From: jya@pipeline.com (John Young)
To: cypherpunks@toad.com
Message Hash: 73cd5da5ca8d800e51c92aec7035ca73b076b3599fd97dc598c5bf2d8b6c287f
Message ID: <199610021503.PAA18426@pipe2.ny1.usa.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-10-02 19:25:45 UTC
Raw Date: Thu, 3 Oct 1996 03:25:45 +0800
From: jya@pipeline.com (John Young)
Date: Thu, 3 Oct 1996 03:25:45 +0800
To: cypherpunks@toad.com
Subject: SYN_not
Message-ID: <199610021503.PAA18426@pipe2.ny1.usa.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
10-1-96:
"Check Point to Provide Safeguard Against TCP SYN
Flooding."
The new module, now available free of charge on Check
Point's Web site (http://www.checkpoint.com), provides
protection against this denial of service attack, which
has crippled several ISPs in recent weeks.
"Certicom Introduces Elliptic Curve Cryptosystem
Instruction To Its Security Classroom."
It has launched new information about its Elliptic Curve
Cryptosystem on the Information Security Classroom
section of its web site (www.certicom.ca).
"IBM to herd cave-in cats for rat encryption."
IBM will be joined by Digital, TIS but few others. An
executive at TIS declined to comment on whether it is
involved in the IBM cave-in. The company is in a
quiet period before making an IPO based on government
bribery.
"Battle brewing over gov.crypto bribery."
Last week, the DARPA announced it has awarded Trusted
Information Systems, Inc. a two-year, $1.5 million
contract to develop what it calls security wrappers for
a Java Prototype System as well as one for the Unix
operating system.
-----
http://jya.com/synnot.txt (15 kb for 4)
ftp://jya.com/pub/incoming/synnot.txt
SYN_not
Return to October 1996
Return to “jya@pipeline.com (John Young)”
1996-10-02 (Thu, 3 Oct 1996 03:25:45 +0800) - SYN_not - jya@pipeline.com (John Young)