- -------- ------------ -----
- 41 10-31-90 Computer security conferences and
- courses available through May, 1991.
-
- 42 05-14-90 Lecture Series on High Integrity
- Systems.
-
- 43 10-24-90 North American ISDN User's Forum
- (Meetings of Special Interest to Computer
- Security Experts)
-
- 45 11-06-90 Call for papers
-
- 47 11-01-90 SCAT / ASIT meeting
-
- 48 11-02-90 SECURTECH '91 / CARDTECH '91 meeting
-
- COMPUTER SECURITY EVENTS CALENDAR
-
- This file contains a list of upcoming computer security events.
- Because of the nature of this material and how it is obtained, it
- is impossible to include every event. The absence or inclusion
- of any particular event does not imply criticism or endorsement
- by the National Institute of Standards and Technology or the
- sysop. If you know of computer security events that are not
- listed, please send the conference/course literature to the
- following:
-
- Marianne Swanson
- National Institute of Standards and Technology
- Room A-216, Bldg. 225
- Gaithersburg, MD 20899
-
-
- More [Y]es,N)o,C)ont,A)bort,J)ump! y
- DATE: 11/12/90
- LOCATION: Atlanta, GA
- SPONSOR: CSI
- TITLE: 17th Annual Computer Security Conference
- CONTACT: Computer Security Institute
- ADDRESS: 500 Howard Street
- San Francisco, CA 94105
- PHONE: (415)267-7651
-
-
- DATE: 11/13/90
- LOCATION: Renfrew, Scotland,UK
- SPONSOR: IPSA
- TITLE: Scotsec '90
- CONTACT: IPSA(Scottish region)
- ADDRESS: P.O. Box 308, Glasgow G44 4BH
- Scotland, U.K.
- PHONE: 041 332 2955
-
-
- DATE: 11/14/90
- More [Y]es,N)o,C)ont,A)bort,J)ump! y LOCATION: San Francisco, CA
- SPONSOR: MIS
- TITLE: Computer Security for Security Professionals
- CONTACT: Pamela Bisset
- ADDRESS: 498 Concord Street
- Framingham, MA
- PHONE: (508)879-7999
-
-
- DATE: 11/28/90
- LOCATION: London, U.K.
- SPONSOR: EAT
- TITLE: Audit & EDP Audit Manager's Symposium
- CONTACT: Penny Moon
- ADDRESS: Mayfield House, 256 Banbury RD
- Oxford, OX2 7DH, U.K.
- PHONE: 44865512242
-
-
- DATE: 12/03/90
- LOCATION: Tucson, AZ
- SPONSOR: IEEE
- CONTACT: Marshall Abrams
- ADDRESS: 7525 Colshire Drive
- Mclean, VA 22102
- PHONE: (703)883-6938
-
-
- DATE: 12/10/90
- LOCATION: Washington, DC
- SPONSOR: WAUUG
- TITLE: FedUnix
- CONTACT: FedUNIX 90
- ADDRESS: 4610 Tournay Road
- Bethesda, MD 20816
- PHONE: (301)229-1062
-
-
- DATE: 02/05/91
- LOCATION: Arlington, VA
- SPONSOR: AFCEA
- TITLE: 2nd Annual Military/Government Computing Conference and Expo
- CONTACT: AFCEA Programs Office
- Fairfax, VA 22033-3899
- PHONE: (703)631-6125
-
-
- DATE: 02/18/91
- LOCATION: Tucson, AZ
- SPONSOR: IFIP
- TITLE: Dependable Computing for Critical Applications
- CONTACT: John F. Meyer
- ADDRESS: 2114B EECS Bldg.
- Ann Arbor, MI 48109-2122
- PHONE: (313)763-0037
-
-
- DATE: 04/01/91
- LOCATION: San Diego, CA
- SPONSOR: ISSA
- TITLE: 8th Annual Working Conference for Information Security Prof.
- CONTACT: ISSA Headquarters
- ADDRESS: P.O. Box 9457
- Newport Beach, CA 92658
- More [Y]es,N)o,C)ont,A)bort,J)ump! y PHONE: (714) 854-5500
-
-
- DATE: 05/15/91
- LOCATION: Brighton, U.K.
- SPONSOR: EAT
- TITLE: 7thInternational Conference and Exhibition on Info. Security
- CONTACT: Penny Moon
- ADDRESS: Mayfield House,256 Banbury Rd
- Oxford, OX2 7DH, U.K.
- PHONE: 44 865 512242
-
-
- DATE: 05/28/91
- LOCATION: Washington, D.C.
- SPONSOR: Information Exchange
- TITLE: SCAT/ASIT '91
- CONTACT: Paul D. Oyer
- ADDRESS: 2026-C Optiz Boulevard
- Woodbridge, VA 22191
- PHONE: (800)223-8128
-
- Computer Security Organizations (7)
-
- Bullet # Last Updated Topic
- -------- ------------ -----
- 71 11-06-89 Computer Security Resource Center (CSRC)
-
- 72 12-03-90 NIST/NCSL Computer Security Division
-
- 73 12-03-90 Overview of NIST/NCSL Functions
-
- 74 03-13-90 Announcement of Internet Security Info Archive
- Computer
-
- NOTE: See file ORGS.TXT in the "General Directory" of this BBS
- for a list of computer security organizations.
-
-
- COMPUTER SECURITY
- RESOURCE CENTER
-
-
- The National Institute of Standards and Technology operates a
- Computer Security Resource Center (CSRC) to help address computer
- security incidents. CSRC is a central point of contact in a
- network of computer security incident response centers. The
- center attempts to facilitate problem solving in both routine and
- emergency situations involving major threats to government and
- other computer systems or networks.
-
- The CSRC can be contacted twenty-four hours a day by dialing
- (301) 975-5200. During normal office hours (8:30 a.m. through
- 5:00 p.m. Eastern Time), a Duty Officer is available, in most
- cases, immediately. After hours, the caller is directed to dial
- a telephone pager which contacts the Duty Officer.
- The CSRC is also a clearinghouse for computer and
- telecommunications security information. The objective is to
- facilitate the exchange of information among government agencies,
- educational institutions, and the private sector.
-
- The NIST Computer Security Bulletin Board system is one mechanism
- to convey information regarding computer and telecommunications
- security. This includes providing bulletins on computer security
- incidents, the user community affected, and the remedies if
- available.
-
- It should be noted that the bulletin board and incident handling
- are just two components of the Resource Center. Other Resource
- Center activities include:
-
- o Determining areas of user interest and the evolving
- nature of various user constituencies;
-
- o Seeking out and working with those who have experience
- with computer security incidents or have developed a
- means of dealing with, preventing, detecting,
-
- o Providing other vehicles by which current and potential
- users and information providers can exchange
- information; and
-
- o Working with others who provide related or comparable
- type services to benefit from their experience and make
- users aware of their services.
-
-
-
- NIST/NCSL has recently started an archive for bulletins and
- announcements issued from computer security response centers
- such as the CERT, CIAC in LLNL/DOE, and the DDN. The archive
- machine is accessible via anonymous FTP over the Internet.
-
- We intend this machine to serve the following functions:
-
- - an archive for security bulletins and alerts issued by
- other resource and response centers, as well as other
- related information and documents
- - general public downloading of security information (via
- anonymous ftp)
-
- The machine name is CSRC.NCSL.NIST.GOV, with IP address of
- 129.6.48.87.
-
- The machine is currently running VAX/VMS as the operating system, and
- FTP syntax is somewhat confusing - it is a mixture of VMS and UNIX.
- When changing directory to a subdirectory, the command is
- CD [.subdir-name] e.g. CD [.CIAC]
- When changing from a subdirectory to the root anonymous directory, the
- command is
- CD [ANONYMOUS]
-
- If you encounter problems or have suggestions, send e-mail to
- POSTMASTER@CSRC.NCSL.NIST.GOV.
-
- RISKS-LIST: RISKS-FORUM Digest Tuesday 23 October 1990 Volume 10 : Issue 55
- File to Download = risks10.55
- Malfunction on Gambling Machine delivers $300,000 Jackpot (John Colville)
- Risks of Modernization (Chuck Weinstock)
- Airliner story (Ellen Cherniavsky)
- Summary of A320 report on W5 (Wayne Hayes)
- Boeing 777 to use fly by wire (Robert R. Henry)
- Re: Technology Meets Dog; Dog Wins (Dan Sandin)
- Stick-up At Banks (Paul Johnson)
- Re: Kasparov's sealed move (Peter Rice)
- Computerized cars and ham radio interference (Rich Wales)
- Programmer error, not language flaw (Stuart Friedberg)
-
- RISKS-LIST: RISKS-FORUM Digest Thursday 18 October 1990 Volume 10 : Issue 54
- File to Download = risks10.54
- Flawed computer chip sold for years (Al Stangenberger)
- The slippery slope of personal identification and tracking (Jerry Leichter)
- Technology Meets Dog; Dog Wins (Sanford Sherizen)
- Pilot error and human factors (ark)
- Re: Airliner story (Bob Sutterfield)
- Re: Closed Captioning at Educom (Gary Coffman, Lauren Weinstein)
-
- RISKS-LIST: RISKS-FORUM Digest Wednesday 17 October 1990 Volume 10 : Issue 53
- File to Download = risks10.53
- Lies, damn lies, and statistics... computer cabin-safety (Robert Dorsett)
- Ada MultiTasking (Edward V. Berard, Bertrand Meyer, Robert Firth,
- Ray Diederich, Brian Hanafee)
- Re: Technophilia-induced problem at Educom? (Miles R. Fidelman)
-
- RISKS-LIST: RISKS-FORUM Digest Wednesday 17 October 1990 Volume 10 : Issue 52
- File to Download = risks10.52
- Re: "Pilot error" and Human Factors (P.F. Spelt)
- Be careful of what you give away! (M. Freeman)
- Re: Technophilia-induced problem at Educom? (Benjamin Ellsworth)
- Passwords and chess (Steve Bellovin)
- "Expert Systems in the Loop" explained (Martyn Thomas)
-
- RISKS-LIST: RISKS-FORUM Digest Tuesday 16 October 1990 Volume 10 : Issue 51
- File to Download = risks10.51
- A Schaching Development in Kasparov-Karpov (anonymous)
- Software problem contributes to woman's death (Mike Overstreet)
- Re: A320s and Northwest Airlines (Craig A. Finseth)
- Technophilia-induced problem at Educom? (R. Aminzade)
-
- RISKS-LIST: RISKS-FORUM Digest Monday 15 October 1990 Volume 10 : Issue 50
- File to Download = risks10.50
- Hackers blackmail UK five banks (Pete Mellor)
- Equinox on A320 (Robert Dorsett)
- Re: A320s and Northwest Airlines (Chris Davis)
- Re: Ada MultiTasking (Chet Laughlin)
- Re: Expert system in the loop (Randall Davis)
- Announcement of CPSR annual meeting (Lesley Kalmin)
-
- RISKS-LIST: RISKS-FORUM Digest Thursday 11 October 1990 Volume 10 : Issue 49
- File to Download = risks10.49
- Programmer error kills phones for 30 minutes (John R. Dudeck)
- Answering Machine Cheats at Phone Tag (Ed McGuire)
- Discovery misprogrammed (Fernando Pereira)
- Airliner story (Rich Epstein via Gene Spafford)
- An IBM interface glitch & RISKS masthead FTP instructions (Lorenzo Strigini)
- Automobile Computer RISKS - A Real Life Experience (Marc Lewert)
- Re: BA 747-400 Engine Failure (Jerry Hollombe)
- Re: Ada and multitasking (Stephen Tihor, Henry Spencer)
-
- RISKS-LIST: RISKS-FORUM Digest Tuesday 9 October 1990 Volume 10 : Issue 48
- File to Download = risks10.48
- Global warming or bad hardware? (Bob Campbell)
- Equinox on A320 (Pete Mellor)
- Ada and multitasking (Erling Kristiansen)
- Re: Arbitration Myths (Bernie Cosell)
- California DMV and Italian publicity (Jon)
- Government routinely ignores Privacy Act (Clifford Johnson)
- Computer sound editors are appropriate technology, not deceipt
- (David A. Honig)
- Operation Sun Devil invades the InterNet? (Jonathan I. Kamens)
- Loving Little Egypt - phone freaks (Dick Karpinski)
- CERT Advisory Update - NeXT Systems (Ed DeHart)
-
- RISKS-LIST: RISKS-FORUM Digest Thursday 4 October 1990 Volume 10 : Issue 47
- File to Download = risks10.47
- California DMV and their new computer (Cecil Lee (2))
- Report of Nat Semi clock chip flaw (Martyn Thomas)
- BA 747-400 Engine Failure (Martyn Thomas)
- CERT Advisory - NeXT systems (Edward DeHart)
- Fair Information Principles (Jeff Johnson)
- Television rating (nee universal listening) device (Tim Wood)
- From under a Rock??? (Subliminal message lawsuits) (Ed Hall)
- Operation Sun Devil invades the InterNet?
- (Ed Luke via Michael Packer via John M. Chapin)
-
- RISKS-LIST: RISKS-FORUM Digest Friday 28 September 1990 Volume 10 : Issue 46
- File to Download = risks10.46
- Sellers Use Computer Glitch to Buy Illegal Winning Lottery Tickets
- (Nathaniel Borenstein)
- Safer to Fly or Drive? (David Levine)
- Re: Expert system in the loop (Matt Jaffe (2))
- Bookkeeping error begs for machine help -- maybe (Jim Purtilo)
- Re: Hi-tech advertising (Brinton Cooper)
- Re: Reliability of the Space Shuttle (Chris Jones, Henry Spencer)
- Automated vehicle guidance systems (Will Martin)
- Computer 'error' in the British RPI (Chaz Heritage via Richard Busch)
-
- RISKS-LIST: RISKS-FORUM Digest Wednesday 26 September 1990 Volume 10 : Issue 45
- File to Download = risks10.45
- More [Y]es,N)o,C)ont,A)bort,J)ump! y Computergate in New Jersey? (Steve Bellovin)
- Whitehall rebuked for 121 million pound Retail Price Index blunder
- (Dorothy Graham)
- Hi-tech advertising (Dave Turner)
- Students taking exams by remote hookups (PGN)
- Sun C2 system (Stephanie Zakrzewski)
- Arbiters (Brian Randell)
- Re: Expert system in the loop (Amos Shapir, Jim Horning, R Horn)
- Reliability of the Space Shuttle (Peter da Silva)
- Illinois Bill (Mark Brader)
-
- RISKS-LIST: RISKS-FORUM Digest Monday 24 September 1990 Volume 10 : Issue 44
- File to Download = risks10.44
- Arbitration Myths (Leslie Lamport, Mark S. Day)
- Overbilled by 6 orders of magnitude (Jeff Johnson)
- Risks of "automated guided vehicles" (Brad Dolan)
- Field commanders using UNIX? (Tom Beattie)
- Expert system in the loop (Matt Jaffe, Clifford Johnson, bahn_pr)
- Apollo, The Race to the Moon (R.I. Cook)
- Failed mail ("after 246 days"!) and comment on long header lines (PGN)
-
- RISKS-LIST: RISKS-FORUM Digest Saturday 22 September 1990 Volume 10 : Issue 43
- Certification
- (Richard Platek, Paul Tomblin, John H. Whitehouse, Alan R Kaminsky,
- Russell C. Sorber, John H. Whitehouse, Frank Houston, BC Tompsett)
- Applicability of software curricula (Jeffrey Mogul)
- Occupational Licensing (Book Review) (Tony Harminc)
-
- RISKS-LIST: RISKS-FORUM Digest Saturday 22 September 1990 Volume 10 : Issue 42
- File to Download = risks10.42
- Arbitration Myths (Peter Denning)
- Re: Security compromise with SUN's C2 package (Li Gong)
- Re: Expert system in the loop
- (Henry Spencer [2], Steven Philipson [2], Walt Thode)
- Railway Safe Working - large analogue systems (Peter Jones)
- Re: I'm 99% Sure You're A Crook!!! (Jerry Hollombe)
- Book suggestion: Apollo, The Race to the Moon (Martin Minow)
- Re: Knight reference: `Shapes of bugs' (Nancy Leveson)
- ACM Conference on Critical Issues in Computing (Harold S. Stone)
-
- RISKS-LIST: RISKS-FORUM Digest Tuesday 18 September 1990 Volume 10 : Issue 41
- File to Download = risks10.41
- Software Certification (Michael J. Konopik, Joe Marshall, Jerry Glomph Black,
-
- RISKS-LIST: RISKS-FORUM Digest Tuesday 18 September 1990 Volume 10 : Issue 40
- File to Download = risks10.40
- Software Unreliability and Social Vulnerability (Perry Morrison)
- DTI/SERC Safety Critical Systems Research Programme (Brian Randell)
- Canadian Transportation Accident Investigation (Brian Fultz)
- Risk of Collision (Brian Fultz)
- Knight reference: `Shapes of bugs' (Pete Mellor)
-
- RISKS-LIST: RISKS-FORUM Digest Tuesday 18 September 1990 Volume 10 : Issue 39
- File to Download = risks10.39
- Poetic Justice in a Machine Crash (Andy Glew via Paul Eggert)
- Re: Expert system in the loop (Clifford Johnson, Peter G. Rose, Jeff Johnson)
- I'm 99% Sure You're A Crook!!! (mmm)
- A Nightmare: Security compromise with SUN's C2 package (Caveh Jalali)
- Another risk of phone systems [anonymous]
- Desktop Publishing Fraud (Sanford Sherizen)
- Data cowboys and database abuse - applicant screening (Rodney Hoffman)
- Inside risks of INSIDE RISKS (PGN)
-
-
- VIRUS-L Digest Thursday, 25 Oct 1990 Volume 3 : Issue 174
- File to Download = virusl3.174
- Defense Against Computer Viruses
- Possible virus on Commodore
- Reply ot Dave Chess re stealth detector (PC)
- Oct 23??
- Re: Possible Infection (GHOSTBUSTERS)
- Diagnosing a computer virus (IBM MVS)
- Cascade ? / Recursive Subdirectories / Virus Requests
- Re: New MacVirus? (Mac)
- Plastique/Anti-CAD viruses (PC)
- Request re book references
-
- VIRUS-L Digest Friday, 19 Oct 1990 Volume 3 : Issue 173
- File to Download = virusl3.173
- Cascade virus? (PC)
- "Common" viruses (PC)
- Regular McAfee posts....
- Checking during Desktop Rebuild (Mac)
- Probably not a virus (Mac)
-
- VIRUS-L Digest Thursday, 18 Oct 1990 Volume 3 : Issue 172
- File to Download = virusl3.172
- Administrivia, please read
- Stoned Distribution (PC)
- RE:Ohio Virus found at UTMB (PC)
- telecom virus
- Federman's comments
- Postscript Trojan Horse
- Re: Beware of researchers
- Need anti-viral for music virus.
- New MacVirus?
- Re: Could this be a virus? (PC)
-
- VIRUS-L Digest Wednesday, 17 Oct 1990 Volume 3 : Issue 171
- File to Download = virusl3.171
- Re: Alleged PostScript virus
- Re: Possible Infection (GHOSTBUSTERS)
- Possible virus artifact in DR-DOS v5?
- Re: Beware of some virus researchers
- re: OHIO virus found at UTMB (PC)
- Heriot-Watt Archive Update
- Avoiding anti-viral inits (Mac)
- Ohio Virus/Postscript trojan
- Re: Help with Jerusalem B (PC)
- Viruses in Shrink-Wrapped Software - Soliciting Reports of Incidents
- About "Stoned" - variants and removal
- PC Ciling (PC)
- PC Virus Defense
- Postscript Trojan. Was alleged post...
-
- VIRUS-L Digest Monday, 15 Oct 1990 Volume 3 : Issue 170
- File to Download = virusl3.170
- re:Help with Jerusalem virus (PC)
- Otto Stoltz Posting, Oct. 10, 1990
- Slightly clearer translation
- Alleged Postscript Virus
- Re: Alleged PostScript virus.
- virus outbreak in Richmond, VA
- Author name correction
- OHIO virus found at UTMB (PC)
- re: Jerusalem B (PC)
- Re: mac virus(?) in school machines (Mac)
- Re: Request for Article/ ? Procedures
- Scan v67 and killer.com (PC)
- VIRUS-L indices and misc administrivia
-
- VIRUS-L Digest Thursday, 11 Oct 1990 Volume 3 : Issue 169
- File to Download = virusl3.169
- Re: Is it a virus? (PC)
- Yet another info about the saddam virus (PC)
- Re: Jerusalem B (PC)
- Windows Trojan ? (MS-DOS)
- Australian archives
- Computer System Vulnerability
- Hypercard virus. Anybody seen it? (Mac)
- Possible Boot-Sector Virus in Shrink-Wrapped Software (PC)
- Re: Possible Boot-Sector Virus in Shrink-Wrapped Software (PC)
- re: Detecting Stealth Virus (PC)
- Unix Antiviral Product - Looking (UNIX)
- HELP!! (PC)
- Alleged PostScript virus
-
- File to Download = virusl3.168
- re: Help with Jerusalem virus (PC)
- New Virus - The Saddam Virus (PC) (INFO)
- Request for info on Joshi (PC)
- mac virus(?) in school machines (Mac)
- Origin of mem-stat.sys file in my rootdir? (PC)
- Detecting Stealth Virus (PC)
- More (small) info about Saddam Virus (PC)
- re: is this a virus? (pc)
- Virus Software Advice
- New files on MIBSRV (PC)
-
- VIRUS-L Digest Friday, 5 Oct 1990 Volume 3 : Issue 167
- File to Download = virusl3.167
- Help with Jerusalem virus (PC)
- Is it a virus? (PC)
- Disk write loses 10 characters --- a virus? (PC)
- Beware of some virus researchers
- RE - SAM & ANTI (Mac)
- Request for info
- Documentation sought
- Virus prevention
- UK virus centre, Part 2
- Re: 4096 virus info, in German (PC)
- German translation of 4096 info (PC)
-
- VIRUS-L Digest Thursday, 4 Oct 1990 Volume 3 : Issue 166
- File to Download = virusl3.166
- VIRUS-L index question
- Anti-viral archive sites, introduction
- Anti-viral archive sites, email access
- amiga anti-viral sites
- apple.ii anti-viral sites
- atari.st anti-viral sites
- docs anti-viral sites
- ibmpc anti-viral sites
- mac anti-viral sites
- unix anti-viral sites
-
- VIRUS-L Digest Thursday, 4 Oct 1990 Volume 3 : Issue 165
- File to Download = virusl3.165
- Disk write loses 10 characters --- a virus?
- Icon displays (Mac)
- Jerusalem B (PC)
- New files on MIBSRV (PC)
- Re: New Virus Strain (Mac)
- Re: Viruses in Sound Effects (Mac)
- Printed information about worms, viruses, and security
- OS specific viruses
- _Possible_ NEW Yom Kippur virus alert?? (Mac)
- New? Amiga virus (Amiga)
- Disinfectant 2.2 (Mac)
- Question about Whale Virus (PC)
- NEW VIRUS - The Saddam Virus (PC)
- Re: viruses in sound effects (Mac)
-
- VIRUS-L Digest Monday, 1 Oct 1990 Volume 3 : Issue 164
- File to Download = virusl3.164
- Mac Files (Mac)
- Re: viruses in sound effects (Mac)
- Review the Literature
- VIRUS Software for VAX/VMS
- Looking for Utilities for virus checking on the APPLE GS
- New Virus Strain (Mac)
- Re: Viruses in Sound Effects (Mac)
- Re: Help, I may have a virus (Virus-L, V#3, #161) (PC)
- Re: Jerusalem B (PC) reinfection despite using VSHIELD?
- Re: Viruses in Sound Effects (Mac)
- Stoned info (PC)
- Infection management and privacy
-
- VIRUS-L Digest Thursday, 27 Sep 1990 Volume 3 : Issue 163
- File to Download = virusl3.163
- Re: STONED virus (PC)
- High school student unleashes viruses (REPRINT)
- Re: Viruses in Sound Effects (Mac)
- Re: Help, I may have a virus. (PC)
- Re: Help, I may have a virus. (PC)
- Cliff Stoll is *AGAIN* on TV next week - PBS' NOVA this time
-
- VIRUS-L Digest Tuesday, 25 Sep 1990 Volume 3 : Issue 162
- File to Download = virusl3.162
- Re: Is this a VIRUS? (PC)
- Jerusalem B (PC) reinfection despite using VSHIELD?
- Thanks for the help (Mac)
- Re: Viruses in Sound Effects (Mac)
- Book review
-
- VIRUS-L Digest Monday, 24 Sep 1990 Volume 3 : Issue 161
- File to Download = virusl3.161
- Re: STONED virus (PC)
- Accucard (PC)
- Re: a long time ago (PC)
- Help, I may have a virus. (PC)
- XEMAG.SYS (PC)
- Difficulty with F-Prot package (PC)
- ABC Virus (PC)
- Is this a VIRUS? (PC)
- Anti-Virus Viruses
- Yankee doodle dandy (PC)
-
- VIRUS-L Digest Friday, 21 Sep 1990 Volume 3 : Issue 160
- File to Download = virusl3.160
- Anomoly contd (Mac)
- forwarded message (suspected virus) (PC)
- Viruses in Sound Effects (Mac)
- Re: Emulation
- Virus book/article
- Re: Mac misbehavior (Mac)
- Application-specific viruses (PC)
-
- VIRUS-L Digest Wednesday, 19 Sep 1990 Volume 3 : Issue 159
- File to Download = virusl3.159
- Emulation?
- redistribution of viruses.
- V&S
- anti-virus viruses (AVV's)
- Stoned virus (PC)
- Re: Measuring the Spread of Viruses
- a long time ago (PC)
- Mac misbehavior (Mac)
- The Problem With Self-Limiting Viruses (was Re: Anti-virus viruses)
- New viruses? (MAC)
- Is there a LaserWriter attacking virus? (Mac)
- Mac Anomolies with AppleShare & Ethernet (Mac)
- AUTOEXEC.BAT (PC)
-
- VIRUS-L Digest Tuesday, 18 Sep 1990 Volume 3 : Issue 158
- File to Download = virusl3.158
- Re: EEPROM BIOS (PC)
- Re: SCANRES (PC)
- The Telecomm Virus (PC)
- Re: OS/2 Viruses (OS/2)
- Measuring the Spread of Viruses
- Re: Who should get what viruses
- Re: Anti-virus viruses
- Re: Whale Virus Information (PC)
- 1559 virus, Drew U. has been hit (again) (PC)
- Whale virus (PC)
-
- Bullet # Last Updated Topic
- -------- ------------ -----
- 61 01-29-90 Where to obtain computer security posters
-
- 62 01-22-90 Order form for NSCS documents (Orange book, etc.)
-
- Note: A list of computer security videos can be
- downloaded using the file VIDEOS.TXT in the Resources
- Directory of this BBS.
-
- 51 08-07-90 A Bill to amend Title 18 of the United States Code
- to clarify and expand legal prohibitions against
- computer abuse was introduced in the Senate on
- April 19, 1990.
-
-
- NOTE: The "Data Encryption Standard (DES) Fact Sheet" has been
- superseded by the "Data Encryption Standard (DES) Bulletin"
- that was just issued by NIST. The Bulletin can be
- downloaded from the "General Information" directory on
- this bbs.
-
- Bullet # Last Updated Topic
- -------- ------------ -----
- 41 10-31-90 Computer security conferences and
- courses available through May, 1991.
-
- 42 05-14-90 Lecture Series on High Integrity
- Systems.
-
- 43 10-24-90 North American ISDN User's Forum
- (Meetings of Special Interest to Computer
- Security Experts)
-
- 45 11-06-90 Call for papers
-
- 47 11-01-90 SCAT / ASIT meeting
-
- 48 11-02-90 SECURTECH '91 / CARDTECH '91 meeting
-
- ALERTS Archive of Computer Security Alerts and Remedies
-
- EVENTS Events & Activities
-
- GENERAL General Information
-
- PUBS Security Publications
-
- RISKS Risk Forums from the Internet
-
- RESEARCH Research Activities
-
- RESOURCES Products, Services & Resources
-
- VIRUSL Virus-l Bulletins from the Internet
-
- RBBS Software for this bulletin board
-
- What directory(s) (A)ll,L)ist,E)xtended +/-, [Q]uit)? a
- Scanning directory ALL - All files
- RBBS-EXE.ZIP 302938 02-14-90 Executable files.
- RBBS-DOC.ZIP 269542 02-14-90 Documentation for RBBS-PC
- RBBS-TXT.ZIP 114169 02-14-90 System text files used by RBBS-PC.
- RBBSSEXE.ZIP 18351 02-14-90 RBBS-PC.EXE. Smaller,faster,min. debugging.
- RBBS-EXT.ZIP 68256 02-14-90 External protocol drivers
- RBBS-UTL.ZIP 24981 02-14-90 Miscellaneous RBBS-PC utilities.
- RISKTOOL.TXT 33866 10-22-90 Description of automated Risk Management
- Packages that NIST/NCSC Risk Management Laboratory have examined
- REVBLT.TXT 13656 10-10-90 NIST Bulletin "Review of Federal Agency
- Computer Security and Privacy Plans (CSPP): A Summary Report (10/90)
- GLOSBLT.TXT 6727 10-10-90 NIST Bulletin "Bibliography of Computer
- Security Glossaries (9/90)
- VIRUSBLT.TXT 23740 07-19-90 NIST Bulletin that discusses computer
- viruses and other related threats (8/90)
- TRUSTBLT.TXT 14787 07-19-90 NIST Bulletin - Guidance on the use of
- trusted systems (7/90)
- DESBLT.TXT 24331 06-27-90 NIST Bulletin - Data Encryption Standard
- (6/90)
- DES.TXT 22455 06-05-90 Data Encryption Standard Fact Sheet
- DESVAL.TXT 3456 05-31-90 A list of products (and associated vendors)
- that have been validated as meeting FIPS Pub 46, The Data Encryption
- Standard. This file also includes the date of validation for each product.
- that have been validated as meeting options in ANSI X9.17, Financial
- Institution Key Management (Wholesale).
- MAC.TXT 6867 05-30-90 A list of products (and associated vendors)
- that have been validated as meeting FIPS 113, Computer Data Authentication
- and options (as specified) of ANSI X9.9, American National Standard for
- Financial Institution Message Authentication (Wholesale).
- TECHDES.TXT 34802 05-30-90 A technical information list of products
- that have been validated as meeting FIPS Pub 46.
- READLIST.TXT 12766 05-02-90 Abbreviated bibliography of selected works
- about computer viruses, worms, and related issues
- VIDEOS.TXT 36258 01-02-90 List of comp. security videos
- TECHPAP.TXT 49808 01-02-90 Bibliography of technical papers (1988)
- REPORTS.TXT 63155 01-02-90 Biblio of comp. security reports ('76-'88)
- PERIODIC.TXT 34760 01-02-90 Biblio of comp. security periodicals ('88)
- MANUALS.TXT 9200 01-02-90 Biblio of comp. security manuals ('88)
- GUIDELIN.TXT 95570 01-02-90 Biblio of comp. security guidelines('74-'88)
- BOOKS.TXT 41607 01-02-90 Biblio of comp. security books ('73-'88)
- ARTICLES.TXT 161517 01-02-90 Biblio of comp. security articles ('83-'88)
- FTPSITES.TXT 35737 01-02-90 List of FTP sites on Internet
- ORGS.TXT 8219 01-01-90 List of computer security orgs
- RISKS10.55 23170 10-25-90
- RISKS10.54 19681 10-25-90
- RISKS10.52 10329 10-25-90
- RISKS10.51 16911 10-25-90
- RISKS10.50 21546 10-25-90
- RISKS10.49 20717 10-25-90
- RISKS10.48 22542 10-25-90
- RISKS10.47 59252 10-25-90
- RISKS10.46 48782 10-25-90
- RISKS10.45 18669 10-25-90
- RISKS10.44 23383 10-25-90
- RISKS10.43 28717 10-25-90
- RISKS10.42 29524 10-25-90
- RISKS10.41 19301 10-25-90
- RISKS10.40 26253 10-25-90
- RISKS10.39 22427 10-25-90
- NEWSLTR.TXT 18282 10-11-90 NCSL Newsletter (August 1990)
- CSLAW.TXT 14336 07-17-90 "Computer Security and the Law." by Gary
- Morris - good doc on legal issues with regard to computer security
- VSUM9005 51200 07-13-90 May 1990 Summary of known viruses
- CATALOG.ZIP 4480 07-13-90 Catalog of latest viruses
- ASIT.ZIP 06-12-90 Implementing an Access Control System with
- Smart Token Technology by Dray, Smid, and Warner, NIST -- describes a
- token based access control system designed to eliminate problems with
- More [Y]es,N)o,C)ont,A)bort,J)ump,V)iew,D)ownload! y password-only systems.
- SP500166.ZIP 39650 06-06-90 Special Pub 500-166 Computer Viruses and
- Related Threats - ASCII version
- SP166_PS.ZIP 74603 06-06-90 Special Pub 500-166 - PostScript format
- TEMPEST.ZIP 18145 06-06-90 Eavesdropping on the electronic emanations
- of digital equipment, by C. Seline
- 12TRICKS.TXT 13066 06-05-90 12 Tricks Trojan Information
- ALLVIRUS.TXT 21888 06-05-90 Jim Goodwin's PC Virus Listing
- CVM.TXT 23552 06-05-89 Computer Virus Myths
- EVAL.TXT 26112 05-04-89 Anti-Viral Product Evaluation - 5/5/89
- GLATH.ZIP 10240 06-04-90 "Computer Viruses: A Relational View"
- HACKER.ZIP 46961 06-04-90 The social organisation of the computer
- underground, Thesis, G. Meyer, Illinois
- IDENTIFY.TXT 20650 06-04-89 Developing Virus Identification Products
- KIEL.ZIP 15616 06-04-90 "Infection of PCs" by Kiel and Lee
- LEVINE.ZIP 7296 06-04-90 "Potential Virus Attack" by L.P. Levine
- VIRLV2.221 23552 06-04-90 Info on Anti-Viral products from VIRUS-L
- VIRUSSUM.DOC 95736 05-29-90 Summary of Known PC Viruses
- GAO_RPT.ZIP 38820 05-26-90 GAO Report on the Internet Worm
- HORMONES.TXT 19511 05-26-90 Paper on infection control in networks by
- David Stodolsky
- IBM.ZIP 26852 05-26-90 IBM paper on Computer Viruses
- IMPLPGMS.TXT 42307 05-26-90 John McAfee on Implemeting Virus Prevention
- MAC_GDE.TXT 5833 05-26-90 Guide to fighting viruses on MacIntoshes
- MIT.ZIP 112645 05-26-90 MIT report on the Internet Worm - in
- PostScript only
- RSA.TXT 16926 05-26-90 MD4 Message digest algorthm notes for
- digital signature applications
- TR823.DOC 106655 05-26-90 Purdue report on the Internet Worm by
- Eugene Spafford
- TR823.ZIP 112645 05-26-90 Same as above, in PostScript
- VDETECT.TXT 13613 05-26-90 Describes model for a universal virus
- detector by Chris Ruhl and James Molini
- VIRLIST1.TXT 19389 05-26-90 List of known viruses in U.K. by Joe Hirst
- VIRLIST2.TXT 32045 05-26-90 Describes some new viruses, by Alan Solomon
- VIRUS101.ZIP 25444 05-26-90 Virus fundamentals in DOS and Atari ST
- UNIXSEC.ZIP 111642 05-11-90 Great! Unix Security in PostScript format
- SP4Rpt.txt 45721 04-11-90 Report on NIST Research Effort on SP4
- Secure Protocol under OSI
- MGTGUIDE.TXT 24424 12-01-89 Special Pub "Management Guide to the
- Protection of Information Resources"
- EXEGUIDE.TXT 23477 12-01-89 Special Pub "Executive Guide to the
- Protection of Information Resources"
- USRGUIDE.TXT 16034 12-01-89 Special Pub "Computer Users' Guide to
- the Protection of Information Resources"
- Software Maintenance
- LIST91.TXT 25984 12-01-86 Complete List of Security Pubs
- ADDEND88.TXT 7000 10-01-89 Addendum to List88
- LIST88.TXT 74201 08-01-89 Complete List of NCSL Pubs
- FIPS.TXT 80854 06-01-89 Complete List of FIPS Pubs w/Prices
- V3_100_N.ZIP 18927 10-24-90 Index of Virusls from 100 to current
- V3I_MAC.ZIP 7411 06-26-90 Index of MacIntosh articles, Issues 1 - 99
- V3I_MISC.ZIP 16372 06-26-90 Index of misc. articles, Issues 1 - 99
- V3I_PC.ZIP 14889 06-26-90 Index of PC articles, Issues 1 - 99
- V3_1_9.ZIP 72648 06-26-90 Virus-l Volume 3 Issues 1 - 9
- V3_10_19.ZIP 70796 06-26-90 Virus-l Volume 3 Issues 10 - 19
- V3_20_29.ZIP 105807 06-26-90 Virus-l Volume 3 Issues 20 - 29
- V3_30_39.ZIP 100202 06-26-90 Virus-l Volume 3 Issues 30 - 39
- V3_40_49.ZIP 123921 06-26-90 Virus-l Volume 3 Issues 40 - 49
- V3_50_59.ZIP 75265 06-26-90 Virus-l Volume 3 Issues 50 - 59
- V3_60_69.ZIP 74444 06-26-90 Virus-l Volume 3 Issues 60 - 69
- V3_70_79.ZIP 87808 06-26-90 Virus-l Volume 3 Issues 70 - 79
- V3_80_89.ZIP 93060 06-26-90 Virus-l Volume 3 Issues 80 - 89
- V3_90_99.ZIP 104861 06-26-90 Virus-l Volume 3 Issues 90 - 99
- V3100_09.ZIP 94791 08-20-90 Virus-l Volume 3 Issues 100 - 109
- V3110_19.ZIP 108924 08-20-90 Virus-l Volume 3 Issues 110 - 119
- V3120_29.ZIP 74359 08-20-90 Virus-l Volume 3 Issues 120 - 129
- V3140_49.ZIP 121879 09-18-90 Virus-l Volume 3 Issues 140 - 149
- V3150_59.ZIP 97380 10-24-90 Virus-l Volume 3 Issues 150 - 159
- V3160_69.ZIP 76687 10-24-90 Virus-l Volume 3 Issues 160 - 169
- VIRUSL3.174 19113 10-24-90
- VIRUSL3.173 8179 10-24-90
- VIRUSL3.172 13357 10-24-90
- VIRUSL3.171 25811 10-24-90
- VIRUSL3.170 23698 10-24-90
- VIRUSL3.169 23832 10-24-90
- VIRUSL3.168 17186 10-24-90
- VIRUSL3.167 18308 10-24-90
- VIRUSL3.166 21217 10-24-90
- VIRUSL3.165 29714 10-24-90
- VIRUSL3.164 23066 10-24-90
- VIRUSL3.163 9642 10-24-90
- VIRUSL3.161 10860 10-24-90
- VIRUSL3.160 10825 10-24-90
- EVENTCAL TXT 3936 10-31-90 Computer Security Courses & Conferences
- Ann_Conf.txt 17364 01-01-90 List of computer security conferences
- NIST02.TXT 4238 09-22-89 COLUMBUS DAY VIRUS FACT SHEET
- NIST01.TXT 5761 09-22-89 COLUMBUS DAY VIRUS PRESS RELEASE
- CIACA19.TXT 2969 03-06-90 UNIX INTERNET ATTACK ADVISORY
- CIACA17.TXT 5739 03-06-90 ERADICATING WDEF USING DISINFECTANT 1.5-6
- CIACA16.TXT 2709 01-29-90 SUN SENDMAIL VULNERABILITY
- CIACA14.TXT 4538 01-23-90 BREAKIN USING ENCODE-DECODE ON SUN UNIX
- CIACA11.TXT 1782 01-04-90 TEXAS INSTRUMENTS D3 PROCESS CONTROL
- SYSTEM PROBLEMS
- CIACA10.TXT 2625 12-19-89 PC AIDS TROJAN HORSE ALERT
- CIACA9.TXT 4976 12-18-89 MACINTOSH WDEF VIRUS ALERT
- CIACA8.TXT 3171 11-29-89 UNICOS O-S PROBLEMS
- CIACA6.TXT 3818 11-07-89 NORTON UTILITIES TROJAN HORSE
- CIACA5.TXT 5292 11-01-89 SUN RCP VULNERABILITY
- CIACA4.TXT 5328 10-30-89 NEW VERSION OF WANK WORM
- CIACA3.TXT 12129 10-20-89 TOOLS TO CHECK SPREAD OF WANK WORM
- CIACA2.TXT 10985 10-16-89 W.COM WORM ON VAX-VMS
- CIACA1.TXT 4260 10-09-89 FTP BREAKINS ON UNIX
- TFTP2.TXT 1469 06-05-89 PATCH FOR ABOVE HOLES
- TFTP1.TXT 2959 06-05-89 SECURITY HOLES IN UNIX
- TELNET_T.TXT 3505 06-05-89 BOGUS TELNET ON INTERNET
- RESTORE.TXT 3326 06-05-89 PROBLEMS WITH SUNOS RESTORE
- RCP_RDIS.TXT 24412 06-05-89 RCP, RDIST VULNERABILITIES IN BSD UNIX
- NVIR.TXT 2602 06-05-89 NVIR VIRUS ON MACINTOSH
- NCSA_TEL.TXT 3027 06-05-89 PROBLEMS WITH NCSA TELNET
- JERUSALE.TXT 1598 06-05-89 NEW STRAIN OF JERUSALEM VIRUS
- 386I.TXT 1845 10-30-89 AUTHENTICATION BYPASS IN SUN 386I
- SPAN04.TXT 4412 10-30-89 PROTECTING THE DECNET ACCOUNT
- SPAN03.TXT 7680 10-30-89 VARIANT OF WANK WORM
- SPAN02.TXT 1651 10-23-89 MORE PROTECTION MEASURES
- SPAN01.TXT 18179 10-19-89 DECNET WANK WORM PROTECTION MEASURES
- DDN90.01 4020 01-25-90 SECURITY INCIDENT REPORTING
- DDN06.TXT 2940 11-01-89 SUN RCP VULNERABILITY
- DDN05.TXT 4100 10-23-89 ULTRIX 3.0 BREAK-IN ATTEMPTS
- DDN04.TXT 3067 10-23-89 HALLOWEEN PRECAUTIONARY NOTE
- DDN03.TXT 11011 10-18-89 W.COM ("WANK") WORM ON SPAN NETWORK
- DDN02.TXT 3523 10-05-89 COLUMBUS DAY-DATACRIME VIRUS
- DDN01.TXT 2951 09-22-89 DDN SECURITY COORDINATION CENTER
- CERT13.TXT 2815 01-30-90 GPO DISK INFECTED WITH VIRUS
- CERT12.TXT 2115 01-29-90 SUN SENDMAIL VULNERABILITY
- CERT11.TXT 749 10-26-89 SUN RCP HOLE
- CERT10.TXT 8702 10-17-89 DECNET WANK WORM
- CERT09.TXT 2838 10-08-89 ULTRIX 3.0 ADVISORY
- CERT08.TXT 2416 10-08-89 ULTRIX 3.0 BREAK-IN ATTEMPTS
- CERT07.TXT 19089 09-22-89 COLUMBUS DAY-DATACRIME VIRUS
- CERT06.TXT 4614 08-16-89 TELNET FTP-TELNET HOLES
- CERT05.TXT 2249 07-26-89 SUN RESTORE HOLE
- CERT04.TXT 4668 12-21-88 UNIX PASSWD FILE HOLE
- CERT02.TXT 3613 12-07-88 FTP DAEMON HOLE
- CERT01.TXT 3613 12-07-88 INTERNET WORM BREAK-IN
- PKZ110.EXE 149248 05-11-90 Zip, Unzip tools
- End list. R)elist, [Q]uit, or download what? q
-
- Help is available by entering one of the following topics:
-
- FILE - general help with file section commands
- MAIN - general help with main section commands
- UTIL - general help with utility section commands
- LIBR - general help with library section commands
- ZIP - what ZIPed files are and how to use them
- JUMP - How to use the RBBS-PC "jump" option
- SMARTEXT - A demo of RBBS-PC's "Smart Text" feature
- RBBS-PC - How to get a copy of RBBS-PC for your own use.
-
- For help with a particular command, type the letter, e.g. 'Q' for
- help with the QUIT command. For more details on the HELP system, enter 'H'.
-
- Help with what Command (or TOPIC name) ([ENTER] quits)?
-
- MAIN command <?,A,B,C,E,F,H,I,K,P,Q,R,S,T,U,V,W,X>! w
- Node 1 Online at 2400 BAUD: MARK DUBOIS PEORIA, ILLINOIS
- Node 2 Online at 2400 BAUD: DIRK COLLINS CHELSEA, MASSACHUSETTS
- Node 3 Waiting for next caller
- Node 4 Waiting for next caller
- Node 5 Waiting for next caller
-
- This Bulletin Board has material about computer security, micro topics,
- and the National Computer Systems Laboratory. Mention of vendors or
- product names does not imply criticism or endorsement by the National
- Institute of Standards and Technology or by the SYSOP.
-
- ┌────────────────┐
- │ ┌────────────┐ │
- │ │ │ │
- │ │ Welcome to │ │ ┌─┬───────────────────────┬─┐
- │ │ RBBS-PC! │ │ │o│ Your Sysop: │o│
- │ │ │ │ │o│ Marianne │o│
- ┌─.....─┐│ └────────────┘ │ │o│ Swanson │o│
- └╥────╥─┘└─╥────────────╥─┘ │o│ Data: (301) 948-5717 │o│
- ┌────────────────────────────┐ │o│ Voice: (301) 975-3359 │o│
- │ ▓▓▓▓ ┌─────┐┌─────┐ │ │o│ │o│
- │ │═╪═╪═││═╪═╪═│ │ ┌───────────────────────────────┐
- │░░░░░░░░░░░ └─────┘└─────┘ │ │ ╞▓
- └╥╥╥╥╥╥╥╥╥╥╥╥╥╥╥╥╥╥╥╥╥╥╥╥╥╥╥╥┘ └╥─────────────────────────────╥┘
-
-
-
-
-
-
-
-
-
- **********************************************************************
- * NOTE: By continuing, you explicitly acknowledge that all messages, *
- * private and public, may be read by others, including the sysop(s). *
- **********************************************************************
-