You can get some information from the following links:
-Kumar
http://www.cc.gatech.edu/projects/canes/publications.html
http://www.cis.upenn.edu/~switchware/
http://www.cis.upenn.edu/~boosters/p4home.html
[EMAIL PROTECTED] 05/22/00 11:05AM
Hi,
I would like to get some info on Active
Hi Narayan,
You may refer the IEEE publication : COMPUTER, April 1999 issue which
is a special one on ACTIVE NETWORKS. Visit http://computer.org and navigate
to see the abstract of the article issue.
muralidharan
- Original Message -
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
One current international position on "Crime in Cyberspace" can be found in the draft
Council of Europe Convention. This was released for public comment towards the end of
April. See:
conventions.coe.int/treaty/en/projets/cybercrime.htm
Information on the Council of Europe can be found at:
There is finally a cross-platform, quasi-web-based system for
asynchronous audio conferencing:
http://www.wimba.com
This system is new and worth exploring. It uses Java applets
for microphone input, and has a full range of features already.
The great benefit is the enabling of
Scott Bradner gave a presentation at the G8 hi-tech crime event in Paris last
week
the presentation is at:
http://golem.sobco.com/presentations/2000.05.17-g8/index.htm
since the real work of the confreence was done in private it was hard
to tell what was actually going on. But the
Steve Bellovin [EMAIL PROTECTED] said:
I'm far from convinced, for example, that the LOVEBUG virus would
have been prevented were all mail digitally signed, because I
strongly suspect that the attack would have invoked a digital
signature API to generate digitally-signed copies of itself.
rant
We must be careful not to classify our efforts as preventing crime.
Crime is matter of law and law is jurisdictional. As the Internet
is crosses jurisdictional boundaries, there is not one clear
definition of law and hence no clear definition of crime. And
crime is not always bad. Some
At 11.21 -0400 0-05-22, Steven M. Bellovin wrote:
In short -- yes, there are problems, but the best approach for the IETF
is to design, build, and deploy stronger systems.
But would not better logg production in routers be an aid
in finding the villain behind computer crimes?
--
Jacob Palme
At 22.52 +0200 0-05-21, Harald Tveit Alvestrand wrote:
They're making cooperation, whether we want it or not.
Not an IETF problem.
Maybe not an IETF problem, but the way we act when the
police come should be discussed either in IETF or in
ISOC.
A well-known example from some years ago. A very
As a linguistic exercise, you might reconcile this message, which you
get when you refuse to grant their applets read/write/delete/execute
access to all your files:
In order to run the Wimba forums application, you will need to
grant our applet a certain number of privileges. Our applet is
Matt,
Thanks for your message:
As a linguistic exercise, you might reconcile this message, which you
get when you refuse to grant their applets read/write/delete/execute
access to all your files:
In order to run the Wimba forums application, you will need to
grant our applet a
In message v04210103b54f26125316@[130.237.150.138], Jacob Palme writes:
Does there exist a mailinglist specially oriented towards
cybercrime and its prevention? If not, should we start such
a list?
I don't know of any such list. But -- as we've learned in the IETF
about working group charters
Date: Mon, 22 May 2000 20:14:55 +0200
From: Jacob Palme [EMAIL PROTECTED]
They went to the police (in the USA) saying that this
person had infringed on their copyright by publishing
their secret documents on Usenet. The police in the
USA contacted the police in Finland. The
At 18.28 +0200 0-05-22, [EMAIL PROTECTED] wrote:
I would hope that any software I use, that is able to put
my digital signature on some data, would ask me for my
pass-phrase every time my private key is used. I would
even hope that such software wouldn't be able to use my
private key without the
On Tue, 23 May 2000 03:13:33 +0200, Jacob Palme [EMAIL PROTECTED] said:
That would mean that every time you execute any program, you would
have to get an analysis of its possible harmful effects and decide
whether to accept it. Possibly, the system could be designed so
that a checksum is
"Steven M. Bellovin" [EMAIL PROTECTED] said:
in the Holy Name of Convenience, many (most?) mailers permit a
passphrase to be cached for some amount of time. A virus could
exploit that.
Ok. So, you're reasoning on the assumption that the user and her system
enginer are both incompetent,
16 matches
Mail list logo