<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<META content="MSHTML 6.00.5730.11" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><STRONG>New (and Old) Threats to On-Line Computers</STRONG></DIV>
<DIV> </DIV>
<DIV>Below the line are links to descriptions of a new device implementing an
old method of attack on computers connected by a wireless method of one
type.</DIV>
<DIV> </DIV>
<DIV>The cautious will read this material carefully. Although the device
described is relatively new, the method used itself is not new and the method
can be extended beyond simple Wi-Fi connections.</DIV>
<DIV> </DIV>
<DIV>There are several individuals in this area using laptops and special
software to attempt to snoop and/or to implant snooping/remote broadcasting of
the material on your personal computer and the real-time data streams occurring
while you are connected to email and the web. Hardly a week goes by when
my computer is not subjected to an attempt of this kind.</DIV>
<DIV> </DIV>
<DIV>A prior V 2020 discussion suggested some ways to help fend off these kinds
of attacks:</DIV>
<DIV> </DIV>
<DIV>Anti-Virus software</DIV>
<DIV>Spyware Detection and Removal software</DIV>
<DIV>First class professional grade firewall software</DIV>
<DIV>An intervening router with firewall capability</DIV>
<DIV> </DIV>
<DIV>It is important to check your firewall logs daily to see if attacks have
been detected. If your firewall can be set to immediately notify you of an
attempted attack:</DIV>
<DIV> </DIV>
<DIV>1. Disconnect entirely from any connection you are using
the moment the notification occurs.</DIV>
<DIV>2. Look for unfamiliar vehicles in your area, take
license numbers. If a license number occurs more than once after an
attempted attack or there is a speedy decampment, notify law enforcement.</DIV>
<DIV> </DIV>
<DIV>This should be a no-brainer: Do not tell anyone which
anti-virus, spyware detection, or firewall software or hardware you are
using.</DIV>
<DIV> </DIV>
<DIV>There is another remedy which is drastic, very effective, very expensive,
and whose legality may be suspect: a device which uploads a poison pill to the
attacker's computer. This pill works in the target computer's
background. First it erases the boot-strap tracks, then erases the various
parts of the directories on all disc drives, then all the data on all the disc
drives surfaces. The latter takes a lot of time so that the attacker may
be able to stop that part before it is complete. For some computers, the
software can also cause some permanent hardware damage, mainly to the disc
drives. At any rate the attacker will need to spend a great deal of time
making their computer functional again. In addition, this device and
associated software records a number of identifying characteristics of the
attacker's computer so that information may to used to arrest and to convict the
attacker may be gathered.</DIV>
<DIV> </DIV>
<DIV> </DIV>
<DIV>Since the legality of this device may be suspect, please do not ask me for
details. There are various search engines which can be of assistance
should you be interested.</DIV>
<DIV><BR>Art Deco (Wayne A. Fox)<BR><A
href="mailto:deco@moscow.com">deco@moscow.com</A><BR></DIV>
<DIV> </DIV>
<DIV> </DIV>
<DIV>______________________________________________________</DIV>
<DIV>Silica--a wireless hacking tool <BR><BR>Photos: The scariest item at RSA
2007 is Silica, a portable hacking<BR>device <BR>that can search for and join
Wi-Fi access points, scan for open ports,<BR>and <BR>launch code execution
exploits. <BR><A
href="http://ct.zdnet.com/clicks?t=29190355-a10e1a02c3a4463047d2ade5662a85e8-bf&s=5&fs=0">http://ct.zdnet.com/clicks?t=29190355-a10e1a02c3a4463047d2ade5662a85e8-bf&s=5&fs=0</A><BR><BR>WiFi
hacking with a handheld<BR><A
href="http://ct.zdnet.com/clicks?t=29190356-a10e1a02c3a4463047d2ade5662a85e8-bf&s=5&fs=0">http://ct.zdnet.com/clicks?t=29190356-a10e1a02c3a4463047d2ade5662a85e8-bf&s=5&fs=0</A><BR><BR>Focus:
RSA 2007 security<BR><A
href="http://ct.zdnet.com/clicks?t=29190357-a10e1a02c3a4463047d2ade5662a85e8-bf&s=5&fs=0">http://ct.zdnet.com/clicks?t=29190357-a10e1a02c3a4463047d2ade5662a85e8-bf&s=5&fs=0</A><BR><BR></DIV></BODY></HTML>