Hackers Targeting Home Computers

lynn.wheeler at firstdata.com lynn.wheeler at firstdata.com
Mon Jan 7 10:10:25 EST 2002


lots of ISPs provide no-server, dial-up service .... they could start with
blocking HTTP & other server-type requests going to such ip-address/modem
subpools (i.e. customers that are getting dynamic ip address on dial-up
lines and have specific service agreements that preclude "server-type"
operation on those dial-up service).

some related discussion in various news groups:
http://www.garlic.com/~lynn/2001m.html#27 Internet like city w/o traffic
rules, traffic signs, traffic lights and traffic enforcement
http://www.garlic.com/~lynn/2001m.html#28 Internet like city w/o traffic
rules, traffic signs, traffic lights  and traffic enforcement
http://www.garlic.com/~lynn/2001m.html#29 Internet like city w/o traffic
rules, traffic signs, traffic lights and traffic enforcement
http://www.garlic.com/~lynn/2001m.html#30 Internet like city w/o traffic
rules, traffic signs, traffic lights and traffic enforcement
http://www.garlic.com/~lynn/2001m.html#31 Internet like city w/o traffic
rules, traffic signs, traffic lights   and traffic enforcement
http://www.garlic.com/~lynn/2001n.html#30 FreeBSD more secure than Linux
http://www.garlic.com/~lynn/2001n.html#71 Q: Buffer overflow
http://www.garlic.com/~lynn/2002.html#20 Younger recruits versus
experienced veterans  ( was Re: The demise  of compa
http://www.garlic.com/~lynn/2002.html#24 Buffer overflow
http://www.garlic.com/~lynn/2002.html#25 ICMP Time Exceeded
http://www.garlic.com/~lynn/2002.html#26 Buffer overflow




hh at hackhawk.net on 1/4/2002 2:08 pm wrote:

It surprises me that providers like Earthlink & GTE (I have one DSL on
each) aren't taking measures to filter out virus traffic from infected
systems.  It seems a simple enough task to me.

It seems to me that the biggest cause of the problems are ignorance and
lack of concern as the article suggests.  So rather than complain and rant,

I've setup a non-technical alert list for my friends and family to keep
them informed and safe.

I try to keep the list fun and easy to read.  Its taken a great deal of
time and explaining, but slowly more and more of them are beginning to see
the bigger picture.

My favorite scenario to lay out for my friends is simple and
effective.  Lets say that a hacker gains control of your computer and uses
it to attack another site/system.  Lets say that site is a Fortune 500
company or a military or government site.  Even if you don't get into
trouble, the FBI could still show up on your door step and take your
computer away for analysis.  No more email or web for you.  Oh, and they'll

probably need to sift through your phone records to see if the hacker
dialed out from your computer.  Kiss your privacy goodbye.






---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com




More information about the cryptography mailing list