1995-01-19 - Internet World Magazine

Header Data

From: jml@wizard.synapse.net
To: cypherpunks@toad.com
Message Hash: f75080d5f70d3e29e516b342385dc75e63f709d2c595e7447f3146eaad69e205
Message ID: <199501192119.QAA21262@sentinel.synapse.net>
Reply To: N/A
UTC Datetime: 1995-01-19 21:20:22 UTC
Raw Date: Thu, 19 Jan 95 13:20:22 PST

Raw message

From: jml@wizard.synapse.net
Date: Thu, 19 Jan 95 13:20:22 PST
To: cypherpunks@toad.com
Subject: Internet World Magazine
Message-ID: <199501192119.QAA21262@sentinel.synapse.net>
MIME-Version: 1.0
Content-Type: text/plain


This month's issue of Internet World Magazine deals primarily with internet 
security. I'm am not going to review everything in the mag but I'll list the 
table of content:

Better Safe:
Danger lurks on the Info Highway. You must take precaution to reduce your riks.
By Dave Taylor and Rosalind Resnick

Getting Cryptic:
Phil Zimmermann's PGP gives you powerful encryption to keep your messages 
safe from prying eyes. Read all about it.
By William Stalling.
(Introductory article about PGP. Nothing we, here, don't already know)

Securing the Enterprise:
Connectiong your corporation to the Internet can be a security nightmare.
Firewalls are the main line of defense.
By Alton Hoover
(An overview of Firewalls, application-layer gateways and token-based 
authentication schemes)

Beyond the Firewall:
The latest  firewall technology not only detects intruders, but strikes back.
By Winn Schwartau
(Very interesting article. Here are some quotes to wet your appetite:
Wouldn't it be nice if a computer system attacked from the Internet 
responded to the attack by striking back at the intruder? This is exactly 
what Sidewinder's implementation of type enforcement does.....It will detect 
the intrusion immediately....As soon as a violation occurs, a silent alarm 
is activated....sidewinder can be configured to react in any number of ways, 
once an attack has been detected...it can shut the intruder cold...(or)...it 
can invoke a mechanism that would record all the information from whence 
came the attack....By luring the attacker into a false sense of security, 
the hacker would continue trying to break in, unaware that every step was 
being recorded...

Cashing In:
As Internet commerce expands, a host of companies are vying to establish 
their system as the basis for cyberbanking and credit-card transactions.
By Lisa Morgan

Business Browser:
New versions of Mosaic with built-in encryption promise to keep your 
transactions safe.
By Richard W. Wiggins

Unlawful Entry
Crackers can feasts on your data if you fail to plug your leaky Unix system
By Aaron Weiss
(Five Ways to crack a Unix System)

It's Alive:
Although the furor has subsided, reports of Clipper's death are greatly 
exaggerated. The government's controversial eavesdropping effort lives on.
By Steven Vaughan-Nichols

Building Trust
The chief executives of Trusted Information Systems -Steve Crocker and Steve 
Walker- talk about encryption, CyberCash, Clipper, and more.
By Jeff Ubois.

All in all a rather interesting mag. Check it out.


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
wizard@alpha.c2.org
Give me the liberty to know, to utter, and to argue freely
according to conscience, above all liberties.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~






Thread