[810] in Intrusion Detection Systems
Introductions
daemon@ATHENA.MIT.EDU (Justin J. Lister)
Thu Dec 12 05:25:16 1996
From: ruf@wraith.cs.uow.edu.au (Justin J. Lister)
To: ids@uow.edu.au (Intrusion Detection System Mailing List)
Date: Thu, 5 Dec 1996 13:58:10 +1100 (EST)
Reply-To: ids@uow.edu.au
-----------------------------------------------------------------------------
From: "Jesus M. Usechi" <usechi@tlaloc.imta.mx>
Message-ID: <Pine.SGI.3.95.961126091841.23343A-100000@tlaloc.imta.mx>
hello,
I am s system administrator for a Mexican company. I'm in charge of the
Network stuff, that means TCP/IP, security, Novell, etc. I'm in charge of
the Web design too.
My main interest is in networking and security systems.
__^__ __^__
( ___ )--------------------------------------------------------(_____)
| | Jesus M. Usechi Velategui | |
| | Novell Netware, UNIX & Internet System Administrator | |
| | IMTA's Web Page Designer | |
| | Instituto Mexicano de Tecnologia del Agua | |
|___| http://www.imta.mx/~usechi |___|
(_____)-------------- E-mail:usechi@tlaloc.imta.mx ------------(_____)
-----------------------------------------------------------------------------
From: "William Beem" <wrbeem@gate.net>
Message-Id: <199612012358.SAA46362@osceola.gate.net>
Hello, list:
In keeping with the request for new members, I just want to introduce
myself. I work for the Lucent Technologies Network Management Center in
Maitland, FL...just outside Orlando. In addition to my day job
considerations, I'm also an author with a tendency to write about network
programming and security issues.
--William
-----------------------------------------------------------------------------
From: Paulo Sergio Pagliusi <pagliusi@dcc.unicamp.br>
Message-Id: <199612021727.PAA26088@xingu>
Hello out there...
I'm Pagliusi, from Brazil, a post graduating student in Computer Science, of
the University of Campinas (UNICAMP). I'm really interested to learn about
e-mail security, in special about security of Mail Users Agents (MUA) and
Mail Transfer Agents (MTA). I'd like to change experiences with others
students about this area. If you like the same things that I do, please
send me a message.
Regards. Paulo Pagliusi
-----------------------------------------------------------------------------
From: Anton Bouwer <anton@iafrica.com>
Message-ID: <32A4A2A9.2AA2@iafrica.com>
Hi
My name is Anton Bouwer and I am head of computer audit at a large
financial institution in South Africa.
As an auditor I have to advise management on issues such as remote
access (via dial-up), and the risks it exposes a company to. It has been
well documented that a hacker could tap a telephone line and "view" data
going across that line. (Datascopes etc.)
I would like to know, in technical terms, how this would be done, i.e.
how can I simulate such an attack as part of my audit tests. I would
also appreciate any other input on the subject of remote access risks.
Thank you
Anton Bouwer
-----------------------------------------------------------------------------
--
+---------------------+--------------------------------------------------+
| ____ ___ |-= Justin Lister email: ruf@uow.edu.au =-|
| | \\ /\ __\ | Center for Computer Security Research (CCSR) |
| | |) / \_/ / |_ | Dept. Computer Science, University of Wollongong |
| | _ \\ /| _/ | ZenMsg: Computer Security a utopian dream.|
| |_/ \/ \_/ |_| (tm) |-= prefix: +61-42 =- Disclaimer: dream own risk.|
| |-= fax: 214329 mobile: 0412139269 voice: 835114 =-|
+---------------------+--------------------------------------------------+