From: jml@wizard.synapse.net
To: cypherpunks@toad.com
Message Hash: f75080d5f70d3e29e516b342385dc75e63f709d2c595e7447f3146eaad69e205
Message ID: <199501192119.QAA21262@sentinel.synapse.net>
Reply To: N/A
UTC Datetime: 1995-01-19 21:20:22 UTC
Raw Date: Thu, 19 Jan 95 13:20:22 PST
From: jml@wizard.synapse.net
Date: Thu, 19 Jan 95 13:20:22 PST
To: cypherpunks@toad.com
Subject: Internet World Magazine
Message-ID: <199501192119.QAA21262@sentinel.synapse.net>
MIME-Version: 1.0
Content-Type: text/plain
This month's issue of Internet World Magazine deals primarily with internet
security. I'm am not going to review everything in the mag but I'll list the
table of content:
Better Safe:
Danger lurks on the Info Highway. You must take precaution to reduce your riks.
By Dave Taylor and Rosalind Resnick
Getting Cryptic:
Phil Zimmermann's PGP gives you powerful encryption to keep your messages
safe from prying eyes. Read all about it.
By William Stalling.
(Introductory article about PGP. Nothing we, here, don't already know)
Securing the Enterprise:
Connectiong your corporation to the Internet can be a security nightmare.
Firewalls are the main line of defense.
By Alton Hoover
(An overview of Firewalls, application-layer gateways and token-based
authentication schemes)
Beyond the Firewall:
The latest firewall technology not only detects intruders, but strikes back.
By Winn Schwartau
(Very interesting article. Here are some quotes to wet your appetite:
Wouldn't it be nice if a computer system attacked from the Internet
responded to the attack by striking back at the intruder? This is exactly
what Sidewinder's implementation of type enforcement does.....It will detect
the intrusion immediately....As soon as a violation occurs, a silent alarm
is activated....sidewinder can be configured to react in any number of ways,
once an attack has been detected...it can shut the intruder cold...(or)...it
can invoke a mechanism that would record all the information from whence
came the attack....By luring the attacker into a false sense of security,
the hacker would continue trying to break in, unaware that every step was
being recorded...
Cashing In:
As Internet commerce expands, a host of companies are vying to establish
their system as the basis for cyberbanking and credit-card transactions.
By Lisa Morgan
Business Browser:
New versions of Mosaic with built-in encryption promise to keep your
transactions safe.
By Richard W. Wiggins
Unlawful Entry
Crackers can feasts on your data if you fail to plug your leaky Unix system
By Aaron Weiss
(Five Ways to crack a Unix System)
It's Alive:
Although the furor has subsided, reports of Clipper's death are greatly
exaggerated. The government's controversial eavesdropping effort lives on.
By Steven Vaughan-Nichols
Building Trust
The chief executives of Trusted Information Systems -Steve Crocker and Steve
Walker- talk about encryption, CyberCash, Clipper, and more.
By Jeff Ubois.
All in all a rather interesting mag. Check it out.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
wizard@alpha.c2.org
Give me the liberty to know, to utter, and to argue freely
according to conscience, above all liberties.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Return to January 1995
Return to “jml@wizard.synapse.net”
1995-01-19 (Thu, 19 Jan 95 13:20:22 PST) - Internet World Magazine - jml@wizard.synapse.net