[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
internet mag
- To: [email protected]
- Subject: internet mag
- From: [email protected]
- Date: Thu, 19 Jan 1995 08:20:10 -0800
- Comments: This message is NOT from the person listed in the Fromline. It is from an automated software remailing service operating atthat address.THE PORTAL SYSTEM DOES NOT CONDONE OR APPROVE OF THE CONTENTS OF THISPOSTING. Please report problem mail to <[email protected]>.
- Sender: [email protected]
This month's issue of Internet World Magazine deals primarily with internet security. I'm am not going to review everything in the mag but I'll list the table of content:
Better Safe:
Danger lurks on the Info Highway. You must take precaution to reduce your riks.
By Dave Taylor and Rosalind Resnick
Getting Cryptic:
Phil Zimmermann's PGP gives you powerful encryption to keep your messages safe from prying eyes. Read all about it.
By William Stalling.
(Introductory article about PGP. Nothing we, here, don't already know)
Securing the Enterprise:
Connectiong your corporation to the Internet can be a security nightmare.
Firewalls are the main line of defense.
By Alton Hoover
(An overview of Firewalls, application-layer gateways and token-based authentication schemes)
Beyond the Firewall:
The latest firewall technology not only detects intruders, but strikes back.
By Winn Schwartau
(Very interesting article. Here are some quotes to wet your appetite:
Wouldn't it be nice if a computer system attacked from the Internet responded to the attack by striking back at the intruder? This is exactly what Sidewinder's implementation of type enforcement does.....It will detect the intrusion immediately....As soon as a violation occurs, a silent alarm is activated....sidewinder can be configured to react in any number of ways, once an attack has been detected...it can shut the intruder cold...(or)...it can invoke a mechanism that would record all the information from whence came the attack....By luring the attacker into a false sense of security, the hacker would continue trying to break in, unaware that every step was being recorded...
Cashing In:
As Internet commerce expands, a host of companies are vying to establish their system as the basis for cyberbanking and credit-card transactions.
By Lisa Morgan
Business Browser:
New versions of Mosaic with built-in encryption promise to keep your transactions safe.
By Richard W. Wiggins
Unlawful Entry
Crackers can feasts on your data if you fail to plug your leaky Unix system
By Aaron Weiss
(Five Ways to crack a Unix System)
It's Alive:
Although the furor has subsided, reports of Clipper's death are greatly exaggerated. The government's controversial eavesdropping effort lives on.
By Steven Vaughan-Nichols
Building Trust
The chief executives of Trusted Information Systems -Steve Crocker and Steve Walker- talk about encryption, CyberCash, Clipper, and more.
By Jeff Ubois.
All in all a rather interesting mag. Check it out.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[email protected]
Give me the liberty to know, to utter, and to argue freely
according to conscience, above all liberties.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~