Subject: Hack, hack, hack ...(was WWW security) From: "Sergio Dall'Omo" Date: Sat, 22 Apr 1995 17:06:19 +1000
How the Web Was Won
Subject: Hack, hack, hack ...(was WWW security) From: "Sergio Dall'Omo" Date: Sat, 22 Apr 1995 17:06:19 +1000
Reply-To: dallomo@unive.it
Priority: normal
X-Mailer: Pegasus Mail/Windows (v1.22)
Sender: owner-online-news@marketplace.com
Precedence: bulk
Status: RO
X-Status: 

Hi folks,
so many new threads! Did I miss anything important? Was out for a 
while: my stomach went out silly. Now I'm back.

John Graham on Thu, 20 Apr 1995 wrote: 
"While sitting in on a committee meeting of reporters discussing setting up
connections to the Internet to use as a reference source, our MIS guy made a
claim that I find hard to believe. I don't have the technical background to
know if what he says is correct, so maybe those of you more technical-minded
folk on this list can answer it. He says that when one of our PCs on our internal
(ethernet) network goes online, via a modem connection to an ISP, it opens up
a way for someone on the outside to get into our internal business network.
I know there are legitimate security concerns if we had our own dedicated internet
server on our network and that it served as our access point into the Internet. But I
thought that it was pretty much a one-way street if I log on thru an ISP via
standard phone lines.
Is it possible for someone on the Internet to hack their way thru my ISP's ser
ver, up my phone line and modem into my PC, and then be able to get at my
network drive and into our mainframe system?
Inquiring minds want to know..."

Sure they can finger you! (Me too might do it, had I your access 
number). Firewalls? No problem. Passwords? No problem.
Encryptions? No problem. (or about nearly...)
  
Have you ever heard of Satan software? The names of Dan 
Farmer and Wietse Zweitze Venema are new for you? Did you ever catch
a copy of Austin's Phrack magazine (: in 
issue 48 they  teach all on Visa cards) ? Did you read "Cyberia"?

All this means hack, hack, hack!!! 
And security, in the meantime: you have to know what they can do
to set up defences. For many people, computer penetration is far 
better than sexual penetration.
I'm writing a 9 columns page on this for my newspaper: who they are, 
how they do it, etc, etc. 
First get the "Jargon file" () (hackers' auto-agiographia) and meet 
hackers'subculture and "Orange book" limits (to be broken).
Then go to , Drums home page, , etc.
For the folks who can read italian I'll put on line on Tue my  page 
on hacking in acrobat format (220K about). For the others who want 
more infos, here I am. (Once I had a hacker spirit but never had 
their ability).



Sergio Dall'Omo
new media & new techs editor

IL GAZZETTINO
via Torino 110,
30172 Mestre (Venice)
ITALY
voice 0039,41,665409
fax 0039,41,665389

From rballard@cnj.digex.net Fri Jun  2 10:52:13 1995
Status: O
X-Status: