[RISKS] Risks Digest 25.16

From: RISKS List Owner (risko@private)
Date: Thu May 22 2008 - 16:40:53 PDT


RISKS-LIST: Risks-Forum Digest  Thursday 22 May 2008  Volume 25 : Issue 16

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
  <http://catless.ncl.ac.uk/Risks/25.16.html>
The current issue can be found at
  <http://www.csl.sri.com/users/risko/risks.txt>

  Contents:
Betting glitch spurs calls for reform (Will Oremus via PGN)
Animal tricks, take n+1 (Jeremy Epstein)
Ants and Computers (Gene Wirchenko)
F.B.I. Says the Military Had Bogus Computer Gear (John Markoff
  via Monty Solomon)
Another undeleted/deleted Document - "Krolls Associates" (Danny Burstein)
Don't phlash that dwarf - hand me the pliers! (John Leyden via Randall)
Geolocation software risks (Mickey Coggins)
Shopping centers tracking cell phones (PGN)
China's All-Seeing Eye (EEkid via Dave Farber)
Re: Real-time spying on credit card holders (Curt Sampson)
Microsoft security advice for sale (Peter Houppermans)
Old-Style Pumps Balk At $4-a-Gallon Gas, Too (Nick Miroff via Monty Solomon)
Clueless in France (Pete Kaiser)
PayPal XSS Vulnerability Undermines EV SSL Security (Paul Mutton
  via Monty Solomon)
More GPS Mishaps (Gene Wirchenko)
Re: UK CCTV used to create a music video (Chris Drewe)
Re: Dilbert wants a widget (Bill Bumgarner)
Re: Debian OpenSSL Predictable PRNG Toys (Jim Horning)
Re: Securing The Wrong Spaces: A Lesson (David E. Price)
Abridged info on RISKS (comp.risks)

----------------------------------------------------------------------

Date: Thu, 22 May 2008 14:22:45 PDT
From: "Peter G. Neumann" <neumann@private>
Subject: "Betting glitch spurs calls for reform"

An unidentified bettor at Bay Meadows Race Track (which closed forever on 10
May 2008) apparently put down 1300 one-dollar quick-pick superfecta bets on
the Kentucky Derby.  Not one of the computer-generated tickets included the
eventual winner, Big Brown.  After being prodded by the California Horse
Racing Board on 7 May 2008, the betting machine vendor Scientific Games
discovered that its software was dropping the last horse in the field from
quick-pick choices on all 7,000 of its Bet Jet machines nationwide.  They
"couldn't say" how long this had been happening, as they had "no way" of
auditing past usage.  It was also unclear whether this was an intentional
scam from which anyone was profiting, or just a screw-up.

Incidentally, Scientific Games was the vendor whose equipment was used in
the Breeders' Cup wild-card Autotote Pick-6 insider scam (RISKS-33,38,39).

[Source: Will Oremus, *Palo Alto Daily News*, 21 May 2008; PGN-ed]

------------------------------

Date: Fri, 16 May 2008 10:11:45 -0400
From: "Jeremy Epstein" <Jeremy.Epstein@private>
Subject: Animal tricks, take n+1

One of the oldest recurring themes in RISKS is the damage animals can do to
computer systems, generally indirectly by cutting off electricity supplies.
Cf. RISKS-4.02, 8.75, 16.30, 19.96, 20.87, and probably a bunch of others.

We're now moving from mammals (especially squirrels) down the food chain,
and closer to the equipment itself - several recent reports of ants in south
Texas getting in to electronic equipment.  Computerworld [1] quotes an
exterminator as saying "ants shorted out three computers that were running a
pipeline that brought chemicals into the plant. The ants took down two
computers last year and one in 2006, affecting flow in the pipeline each
time... If you open a computer, you would find a cluster of ants on the
motherboard and all over. You'd get 3,000 or 4,000 ants inside, and they
create arcs."

[1]
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9086098&source=NLT_SEC&nlid=38

  [An arc for these little guys would be *ancillary*.  It would need to be a
  No-Ways Arc, a pun that I reused in the title of the first item in
  RISKS-4.02, recalling Bob Ashenhurst's spoofed page in Rick Gould's PhD
  thesis on bridge switching circuits that delved into no-ways arcs and
  two-terrible subgiraffes in relay graphs with bidirectional current paths.
  I couldn't resist recalling that 51 years later.  PGN]

------------------------------

Date: Fri, 16 May 2008 10:18:52 -0700
From: Gene Wirchenko <genew@private>
Subject: Ants and Computers

This article tells of a non-indigenous species of ant causing in Texas:
   http://www.itbusiness.ca/it/client/en/CDN/News.asp?id=48425

They are shorting out various forms of equipment including computers.  Here
is the text of the article:

A flood of voracious ants is heading straight for Houston, taking out
computers, radios and even vehicles in their path.  Even the Johnson Space
Center has called in extermination experts to keep the pests out of their
sensitive and critical systems.

The ants have been causing all kinds of trouble in five Texas counties in
and around the Gulf Coast. Because of their sheer numbers, the ants are
short circuiting computers in homes and offices, and knocking systems
offline in major businesses. When IT personnel pry the affected computers
open, they find the machines loaded with thousands of ant bodies.

"These ants are raising havoc," said Roger Gold, professor of entomology at
Texas A&M University in College Station. "They're foraging for food and
they'll go into any space looking for it. In the process, they make their
way into sensitive equipment."

The ants have been dubbed Crazy Rasberry ants after Tom Rasberry, owner of
Budget Pest Control in Pearland, Texas. He first tackled this particular
type of ant back in 2002. Since then, the problem has only escalated.

Rasberry said the ants have caused a lot of trouble for one Texas chemical
company in particular. Not wanting to name the company, he said the ants
shorted out three different computers that were running a pipeline that
brought chemicals into the plant. The ants took down two computers last year
and one in 2006, affecting flow in the pipeline each time.

"I think they go into everything and they don't follow any kind of
structured line," said Rasberry. "If you open a computer, you would find a
cluster of ants on the motherboard and all over. You'd get 3,000 or 4,000
ants inside and they create arcs. They'll wipe out any computer."

The Johnson Space Center called in Rasberry a month or two ago in an attempt
to keep the ants out of their facilities. Too late. Raspberry said he's
found three colonies at the NASA site, but all have been small enough to
control.

'With the computer systems they have in there, it could devastate the
facility," said Rasberry. "If these ants got into the facility in the
numbers they have in other locations, well, it would be awful. I've been in
this business for 32 years and this is unlike anything I've ever seen.
Anything. When you bring in entomologists from all over the United States
and they're in shock and awe, that shows you what it's like."

The Johnson Space Center referred all questions about the ants to Rasberry.

The ants, which are tiny and reddish, aren't native to Texas. Officials
believe they came off a ship from the Caribbean, said Paul Nester, a program
specialist with the Texas AgriLife Extension Service. They were first
spotted about six years ago. Gold said in the last few years they've spread
in a radius of about 50 miles. And now they're moving into Houston, the
fourth-largest city in the country.

"Fifty miles might not seem like a lot until you realize they're moving into
Houston," said Gold. "It could really affect a lot of people's lives."

A big problem here, noted Nester, is how quickly their numbers are
multiplying.

A queen fire ant, long a problem in Texas, can lay as many as 1,000 eggs a
day, he said. The Crazy Rasberry ants are thought to be as prolific.
However, an ant mound normally has one queen. The new ants have many queens
so they're able to multiply their ranks that much more quickly. They also
don't go to the trouble of building ant hills. They simply nest under
anything they can find -- a log, a tire or a pet's water bowl -- and then
they quickly move on as they spread further into the state.

Nester said the ants swarmed into trucks at a shipping company, shorting out
the radios and even the vehicles themselves.

Gold said the ants got into an engine compartment at a sewage treatment
plant and shorted out the pumps so they couldn't move the sewage out. He
added that they've also overrun a subdivision and caused a lot of electrical
damage to houses there.

Part of the problem is that exterminators have found it nearly impossible to
kill the ants. Oh, you can kill some of them - the first wave, maybe.
However, there are so many more ants coming behind them, that the first wave
falls dead in the insecticide and the subsequent waves merely walk on the
dead bodies, keeping themselves out of the poison and safe from harm.

Gold warned people not to spray pesticide inside their computers and to
simply call in the professionals to prevent mixing up poisonous concoctions
or storing the potentially harmful partly used insecticides."

------------------------------

Date: Sat, 17 May 2008 20:12:53 -0400
From: Monty Solomon <monty@private>
Subject: F.B.I. Says the Military Had Bogus Computer Gear (John Markoff)

[Source: John Markoff, *The New York Times*, 9 May 2008]

Counterfeit products are a routine threat for the electronics
industry. However, the more sinister specter of an electronic Trojan horse,
lurking in the circuitry of a computer or a network router and allowing
attackers clandestine access or control, was raised again recently by the
F.B.I. and the Pentagon.

The new law enforcement and national security concerns were prompted by
Operation Cisco Raider, which has led to 15 criminal cases involving
counterfeit products bought in part by military agencies, military
contractors and electric power companies in the United States. Over the
two-year operation, 36 search warrants have been executed, resulting in the
discovery of 3,500 counterfeit Cisco network components with an estimated
retail value of more than $3.5 million, the F.B.I. said in a statement.

The F.B.I. is still not certain whether the ring's actions were for profit
or part of a state-sponsored intelligence effort. The potential threat,
according to the F.B.I. agents who gave a briefing at the Office of
Management and Budget on Jan. 11, includes the remote jamming of supposedly
secure computer networks and gaining access to supposedly highly secure
systems. Contents of the briefing were contained in a PowerPoint
presentation leaked to a Web site, Above Top Secret.

A Cisco spokesman said that the company had investigated the counterfeit
gear seized by law enforcement agencies and had not found any secret back
door. ...

http://www.nytimes.com/2008/05/09/technology/09cisco.html?partner=rssuserland&emc=rss&pagewanted=all

------------------------------

Date: Wed, 21 May 2008 11:16:06 -0400 (EDT)
From: Danny Burstein <dannyb@private>
Subject: Another undeleted/deleted Document - "Krolls Associates"

While the story is a bit vague on details as to the format/program
of the original e-mailed document, we've all seen this before:

James Doran, KROLL EXPOSES CLIENT INFO, *NY Post*, 4 May 2008

Inspector Clouseau is alive and well - and he appears to be working for
Kroll Associates.

The corporate spies, who are supposed to specialize in unearthing - and
keeping - company secrets, last week announced the conclusion of a
four-month long investigation into the North Carolina State Highway Patrol.

While the 47-page report appeared to be run of the mill, "meta data" buried
in the electronic document named three Texas-based oil and gas exploration
companies - Panther Bayou Energy, Bayou Bend Petroleum and Cymraec
Resources, which has recently changed its name to Vermillion - and seven
executives related to the companies.

On the subject line of the should-have-been-deleted information are the
words "Due Diligence Investigation" - corporate-speak for the type of spying
carried out by Kroll and others when a company is considering a takeover or
a merger.

[ snippety snip, rest at: ]

http://www.nypost.com/seven/05042008/business/kroll_exposes_client_info_109385.htm

------------------------------

Date: May 21, 2008 4:18:00 PM EDT
From: Randall Webmail <rvh40@private>
Subject: Phlashing attack thrashes embedded systems (John Leyden)

  [Don't phlash that dwarf - hand me the pliers!]

John Leyden, Phlashing attack thrashes embedded systems, *The Register*,
21 May 2008 [PGN-ed] <http://www.theregister.co.uk/2008/05/21/phlashing/>

A security attack that damages embedded systems beyond repair was
demonstrated for the first time in London on Wednesday.  The cyber-assault
thrashes systems by abusing firmware update mechanisms.  If successful, the
so-called phlashing attack would force victims to replace systems.

The attack was demonstrated by Rich Smith, head of research for offensive
technologies and threats at HP Systems Security Lab, at the EUSecWest
security conference in London on Wednesday. Smith told Dark Reading that
such as "permanent denial of service" attack could be carried out remotely
over the Internet.
http://www.darkreading.com/document.asp?doc_id=154270&WT.svl=news1_1

------------------------------

Date: Sun, 18 May 2008 22:53:40 +0200
From: Mickey Coggins <risks@private>
Subject: Geolocation software risks

I'm sure this is not news to any RISK readers that are somewhat familiar
with global IP addressing, but may be of interest to those that are not.

There are several companies that sell databases or access to databases that
attempt to map an IP address to a geographic location.  This seems to be
done for reasons such as localizing advertising, and limiting access to data
based on the person's country.

When they get the mapping wrong in their database, it can be problematic for
the owner of the IP address.  I ran across an exchange on the support form
of one such company here:
  http://forums.geobytes.com/viewtopic.php?t=5022

Apparently the design of their software does not allow them to correctly
attribute classless IP addresses smaller than a /24.

The risk here is that their customers are getting wrong results from the
database queries, without any indication.  I'll leave the possible effects
of these wrong results as an exercise for the reader.

------------------------------

Date: Mon, 19 May 2008 14:05:31 PDT
From: "Peter G. Neumann" <neumann@private>
Subject: Shopping centers tracking cell phones

  [Thanks to Lauren Weinstein for spotting this one.  PGN]

Slashdot <http://yro.slashdot.org/article.pl?sid=08/05/18/1838222> notes an
article in the *Times* of London on a tracking device by a company called
Path Intelligence that tracks the whereabouts of cell phones within shopping
centers.
<http://technology.timesonline.co.uk/tol/news/tech_and_web/article3945496.ece>

------------------------------

Date: Monday, May 19, 2008 12:02 AM
From: EEkid@private [EEkid@private]
Subject: China's All-Seeing Eye

  [From Dave Farber's IP list]

"Over the past two years, some 200,000 surveillance cameras have been
installed throughout the city. Many are in public spaces, disguised as
lampposts. The closed-circuit TV cameras will soon be connected to a single,
nationwide network, an all-seeing system that will be capable of tracking
and identifying anyone who comes within its range -- a project driven in
part by U.S. technology and investment. Over the next three years, Chinese
security executives predict they will install as many as 2 million CCTVs in
Shenzhen, which would make it the most watched city in the world."

"The end goal is to use the latest people-tracking technology --
thoughtfully supplied by American giants like IBM, Honeywell and General
Electric ... to identify and counteract dissent before it explodes into a
mass movement like the one that grabbed the world's attention at Tiananmen
Square."

"The mergers made L-1 a one-stop shop for biometrics. Thanks to board
members like former CIA director George Tenet, the company rapidly became a
homeland-security heavy hitter. ... L-1 can legally supply its
facial-recognition software for use by the Chinese government."

"I get to the customs line at JFK, watching hundreds of visitors line up to
have their pictures taken and fingers scanned. In the terminal, someone
hands me a brochure for "Fly Clear." All I need to do is have my
fingerprints and irises scanned, and I can get a Clear card with a biometric
chip that will let me sail through security. Later, I look it up: The
company providing the technology is L-1."

http://www.rollingstone.com/politics/story/20797485/chinas_allseeing_eye/

------------------------------

Date: Tue, 6 May 2008 14:30:14 +0900
From: Curt Sampson <cjs@private>
Subject: Re: Real-time spying on credit card holders (Brown, RISKS-25.14)

[Relating to the "risks" of real-time e-mail notification of credit card
transactions]

> * Real-time financial transaction data being sent "by e-mail", as if e-mail
>   guaranteed either delivery of the message....
> ...
> * Overreaction by managers...and cancels the card while I'm in the air.

While these are both certainly "risks," I think that this particular
analysis of the situation is pretty poor: it's nowhere near a balanced risk
assessment that will help someone less knowledgeable about these things to
make a decision, or give us good reason to suggest to the credit card
company that they change or discontinue the service.

So let's look at these two points in that light, shall we?

First, e-mail certainly is not guaranteed delivery. Should we really
want guaranteed real time delivery, we need a better mechanism. Perhaps
a leased line to a terminal in the cardpayer's office? Or a have a human
telephone the cardpayer every time the card is used. Both are pretty
expensive, and unlikely to be implemented. The cheapest alternate and
practical solution I can think of would be to assign an office worker to
check the current card transactions on the card's web site on, say, a
half-hourly basis, which is still pretty expensive.

Assuming e-mail has a 90% success rate for delivery, which option serves the
cardpayer best in preventing fraud: assigning staff to check the website
hourly, enabling the e-mail but having a 10% chance that they'll miss a
transaction, and thus, a smaller chance that they'll miss a fraudulent
transaction, or doing nothing, with the certainty that they'll not get
real-time notification of a fraudulent transaction?  It depends on the
situation, of course, but I'd wager that for a vast majority, the e-mail
option provides the best cost-benefit ratio.

Note that one might even disable the notifications while someone's traveling
(when you're likely to see a lot of them), and use them only one the
cardholder is not travelling, when transactions are far more likely to be
fraudulent (assuming the card is used only for travel).

So my vote on this side of things: an excellent feature, use it as
necessary, and do keep in mind that you might miss an e-mail, so have a
backup plan to deal with a fraudulent translation for which you don't get an
e-mail notification.

Well, I could go on to the other point, but I think that this provides a
reasonable example of how we should be doing risk analysis, and a good
contrast to the, "Oh no! There are risks!" school of post that I see here
from time to time.

Curt Sampson  +81 90 7737 2974   http://www.starling-software.com

------------------------------

Date: Sat, 17 May 2008 17:34:24 +0200 (CEST)
From: peter@private
Subject: Microsoft security advice for sale

Words fail me..

On the few Windows systems I have left, I always check what Windows update
wants to install (proved a good strategy during the "Windows Genuine
Advantage" disaster).  This hour's suggested patch was a "GDI+ scanner".
Being the curious sort, I followed the link
<http://go.microsoft.com/fwlink/?LinkId=33568> and guess what?

It links straight into a Microsoft Word document - in .docx format..

  [Eric Rachner noted "Yeah, whoever posted that document should've
  been more thoughtful.  In the meantime, you don't have to purchase
  Office -- just download the free .docx reader from Microsoft.]

------------------------------

Date: Sat, 17 May 2008 03:29:21 -0400
From: Monty Solomon <monty@private>
Subject: Old-Style Pumps Balk At $4-a-Gallon Gas, Too

[Source: Nick Miroff, *The Washington Post*, 16 May 2008]

Like a lot of small-scale entrepreneurs, Cathy Osborne worries that she'll
go out of business if fuel prices rise above $4 a gallon. Not because she
won't be able to buy gas at that price, but because she won't be able to
sell it.

The old mechanical gas pumps with scrolling dials at her country store in
Fauquier County lack the gears to go beyond $3.99 a gallon.  State
inspectors shut down her diesel pump several months ago when the fuel topped
the $4 mark, so now all that's left are two pumps dispensing 87-octane
gasoline, set at $3.75 -- and climbing. ...

http://www.washingtonpost.com/wp-dyn/content/article/2008/05/15/AR2008051503756.html

------------------------------

Date: Tue, 20 May 2008 08:10:17 +0200
From: Pete Kaiser <djc@private>
Subject: Clueless in France

Order broadband from France Telecom.  You will get web access to your
account information; the details of your order, for instance, are on a page
like this:

     http://suivicommande.francetelecom.com/....{number N}

The information on this page includes your name, the address where the
service is installed, your access code, account number, telephone number,
and of course what (they think) you ordered and what its status is.

N+1 also works, but for someone else's order.  And so forth.

It is staggeringly irresponsible to put this kind of information on
unsecured pages, especially with public consecutive transaction numbers in
the URL.  They do a lot on unsecured pages, or pages with a mix of secured
and unsecured frames that come from different domains.

And they also got our order wrong.

------------------------------

Date: Sat, 17 May 2008 11:06:44 -0400
From: Monty Solomon <monty@private>
Subject: PayPal XSS Vulnerability Undermines EV SSL Security (Paul Mutton)

[Source: Paul Mutton, netcraft, 16 May 2008]

A security researcher in Finland has discovered a cross-site scripting
vulnerability on paypal.com that would allow hackers to carry out highly
plausible attacks, adding their own content to the site and stealing
credentials from users.

The vulnerability is made worse by the fact that the affected page uses an
Extended Validation SSL certificate, which causes the browser's address bar
to turn green, assuring visitors that the site - and its content - belongs
to PayPal. Two years ago, a similar vulnerability was discovered on a
different page of the PayPal site, which also used an SSL certificate. ...

http://news.netcraft.com/archives/2008/05/16/paypal_xss_vulnerability_undermines_ev_ssl_security.html

------------------------------

Date: Sun, 18 May 2008 22:34:46 -0700
From: Gene Wirchenko <genew@private>
Subject: More GPS Mishaps

This week's (May 18, 2008) News of the Weird has under Recurring Themes two
items about GPS mishaps.  (http://www.newsoftheweird.com/)
  [Click on 05-18-08 if it is no longer the current column,
  scroll down to recurring themes, and this is what PGN found:]

Navigation System On, Brain Off: Brad Adams, 52, crashed his charter bus
(carrying two dozen high school softball players, who had to be sent to a
hospital) into a pedestrian bridge in Seattle's Washington Park Arboretum in
April (bus: 11 feet, 8 inches high; bridge, 9 feet, 0 inches). Adams said he
missed warning signs because he was busy following the navigation
system. [Seattle Times, 4-17-08]

Five days after that, in King's Lynn, England, a Streamline taxi minibus had
to be pulled from the River Nar after the driver, who said he was obediently
following the navigation system instructions, drove straight into the
water. [Lynn News, 4-23-08]

------------------------------

Date: Wed, 21 May 2008 21:36:08 +0100
From: "Chris D." <e767pmk@private>
Subject: Re: UK CCTV used to create a music video (RISKS-25.15).

Blatant opinion from a Brit: it feels like either `1984', or an Internet-era
version of 1970s East Germany...  It's a bit difficult to sort through the
media hype, but apart from the world's biggest DNA sample database,
allegedly some local authorities have experimented with garbage containers
incorporating RFID chips, so that they can track down errant citizens who
failed to sort their 6 types of plastics for recycling.  Just this week (May
20th) it was widely reported that laws are being proposed requiring
telecomms companies and ISPs to supply the Home Office (interior ministry)
with all telephone traffic and web surfing details and copies of e-mails
handled; potential data volumes are noted as a concern (what a surprise).
And coming soon (maybe) -- ID cards!  https://www.ips.gov.uk/ , follow
links.  There's a strong tradition here that "the gentleman in Whitehall
[Government offices] knows best", so opposition has been limited to grumbles
and moans.

> Unable to hire a production crew for a standard 1980's era MTV music
> video, they performed their music in front of 80 of the 13 million CCTV
> "security" cameras available in England

Funnily enough, a humorist in a newspaper some years ago suggested making a
movie this way -- you've heard of `cinema verite', so he proposed `cinema
securite'...

Chris Drewe, Essex County, UK.

------------------------------

Date: Fri, 16 May 2008 15:31:49 -0700
From: Bill Bumgarner <bbum@private>
Subject: Re: Dilbert wants a widget (Ehrich, RISKS-25.15)

The new Dilbert site design is abysmal.  It is a flash based behemoth that
takes a long time to load, is slow, and generally crowds the page with
useless garbage.

In other words, every bit the design product of a group of people working in
an environment that Dilbert so effectively pokes fun of.

In response to the unbelievably loud set of complaints about the "new and
improved" design, a "fast" page was made available:
  http://www.dilbert.com/fast

------------------------------

Date: Mon, 19 May 2008 14:46:10 -0700
From: "Horning, Jim" <Jim.Horning@private>
Subject: Re: Debian OpenSSL Predictable PRNG Toys

"Random" and "haphazard" are not synonyms.

The assumption that uninitialized memory actually contains *random* values,
rather than merely values *that the writer of the code does not know how to
predict* is a highly dubious one.  I have used systems where the values of
uninitialized variables were totally predictable.  I don't know which open
source operating systems randomize the contents of memory when allocating it
and which do not, but anyone who cares about the results of the OpenSSL
package really ought to.

I hope that someone is checking out the predictability of all the non-Debian
PRNG results?

------------------------------

Date: Tue, 20 May 2008 11:00:33 -0700
From: "David E. Price, SRO, CHMM" <price16@private>
Subject: Re: Securing The Wrong Spaces: A Lesson (Damiano, RISKS-25.09)

Actually, because of the effects of the inverse square law, given an equally
sensitive radar on the other end they can be detected at 4 times the
distance they can 'see', not twice the distance. (A RISK of simple math?)

Senior Safety Analyst
(Nuclear, Chemical, Biological, and Explosives Accident/Safety Analyses)

------------------------------

Date: 17 Oct 2007 (LAST-MODIFIED)
From: RISKS-request@private
Subject: Abridged info on RISKS (comp.risks)

 The ACM RISKS Forum is a MODERATED digest, with Usenet equivalent comp.risks.
=> SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup (comp.risks or equivalent)
 if possible and convenient for you.   The mailman web interface can
 be used directly to subscribe and unsubscribe:
   http://lists.csl.sri.com/mailman/listinfo/risks
 Alternatively, to subscribe or unsubscribe via e-mail to mailman
 your FROM: address, send a message to
   risks-request@private
 containing only the one-word text subscribe or unsubscribe.  You may
 also specify a different receiving address: subscribe address= ... .
 You may short-circuit that process by sending directly to either
   risks-subscribe@private or risks-unsubscribe@private
 depending on which action is to be taken.

 Subscription and unsubscription requests require that you reply to a
 confirmation message sent to the subscribing mail address.  Instructions
 are included in the confirmation message.  Each issue of RISKS that you
 receive contains information on how to post, unsubscribe, etc.

=> The complete INFO file (submissions, default disclaimers, archive sites,
 copyright policy, etc.) is online.
   <http://www.CSL.sri.com/risksinfo.html>
 The full info file may appear now and then in RISKS issues.
 *** Contributors are assumed to have read the full info file for guidelines.

=> .UK users should contact <Lindsay.Marshall@private>.
=> SPAM challenge-responses will not be honored.  Instead, use an alternative
 address from which you NEVER send mail!
=> SUBMISSIONS: to risks@private with meaningful SUBJECT: line.
 *** NOTE: Including the string "notsp" at the beginning or end of the subject
 *** line will be very helpful in separating real contributions from spam.
 *** This attention-string may change, so watch this space now and then.
=> ARCHIVES: ftp://ftp.sri.com/risks for current volume
     or ftp://ftp.sri.com/VL/risks for previous VoLume
 <http://www.risks.org> redirects you to Lindsay Marshall's Newcastle archive
 http://catless.ncl.ac.uk/Risks/VL.IS.html gets you VoLume, ISsue.
   Lindsay has also added to the Newcastle catless site a palmtop version
   of the most recent RISKS issue and a WAP version that works for many but
   not all telephones: http://catless.ncl.ac.uk/w/r
 <http://the.wiretapped.net/security/info/textfiles/risks-digest/> .
==> PGN's comprehensive historical Illustrative Risks summary of one liners:
    <http://www.csl.sri.com/illustrative.html> for browsing,
    <http://www.csl.sri.com/illustrative.pdf> or .ps for printing
==> Special Offer to Join ACM for readers of the ACM RISKS Forum:
    <http://www.acm.org/joinacm1>

------------------------------

End of RISKS-FORUM Digest 25.16
************************



This archive was generated by hypermail 2.1.3 : Thu May 22 2008 - 17:06:25 PDT