Back to the main page

Mailing List Logs for ShadowRN

Message no. 1
From: Wolfchild nathan.olsen@*******.msus.edu
Subject: More SR Tech Today
Date: Fri, 20 Aug 1999 15:56:55 -0500 (CDT)
The following is from startribune.com:

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Published Friday, August 20, 1999

Hacker-hunting software

The Internet is a two-way street. Even as one lane is used for
browsing the Web and sending e-mail using a modem, the other is a
route for hackers to invade home and office computers.

In the past, only companies with deep pockets could afford
anti-hacker software -- but the growth of small companies and home
users has meant a growth in susceptible systems. BlackIce, a new
anti-hacker system from San Mateo-based Network Ice, sells for
around $37 per computer, which is affordable for small-and
medium-sized businesses as well as home users. Home and
business versions of the software can be downloaded at the
company's Web site at http://www.networkice.com .

While the hacker is attacking a computer, BlackIce automatically
traces the hacker back to the source and displays the information to
the computer user. In comparison, traditional hunts for hackers,
because of a quirk in the Internet protocol, require manual searches
through computer log records once the hacker is long gone.

Traditionally, networks dedicate one computer to watch all the
incoming data for all the computers. However, dedicated computers
cannot go out and hunt for culprits. BlackIce breaks up the system
by having each computer monitor itself, which allows it
simultaneously to trace perpetrators.

-- New York Times

Copyright 1999 Star Tribune. All rights reserved.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-




Wolfchild - "Discinctaque in otia natus."
--
,-'~/ In October of 1994, three student filmmakers ____|____
/' | /(_ disappeared in the woods near Burkittsville, \|/
/ / \,_/ .\ Maryland while shooting a documentary. X
| | /, ,-' A year later their footage was found. / \
| | ,-, \ \,?| "Quin tu istanc orationem hinc veterem atque / \
| ,|/ / ,_\,_/_ antiquam amoves?" -Plautus, Miles Gloriosus ___|___
|/ | __, _) There are nights when the wolves ___|___ \|/
| `;-~_.--~ are silent, and only the moon howls. \|/ X
`.`--,, Wolfchild <nathan.olsen@*******.msus.edu> X / \
(`~`)___/~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\___ / \ / \
Message no. 2
From: Ben Hayes bjh10@***.edu.au
Subject: More SR Tech Today
Date: Sat, 21 Aug 1999 11:55:48 +1000
> Hacker-hunting software
>
> The Internet is a two-way street. Even as one lane is used for
> browsing the Web and sending e-mail using a modem, the other is a
> route for hackers to invade home and office computers.
>
> In the past, only companies with deep pockets could afford
> anti-hacker software -- but the growth of small companies and home
> users has meant a growth in susceptible systems. BlackIce, a new
> anti-hacker system from San Mateo-based Network Ice, sells for
> around $37 per computer, which is affordable for small-and
> medium-sized businesses as well as home users. Home and
> business versions of the software can be downloaded at the
> company's Web site at http://www.networkice.com .
>
> While the hacker is attacking a computer, BlackIce automatically
> traces the hacker back to the source and displays the information to
> the computer user. In comparison, traditional hunts for hackers,
> because of a quirk in the Internet protocol, require manual searches
> through computer log records once the hacker is long gone.
>
> Traditionally, networks dedicate one computer to watch all the
> incoming data for all the computers. However, dedicated computers
> cannot go out and hunt for culprits. BlackIce breaks up the system
> by having each computer monitor itself, which allows it
> simultaneously to trace perpetrators.


Is this a pisstake or what.
Message no. 3
From: Starrngr@***.com Starrngr@***.com
Subject: More SR Tech Today
Date: Sat, 21 Aug 1999 00:57:45 EDT
In a message dated 8/20/99 6:57:24 PM Pacific Daylight Time, bjh10@***.edu.au
writes:

> > Traditionally, networks dedicate one computer to watch all the
> > incoming data for all the computers. However, dedicated computers
> > cannot go out and hunt for culprits. BlackIce breaks up the system
> > by having each computer monitor itself, which allows it
> > simultaneously to trace perpetrators.
>
>
> Is this a pisstake or what.

Nooo.... I think what the writer is trying to claim is that each "server"
watches for intrusions, and when they find one, the "firewall" unit launches
the trace and alearts the sysop of who done it.

In othewords, your basic trace and report IC. Whoever wrote it shure must be
into the whole "matrix emergant" theme though to think of naming this
Blackice, though not to much into shadowrun or he would have known the right
term for this is "Tracer".
Message no. 4
From: Ereskanti@***.com Ereskanti@***.com
Subject: More SR Tech Today
Date: Sat, 21 Aug 1999 12:21:11 EDT
In a message dated 8/20/1999 11:58:59 PM US Eastern Standard Time,
Starrngr@***.com writes:

>
> Nooo.... I think what the writer is trying to claim is that each "server"
> watches for intrusions, and when they find one, the "firewall" unit
launches
>
> the trace and alearts the sysop of who done it.
>
> In othewords, your basic trace and report IC. Whoever wrote it shure must
> be
> into the whole "matrix emergant" theme though to think of naming this
> Blackice, though not to much into shadowrun or he would have known the
right
>
> term for this is "Tracer".

Yes, but it is kind of cool none-the-less.

-K

Further Reading

If you enjoyed reading about More SR Tech Today, you may also be interested in:

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.