Re: DAVE BALL re - Virus warning + Jeep rebuild info

From: aussierob (aussierob@odyssey.net)
Date: Tue Aug 27 2002 - 07:50:49 PDT


This post contains one Off topic and one On topic subjects:

Dave, Hello, thanks for the great info... although, it basically means
little to me ...and, I am now quite reasonably computer literate, I still
found it interesting reading.

What I found more interesting was you willingness to share this knowledge.
Especially, in the face of some stupid bastards who will complain that you
were "Off Topic"
If some of these flamers succumb to a virus they wont be "off topic"
...they'll be "off the list" totally, until they get somebody to reboot
their whole computer.

Now for my on topic part of this posting.
With several jeeps to restore, I'm seriously thinking of taking a very rare
mid '1940s MZ - USMC Radio Jeep (not an MB but an MZ) into the shed for the
winters rebuild project.

It has the factory PTO coming up through the floor to run a belt driven,
military radio.
It has the breather pipes - waterproof tranny's.
Also, the snorkel hood hole.
Also the pigstail hooks and rings for lifting over the side of the ship
during WW2.
It's a big project which needs all the tub floorwork rebuilt.
The engine is also frozen. However, I poured old engine oil into each
cylinder right to the top. That was 6 months back. and hopfully inthat time
some oil will have found it's way down past the frozen pistons.

Thanks Dave for your concerned posting efforts.
As a side note;
We had our fist computer over a year when we were hit with a deadly virus.
We were unaware that the virus protection was not automatically updating
every few days.
We never ever realised the need to check the anti-virus rpogram .
We Thought we were protected.
We were new at it... and therefore totally too uninformed.
Dave, keep up the good info.
Best Regards

Rob Pearson
----- Original Message -----
From: "Dave Ball" <vought@msn.com>
To: "Military Vehicles Mailing ListVirus warning

> Hi, All...
> I have been Administering large networks for 15 years and have been an IT
> Director the last 6 and I have seen just about every email claiming no
fault
> and this one is the standard I see no evil , hear no evil, talk no evil. I
> live by there is no fault except by those who coded the virus its no ones
> fault, no blame to place, no finger to point, except at the person who
> designed and released the malicious code there are Billions of dollars
lost
> from this sort of terrorism every year.
> Web Mail, Norton, Firewall, Spoof, outlook, these are just words. Words
are
> not the problem executed code is the problem and if you open email have a
> connection to the internet then you are at risk, we all are at risk. The
> best you can do is become a patch and definition freak and even then you
> will still be vulnerable and have big blood shot eyes for your efforts
when
> you do get hit because that's it period there is no silver bullet.
> You say you have a firewall are you running NAT do you know what NAT is.
Do
> you dial to your provider or are you connected by DSL or cable modem? Is
> your IP address static or dynamic? ever heard of spoofing an IP address?
> Myself and the many Admins working for me have tried everything we could
> think of even had Symantec (Norton) and McAfee visit and look through our
> systems after being pounded hard by Redcode and Nimda (admin spelled
> backwards) a year ago.
> What I learned from them was that all antivirus products are Signature
based
> this means your vendor provides a unique code (macros) to identify each
> virus this also means there is a delay of several hours or even days
before
> the vendor releases an update even if you have your automatic update
button
> clicked. All this means is that when a new virus hits the internet you
will
> have your pants down with the rest of us until the new definitions have
been
> released. In the security classes I have taken almost everyone seems to
> agree that pattern matching antivirus technology is still the king of
virus
> protection although there are few non signature based antivirus
applications
> like stormwatch but they are young.
> The best protection we found which is still not fool proof is to run NIX
> based Internet gateways and filter with hardware and software all incoming
> and out going traffic at that point before hitting the corporate servers
> this allows us the best if not fool proof protection but sucks band width
we
> also use a stateful firewall meaning it opens every packet for inspection
> another bandwidth sucker.
> Most businesses use internet gateway protection on the email server port
> this is fine until someone logs into a Internet based web email account
> (Yahoo) and downloads a virus because doing this has bypassed the
corporate
> email server protection and downloads a virus from the Internet to his
local
> node which is hopefully subnetted from anything of great importance.
> There has been a lull this year in the virus arena I think the coders are
> taking a rest or maybe brushing up on XP or NIX or even .NET.
> I have included a site that will show just a few of the Vulnerabilities
for
> the last couple of weeks please do not think because you do not run a MS
> Windows based system you are safe because you are not but you do have
> something working for you, you are a minority player and you will be less
> targeted.
> I use Outlook and like it I keep all my mail in the "restricted sites"
zone
> and keep that zone locked down.
> I also do a full back up of my system everyday and keep Wednesday for 4
> weeks before recycle. I am running NAT and a Linux Based Internet Gateway
I
> have only one machine outside the gateway and it is an Apache webserver
that
> is also backed up daily.
> It has been hacked by exploiting a code vulnerability in Linux I felt it
was
> the least likely to get hacked I was wrong.
> There are a lot of hacking tools on this site please becareful what you
> download and how you use it "you are being watched".
> Try some of the sniffer tools monitor the traffic to and from your
computer
> you might be surprised to find someone lurking there are a lot of shared
> resource hackers out there right now some are offshore.
> Remember all Internet users are admins and the best protection is to keep
> your machine turned off.
>
> Good luck
> Flame away
>
> Dave
> http://www.blackcode.com/vulnerabilities/



This archive was generated by hypermail 2.1.4 : Wed Apr 23 2003 - 13:31:45 PDT