Re: Active networks

2000-05-22 Thread Kumar Subramanian
You can get some information from the following links: -Kumar http://www.cc.gatech.edu/projects/canes/publications.html http://www.cis.upenn.edu/~switchware/ http://www.cis.upenn.edu/~boosters/p4home.html [EMAIL PROTECTED] 05/22/00 11:05AM Hi, I would like to get some info on Active

Re: Active networks

2000-05-22 Thread R. Muralidharan
Hi Narayan, You may refer the IEEE publication : COMPUTER, April 1999 issue which is a special one on ACTIVE NETWORKS. Visit http://computer.org and navigate to see the abstract of the article issue. muralidharan - Original Message - From: [EMAIL PROTECTED] To: [EMAIL PROTECTED]

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Gordon Lennox
One current international position on "Crime in Cyberspace" can be found in the draft Council of Europe Convention. This was released for public comment towards the end of April. See: conventions.coe.int/treaty/en/projets/cybercrime.htm Information on the Council of Europe can be found at:

asynchronous audio conferencing at www.wimba.com

2000-05-22 Thread James Salsman
There is finally a cross-platform, quasi-web-based system for asynchronous audio conferencing: http://www.wimba.com This system is new and worth exploring. It uses Java applets for microphone input, and has a full range of features already. The great benefit is the enabling of

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Scott Bradner
Scott Bradner gave a presentation at the G8 hi-tech crime event in Paris last week the presentation is at: http://golem.sobco.com/presentations/2000.05.17-g8/index.htm since the real work of the confreence was done in private it was hard to tell what was actually going on. But the

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Bertrand . Ibrahim
Steve Bellovin [EMAIL PROTECTED] said: I'm far from convinced, for example, that the LOVEBUG virus would have been prevented were all mail digitally signed, because I strongly suspect that the attack would have invoked a digital signature API to generate digitally-signed copies of itself.

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Kurt D. Zeilenga
rant We must be careful not to classify our efforts as preventing crime. Crime is matter of law and law is jurisdictional. As the Internet is crosses jurisdictional boundaries, there is not one clear definition of law and hence no clear definition of crime. And crime is not always bad. Some

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Jacob Palme
At 11.21 -0400 0-05-22, Steven M. Bellovin wrote: In short -- yes, there are problems, but the best approach for the IETF is to design, build, and deploy stronger systems. But would not better logg production in routers be an aid in finding the villain behind computer crimes? -- Jacob Palme

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Jacob Palme
At 22.52 +0200 0-05-21, Harald Tveit Alvestrand wrote: They're making cooperation, whether we want it or not. Not an IETF problem. Maybe not an IETF problem, but the way we act when the police come should be discussed either in IETF or in ISOC. A well-known example from some years ago. A very

Re: asynchronous audio conferencing at www.wimba.com

2000-05-22 Thread Matt Crawford
As a linguistic exercise, you might reconcile this message, which you get when you refuse to grant their applets read/write/delete/execute access to all your files: In order to run the Wimba forums application, you will need to grant our applet a certain number of privileges. Our applet is

Re: asynchronous audio conferencing at www.wimba.com

2000-05-22 Thread James P. Salsman
Matt, Thanks for your message: As a linguistic exercise, you might reconcile this message, which you get when you refuse to grant their applets read/write/delete/execute access to all your files: In order to run the Wimba forums application, you will need to grant our applet a

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Steven M. Bellovin
In message v04210103b54f26125316@[130.237.150.138], Jacob Palme writes: Does there exist a mailinglist specially oriented towards cybercrime and its prevention? If not, should we start such a list? I don't know of any such list. But -- as we've learned in the IETF about working group charters

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Theodore Y. Ts'o
Date: Mon, 22 May 2000 20:14:55 +0200 From: Jacob Palme [EMAIL PROTECTED] They went to the police (in the USA) saying that this person had infringed on their copyright by publishing their secret documents on Usenet. The police in the USA contacted the police in Finland. The

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Jacob Palme
At 18.28 +0200 0-05-22, [EMAIL PROTECTED] wrote: I would hope that any software I use, that is able to put my digital signature on some data, would ask me for my pass-phrase every time my private key is used. I would even hope that such software wouldn't be able to use my private key without the

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Valdis . Kletnieks
On Tue, 23 May 2000 03:13:33 +0200, Jacob Palme [EMAIL PROTECTED] said: That would mean that every time you execute any program, you would have to get an analysis of its possible harmful effects and decide whether to accept it. Possibly, the system could be designed so that a checksum is

Re: Should IETF do more to fight computer crime?

2000-05-22 Thread Bertrand . Ibrahim
"Steven M. Bellovin" [EMAIL PROTECTED] said: in the Holy Name of Convenience, many (most?) mailers permit a passphrase to be cached for some amount of time. A virus could exploit that. Ok. So, you're reasoning on the assumption that the user and her system enginer are both incompetent,