From: tbyfield@panix.com (t byfield)
To: cypherpunks@toad.com
Message Hash: 329c93ebde11e6150c91501fcede0ef6e517e804085fdd7fdfb5564ba49c837d
Message ID: <v02120d04ac845d74a01c@DialupEudora>
Reply To: N/A
UTC Datetime: 1995-09-19 15:44:18 UTC
Raw Date: Tue, 19 Sep 95 08:44:18 PDT
From: tbyfield@panix.com (t byfield)
Date: Tue, 19 Sep 95 08:44:18 PDT
To: cypherpunks@toad.com
Subject: WebSTAR "challenge"
Message-ID: <v02120d04ac845d74a01c@DialupEudora>
MIME-Version: 1.0
Content-Type: text/plain
From TidBITS#295/18-Sep-95
>**This is a test. This is only a test.** The folks behind the book
> _WebMaster_Macintosh_ have set up a contest to determine how
> secure Macintosh web servers really are. They've put up a Web site
> running WebSTAR with a "target" file that contestants must try to
> retrieve. The first person to retrieve the file wins a year's
> subscription to MacTech Magazine and a free pass to the next
> WebEdge conference, and the next two people receive free WebEdge
> passes. If the challenge of breaking WebSTAR's security isn't
> sufficient, there's a second Mac connected to the first via
> Ethernet. This second Mac doesn't run TCP/IP, only AppleTalk, and
> holds a second target file; retrieving it wins you three free
> WebEdge passes. The hope is that these tasks will prove
> impossible, however, should someone break in, that's also useful
> since it will help StarNine and Apple plug security holes. Contest
> rules and details are at: [ACE]
>
>http://www.webmastermac.com/security/
Return to September 1995
Return to “tbyfield@panix.com (t byfield)”
1995-09-19 (Tue, 19 Sep 95 08:44:18 PDT) - WebSTAR “challenge” - tbyfield@panix.com (t byfield)