1996-10-02 - SYN_not

Header Data

From: jya@pipeline.com (John Young)
To: cypherpunks@toad.com
Message Hash: 73cd5da5ca8d800e51c92aec7035ca73b076b3599fd97dc598c5bf2d8b6c287f
Message ID: <199610021503.PAA18426@pipe2.ny1.usa.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-10-02 19:25:45 UTC
Raw Date: Thu, 3 Oct 1996 03:25:45 +0800

Raw message

From: jya@pipeline.com (John Young)
Date: Thu, 3 Oct 1996 03:25:45 +0800
To: cypherpunks@toad.com
Subject: SYN_not
Message-ID: <199610021503.PAA18426@pipe2.ny1.usa.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


   10-1-96: 
 
   "Check Point to Provide Safeguard Against TCP SYN 
   Flooding." 
 
      The new module, now available free of charge on Check 
      Point's Web site (http://www.checkpoint.com), provides 
      protection against this denial of service attack, which 
      has crippled several ISPs in recent weeks. 
 
   "Certicom Introduces Elliptic Curve Cryptosystem 
   Instruction To Its Security Classroom."  
 
      It has launched new information about its Elliptic Curve 
      Cryptosystem on the Information Security Classroom 
      section of its web site (www.certicom.ca). 
 
   "IBM to herd cave-in cats for rat encryption." 
 
      IBM will be joined by Digital, TIS but few others. An 
      executive at TIS declined to comment on whether it is 
      involved in the IBM cave-in. The company is in a 
      quiet period before making an IPO based on government 
      bribery. 
 
   "Battle brewing over gov.crypto bribery." 
 
      Last week, the DARPA announced it has awarded Trusted 
      Information Systems, Inc. a two-year, $1.5 million 
      contract to develop what it calls security wrappers for 
      a Java Prototype System as well as one for the Unix 
      operating system. 
 
   ----- 
 
   http://jya.com/synnot.txt  (15 kb for 4) 
 
   ftp://jya.com/pub/incoming/synnot.txt 
 
   SYN_not 
 
 
 
 





Thread