[2342] in Security FYI
[IS&T Security-FYI] SFYI Newsletter, November 8, 2010
daemon@ATHENA.MIT.EDU (Monique Yeaton)
Mon Nov 8 13:09:47 2010
Message-Id: <E4C9F01B-78B5-4606-AC5F-8DA9572FEDDB@mit.edu>
From: Monique Yeaton <myeaton@mit.edu>
To: ist-security-fyi@mit.edu
Mime-Version: 1.0 (Apple Message framework v936)
Date: Mon, 8 Nov 2010 13:08:19 -0500
Cc: itss@mit.edu
Content-Type: multipart/mixed; boundary="===============1835006064=="
Errors-To: ist-security-fyi-bounces@mit.edu
--===============1835006064==
Content-Type: multipart/alternative; boundary=Apple-Mail-45--452629164
--Apple-Mail-45--452629164
Content-Type: text/plain;
charset=US-ASCII;
format=flowed;
delsp=yes
Content-Transfer-Encoding: 7bit
In this issue:
1. November 2010 Microsoft Security Updates
2. Event: Strengthening the Audit-IT Security Partnership
3. Lesson Learned by a Security Professional
----------------------------------------------------------
1. November 2010 Microsoft Security Updates
----------------------------------------------------------
Microsoft will issue three security bulletins on Tuesday, November 9.
One of the bulletins is rated critical; the other two are rated
important. The bulletins will address a total of 11 vulnerabilities.
Systems affected:
Microsoft Office for Windows XP SP3 through Office 2010
Microsoft Office for Mac 2011
Microsoft Forefront Unified Access Gateway
Read the full bulletin:
<http://www.microsoft.com/technet/security/Bulletin/MS10-nov.mspx>
No word has been released on patching the zero-day hole in Internet
Explorer 6, 7 and 8 that has been used in targeted attacks, and was
announced last week. Those who have not done so are urged to upgrade
to IE 8, which includes Data Execution prevention technology that
makes the flaw harder to exploit.
Read the story in the news:
<http://news.cnet.com/8301-27080_3-20021665-245.html>
------------------------------------------------------------------------
2. Event: Strengthening the Audit-IT Security Partnership
------------------------------------------------------------------------
Date & Time: November 10, 2010, 1:00 - 2:30 p.m.
Location: N42-Demo Center
Open to the MIT community; seating limited
The IT Security Systems & Services team is offering a free webcast to
the MIT community this week in the N42 Demo Center.
Internal auditors and IT security officers have common interests in
securing confidential and sensitive data, complying with regulations,
and educating users about good practice. However, at most
institutions, these two roles don't coordinate their efforts and thus
are less effective than they could be if they coordinated their
respective resources, procedures, and policies.
Join us at this webcast to learn how two Boston College officials
created a partnership that has both achieved security goals and raised
campus-wide awareness about information policies and data management
controls.
This webcast covers how to:
Implement tactics to strengthen data and computing environment security
Develop shared, comprehensive standards for data protection
Create a partnership that can help educate all stakeholders about
campus-wide IT security
Assemble and lead effective campus-wide security groups/advisory boards
Learn more: <http://www.academicimpressions.com/events/event_listing.php?i=1007
>
----------------------------------------------------------
3. Lesson Learned by a Security Professional
----------------------------------------------------------
Last week I had a first-hand hard lesson on why IT security habits and
due diligence by users is so important. After arriving at the office
last Monday, it appeared some fast-fingered thieves had relieved us of
computer equipment that were not locked up, locked down, or out of
sight. Including my desktop computer.
Although for me this was a substantial loss and inconvenience, I was
reassured by the knowledge that the hard drive was encrypted using PGP
Desktop and weekly backups had run using TSM. At least my work was
saved and I could sleep well knowing that no MIT or personal
information could be leaked to the outside world.
But things were not to be as rosy as I thought. After attempting to
restore the files from the backup server, I discovered that the
scheduled backups had not run as I thought. I hadn't checked the logs
on a regular basis to make sure they were occurring. So, in the end, I
had taken the right precautions but had failed to follow through. As a
security awareness consultant, this is advice I've shared with others:
backup your data and ensure you can restore the data from backup.
Needless to say, I will now follow my own advice.
It's a wake up call for anyone. If your computer were stolen today,
could you get all your work back? Would you be sure that information
it contains can not be accessed?
Some resources for protecting data from theft:
Backing Up Your System <http://ist.mit.edu/security/backup>
Using PGP Desktop <https://kb.mit.edu/confluence/display/category/PGP%20Desktop
>
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
========================================================================
To read all current and archived articles online, visit the Security-
FYI Blog at <http://securityfyi.wordpress.com/>
Monique Yeaton
IT Security Awareness Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security
--Apple-Mail-45--452629164
Content-Type: text/html;
charset=US-ASCII
Content-Transfer-Encoding: quoted-printable
<html><body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space; "><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; min-height: 16px; "><br></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; ">In =
this issue:</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div><div style=3D"margin-top:=
0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; ">1. November 2010 Microsoft =
Security Updates</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; ">2. Event: Strengthening the Audit-IT Security =
Partnership</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; ">3. Lesson Learned by a Security =
Professional</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div><div style=3D"margin-top:=
0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; min-height: 16px; =
"><br></div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; =
">----------------------------------------------------------</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; ">1. =
November 2010 Microsoft Security Updates</div><div style=3D"margin-top: =
0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; =
">----------------------------------------------------------</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; ">Microsoft will issue three security =
bulletins on Tuesday, November 9. One of the bulletins is rated =
critical; the other two are rated important. The bulletins will =
address a total of 11 vulnerabilities.</div><div style=3D"margin-top: =
0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; min-height: 16px; =
"><br></div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; ">Systems affected:</div><div style=3D"margin-top: =
0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; min-height: 16px; "><br></div>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px =
Arial">Microsoft Office for Windows XP SP3 through Office 2010</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px =
Arial">Microsoft Office for Mac 2011</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px =
Arial">Microsoft Forefront Unified Access Gateway</li>
</ul><div style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: =
0px; margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; ">Read the full bulletin:</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; "><<a =
href=3D"http://www.microsoft.com/technet/security/Bulletin/MS10-nov.mspx">=
http://www.microsoft.com/technet/security/Bulletin/MS10-nov.mspx</a>> =
</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div><div style=3D"margin-top:=
0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; ">No word has been released on =
patching the zero-day hole in Internet Explorer 6, 7 and 8 that has been =
used in targeted attacks, and was announced last week. Those who have =
not done so are urged to upgrade to IE 8, which includes Data Execution =
prevention technology that makes the flaw harder to =
exploit. </div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div><div style=3D"margin-top:=
0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; ">Read the story in the =
news: </div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; "><<a =
href=3D"http://news.cnet.com/8301-27080_3-20021665-245.html">http://news.c=
net.com/8301-27080_3-20021665-245.html</a>></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; min-height: 16px; "><br></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
">------------------------------------------------------------------------=
</div><div style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: =
0px; margin-left: 0px; font: normal normal normal 14px/normal Arial; =
">2. Event: Strengthening the Audit-IT Security Partnership</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
">------------------------------------------------------------------------=
</div><div style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: =
0px; margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; "><b>Date & Time: November 10, =
2010, 1:00 - 2:30 p.m. </b></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; "><b>Location: N42-Demo =
Center</b></div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; ">Open to the MIT community; seating =
limited</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div><div style=3D"margin-top:=
0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; ">The IT Security Systems & =
Services team is offering a free webcast to the MIT community this week =
in the N42 Demo Center. </div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; min-height: 16px; "><br></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
">Internal auditors and IT security officers have common interests in =
securing confidential and sensitive data, complying with regulations, =
and educating users about good practice. However, at most institutions, =
these two roles don't coordinate their efforts and thus are less =
effective than they could be if they coordinated their respective =
resources, procedures, and policies.</div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; min-height: 16px; "><br></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; ">Join =
us at this webcast to learn how two Boston College officials created a =
partnership that has both achieved security goals and raised campus-wide =
awareness about information policies and data management =
controls.</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div><div style=3D"margin-top:=
0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; ">This webcast covers how =
to:</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px =
Arial">Implement tactics to strengthen data and computing environment =
security</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px =
Arial">Develop shared, comprehensive standards for data protection</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Create =
a partnership that can help educate all stakeholders about campus-wide =
IT security</li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px =
Arial">Assemble and lead effective campus-wide security groups/advisory =
boards</li>
</ul><p style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial; =
min-height: 16.0px"><span class=3D"Apple-tab-span" =
style=3D"white-space:pre"> </span><br =
class=3D"webkit-block-placeholder"></p><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; ">Learn more: <<a =
href=3D"http://www.academicimpressions.com/events/event_listing.php?i=3D10=
07">http://www.academicimpressions.com/events/event_listing.php?i=3D1007</=
a>></div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div><div style=3D"margin-top:=
0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; min-height: 16px; =
"><br></div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; =
">----------------------------------------------------------</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; ">3. =
Lesson Learned by a Security Professional</div><div style=3D"margin-top: =
0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; =
">----------------------------------------------------------</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; ">Last week I had a first-hand hard =
lesson on why IT security habits and due diligence by users is so =
important. After arriving at the office last Monday, it appeared some =
fast-fingered thieves had relieved us of computer equipment that were =
not locked up, locked down, or out of sight. Including my desktop =
computer.</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div><div style=3D"margin-top:=
0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; ">Although for me this was a =
substantial loss and inconvenience, I was reassured by the knowledge =
that the hard drive was encrypted using PGP Desktop and weekly backups =
had run using TSM. At least my work was saved and I could sleep well =
knowing that no MIT or personal information could be leaked to the =
outside world.</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div><div style=3D"margin-top:=
0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; ">But things were not to be as =
rosy as I thought. After attempting to restore the files from the backup =
server, I discovered that the scheduled backups had not run as I =
thought. I hadn't checked the logs on a regular basis to make sure they =
were occurring. So, in the end, I had taken the right precautions but =
had failed to follow through. As a security awareness consultant, this =
is advice I've shared with others: backup your data and ensure you can =
restore the data from backup. Needless to say, I will now follow my own =
advice.</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div><div style=3D"margin-top:=
0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; ">It's a wake up call for =
anyone. If your computer were stolen today, could you get all your work =
back? Would you be sure that information it contains can not be =
accessed?</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div><div style=3D"margin-top:=
0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; ">Some resources for protecting =
data from theft:</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div>
<ul style=3D"list-style-type: disc">
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px =
Arial">Backing Up Your System <<a =
href=3D"http://ist.mit.edu/security/backup">http://ist.mit.edu/security/ba=
ckup</a>></li>
<li style=3D"margin: 0.0px 0.0px 0.0px 0.0px; font: 14.0px Arial">Using =
PGP Desktop <<a =
href=3D"https://kb.mit.edu/confluence/display/category/PGP%20Desktop">http=
s://kb.mit.edu/confluence/display/category/PGP%20Desktop</a>></li>
</ul><div style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: =
0px; margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; min-height: 16px; "><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; =
">=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 14px/normal Arial; =
min-height: 16px; "><br></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 14px/normal Arial; min-height: 16px; ">To read all current =
and archived articles online, visit the Security-FYI Blog at <<a =
href=3D"http://securityfyi.wordpress.com/">http://securityfyi.wordpress.co=
m/</a>></div></div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
14px/normal Arial; min-height: 16px; "><br></div><div style=3D"margin-top:=
0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: =
normal normal normal 14px/normal Arial; min-height: 16px; =
"><br></div><div apple-content-edited=3D"true"><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; font-family: Calibri; "><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; color: =
rgb(0, 0, 0); font-family: Calibri; font-size: 14px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; =
white-space: normal; widows: 2; word-spacing: 0px; =
-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: =
0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><div><div><div>Monique Yeaton</div><div>IT Security =
Awareness Consultant</div><div>MIT Information Services & Technology =
(IS&T)</div><div>(617) 253-2715</div><div><a =
href=3D"http://ist.mit.edu/security">http://ist.mit.edu/security</a></div>=
<div><br></div><br></div></div><br></div></span><br =
class=3D"Apple-interchange-newline"></div><br =
class=3D"Apple-interchange-newline"> </div><br></body></html>=
--Apple-Mail-45--452629164--
--===============1835006064==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============1835006064==--