******* You may leave the list at any time by sending an email to [EMAIL PROTECTED] with the text "SIGNOFF SECURITYPORTAL-L" in the body of the email. We will miss you! ******* Vendor Corner ******* WRITE YOUR INFORMATION SECURITY POLICIES IN A DAY! INFORMATION SECURITY POLICIES MADE EASY is a kit, text and CD, of 1000+ already-written security policies by internationally-known consultant Charles Cresson Wood. ISPME has JUST BEEN UPDATED and is now available in Version 7! ISPME v7 is the most comprehensive collection of policies available covering the latest technology developments and infosec topics. Each of these policies is accompanied by commentary detailing policy intention, audience, and the circumstances where it applies. Save weeks of time and thousands of dollars developing policies for information security manuals, systems standards, etc. with no consultant fees. Go to - http://www.baselinesoft.com ******* What's New With SecurityPortal ******* This interview is with a representative of NTRU, a company which recently made the news with a new public-key system that is considerably faster than any other previously known, and which has been reviewed by a number of independent experts who have not found any significant flaws in it. This makes the system of considerable interest, considering that other proposed rapid methods of public-key cryptography were found not to be secure after scrutiny. Read the full story here: http://securityportal.com/cover/coverstory20000904.html Ask Buffy Overflow Do you have questions about information security? Buffy has the answers. Every Thursday Buffy will post answers to your questions about security issues. Please send your questions to: [EMAIL PROTECTED] Want to read Buffy's answers to last week's questions? http://securityportal.com/buffy/buffy20000831.html ******* Top News ******* Welcome to SecurityPortal - The Focal Point for Security on the Net(tm) Recent postings in our top news http://www.securityportal.com/topnews: Sept 4, 2000 Weekly Axent Security Roundup - In the news, RaptorMobile 6.5.1 is finally available. The mailing list this week included discussions about SSL connection errors, packet redirection, and the Nutcracker Kernel. The technical tip sheds light on the firewall licensing agreement. http://securityportal.com/topnews/weekly/axent20000904.html Weekly BSD Security Roundup - The big news this week is OpenBSD. They have admitted to having a local root hack, and have changed the Web page to "Only one localhost hole in two years in the default install!" I find it funny they did not put "One month without a local hole in the default install!" Anyways, I digress. FreeBSD has been incredibly busy issuing security updates this week and it looks like if you are using the Linux compatibility stuff, you need to patch and recompile your kernel to solve some problems. http://securityportal.com/topnews/weekly/bsd20000904.html Weekly Checkpoint Security Roundup - High availability, network intrusion detection, encryption, VPNs, and OPSEC - these are all buzzwords of the current era. In order to continue to offer a robust security solution these days, one must offer multiple lines of defense. Discussions this week show how Check Point consistently recognizes that fact, and adds new functionality to their major product line in order to combat growing threats. http://securityportal.com/topnews/weekly/checkpoint20000904.html Weekly Executive Digest - Cell phones and personal digital assistants are susceptible to a new breed of viruses, according to a couple of news items, liability for security problems is debated, the public is increasingly calling for authorities to take a hard line on hackers, and a Pentagon report blames the Internet as a major method for transmitting information about weapons of mass destruction. Also, did your techies catch last week's major problem with email encryption? http://securityportal.com/topnews/weekly/exec20000904.html Weekly Linux Security Roundup - The big news this week is a potential glibc hole, for which no exploit code exists - but vendors are issuing fixes. (Dontcha love Linux security? We know there might be an exploitable issue under certain rare circumstances; nobody has seen exploit code yet, but here's the fix). The other is mgetty - in certain configurations it can be used to overwrite files. Vendors have been issuing updates. In general, the rest is catch-up with older problems like Zope, Netscape and Xchat. http://securityportal.com/topnews/weekly/linux20000904.html Weekly Microsoft Security Roundup - Microsoft Security developments have been somewhat slow this week, but we did get one new bulletin from Microsoft, as well as some NTBugtraq postings. A new patch has been issued for Windows 2000, regarding a security policy corruption problem. NTBugtraq postings on Rootkits, NetBios Cache problems, and a lock workstation problem. See the tip of the week for information on Microsoft's latest Frontpage 2000 Service Release. http://securityportal.com/topnews/weekly/microsoft20000904.html Weekly Solaris Security Roundup - Vulnerabilities in 3rd Party Applications: gwscripts, helix, mgetty, kerberos. News: Sun provides string crypto internationally. Tool Updates: snort, sftp, cryptix, samhain. Articles: Audits, Authentication and Access Control, PAM. Discussions Summary: YASSP & Focus-Sun. "Tip of the Week" presents tocsin, a "featherweight" IDS. http://securityportal.com/topnews/weekly/solaris20000904.html Sept 3, 2000 Cryptome: guide to NSA sabotage - Your tax dollars at work, how the NSA strong arms companies into reducing the strength of encryption in products. http://cryptome.org/nsa-sabotage.htm Shmoo: Capture the Capture The Flag - Capture the Capture The Flag (CCTF) is a project by The Shmoo Group to sniff and log all the data on the Capture The Flag contest at DefCon. Hopefully, the end result is not better IDS's and such... the end result should be a wakeup call for application developers to write more secure apps that don't need an IDS in front of them. http://www.shmoo.com/cctf/ Sept 2, 2000 SecurityFocus: AtStake jilts Phiber Optik - When Mark Abene found himself being wooed last month by security services firm @stake, he didn't expect his hacker past from seven years earlier to come back to haunt him. http://www.securityfocus.com/news/79 ZDNet: Old Internet Explorer Plus New Hotmail Equals Big Vulnerability - Haven't upgraded Internet Explorer yet? Maybe this will convince you. BugNet has validated a security vulnerability that could allow a malicious user to gain access to your Hotmail account. By enticing a Hotmail customer running Internet Explorer 4.x or 5.0 into clicking on a carefully constructed link, the unwary victim would be tricked into abdicating crucial cookie information that would allow the hacker to gain access to the Hotmail account http://www.zdnet.com/zdhelp/stories/main/0,5594,2623070,00.html ECommerceTimes: Net Blamed for Identity Theft Spike - The U.S. Federal Trade Commission (FTC) says it has seen complaints of identity theft triple so far this year, and claims at least part of the increase can be attributed to the Internet. http://www.ecommercetimes.com/news/articles2000/000831-4.shtml Red Hat: glibc vulnerabilities in ld.so, locale and gettext - Several bugs were discovered in glibc which could allow local users to gain root privileges. http://www.redhat.com/support/errata/RHSA-2000-057-02.html Salon: Ain't no network strong enough - "Computer insecurity is inevitable," [Bruce Schneier] warns. "Networks will be hacked. Fraud will be committed. Money will be lost. People will die." http://www.salon.com/tech/review/2000/08/31/schneier/index.html PCWorld: Is Eudora Snooping on You? - The popular mail client sends information to its servers when you're online. It may not identify you. But shouldn't you know about it? http://www.pcworld.com/pcwtoday/article/0,1510,18335,00.html CERT Incident Note IN-2000-09: Vulnerability in the IRIX telnet daemon - We have received reports of intruder activity involving the telnet daemon on SGI machines running the IRIX operating system. Intruders are actively exploiting a vulnerability in telnetd that is resulting in a remote root compromise of victim http://www.cert.org/incident_notes/IN-2000-09.html Sept 1, 2000 ComputerWorld: Amazon.com revises privacy policy on use of customer data - Amazon.com Inc. yesterday posted a new privacy policy on its Web site that's aimed at giving online shoppers a better idea of exactly what happens to the personal information they willingly give the company -- not to mention the data they inadvertently leave behind http://www.computerworld.com/cwi/story/0,1199,NAV47_STO49388,00.html?OpenDoc ument&~f Register: Microsoft won't fix new Windows security flaw - Microsoft says it won't be issuing a patch for a newly discovered security vulnerability in Windows that PGP's COVERT lab classifies as 'high-risk'. The COVERT Lab issued an advisory earlier this week detailing how a local Windows networking configuration can be corrupted by redirecting the user to an arbitrary IP address of the hacker's choosing. In itself, say researchers, the vulnerability isn't destructive. For malicious crackers it's more likely to be a means to an end. But the simplicity and stealth with which the attack can be carried out means that it merits a high risk rating, says PGP. http://www.theregister.co.uk/content/4/12951.html Sun: Solaris Data Encryption Supplemental CD Download delivery - The software previously contained on the Solaris Data Encryption Supplemental CD (SOLZ9-080N9999) is being repriced from $100 to no charge (via web download) and will now be offered via download to all countries except Russia, Israel and nations embargoed by the U.S. government and Burma as per Sun policy. Comment: This sounds like exactly what International Sunscreen and SKIP customers have been waiting for, but it is unclear how to actually download. http://www.sun.com/productflashes/july2000/080800_solaris_data_encryption.jh tml TechWeb: SMS Vulnerability Found In Nokia Phones - A weakness has been discovered in Nokia AB cell phones that could interfere with call completion and force the user to reboot, security experts said http://www.techweb.com/wire/story/TWB20000831S0011 NAI: BackDoor-HA Trojan Program - This is a Windows 9x Internet Backdoor trojan. The Visual Basic 6.0 Runtime Module is required to execute this file. When running it gives access to the system over the Internet to anyone running the appropriate client software http://vil.nai.com/villib/dispvirus.asp?virus_k=98802 Magic Bullets - Computer security is difficult to achieve. It requires constant vigilance, and it involves inconvenience. Sometimes, expensive products are offered that are claimed to solve your security problems with no problems, and they do not deliver. However, there are a number of inexpensive measures that would seem to solve a lot of security problems that aren't being used. http://securityportal.com/topnews/magic20000901.html ZDNet: Security gaffe gores Bull's servers - A security flaw at Bull on Thursday briefly allowed anyone access to the IT company's servers, offering up confidential information on both the company and its high-profile customers. http://www.zdnet.com/zdnn/stories/news/0,4586,2622664,00.html ComputerWorld: Microsoft adds cookie management to IE 5.5 - Microsoft Corp. today said it's ready to ship a promised set of cookie management features for Internet Explorer 5.5 that give users of the Web browser the option of deleting cookies as an added form of privacy http://www.computerworld.com/cwi/story/0,1199,NAV47_STO49328,00.html Aug 31, 2000 IDG: Charges brought in Parametric extortion case - Michael Pitelis, of Tarpon Springs, Florida, was indicted on charges of attempted computer extortion for allegedly threatening to release the "keys" to operate Parametric's flagship design software, Pro/Engineer, if he did not receive more than $1 million. The passwords and codes would have given users free access to all the functions of the 20th version of Pro/Engineer, which typically costs more than $100,000 http://idg.net/ic_236283_1773_1-483.html Microsoft Word Documents, Among Others, Can Be "Bugged" - The Previously Undocumented Feature Can Allow the Surreptitious Tracking of Computer Files on the Internet. Readers of email document attachments beware: the author of a computer file may be able to track the path of the file to your computer and others through the use of "Web bugs," the Privacy Foundation reported today. A summary in German is available on Global Network News http://www.gnn.de/0008/9541.html http://www.privacyfoundation.org/story2.html Ask Buffy - Do you have questions about information security? Buffy has the answers. This week's theme is difficult questions. http://securityportal.com/buffy/buffy20000831.html ComputerWorld: Federal Agencies To Be Graded - Apparently, many U.S. federal agencies can't see the need for improved security on their own volition -- they will, therefore, be chided into action by report cards similar to the ones used to stimulate compliance with Y2K issues. We anticipate that the class average will be something less than "A". http://www.computerworld.com/cwi/Printer_Friendly_Version/frame/0,1212,NAV47 _STO49211-,00.html TimesofIndia.com: Shareholders Suffer When Security is Poor - With computer attacks on the rise, shareholders have become increasingly nervous as they begin to realize the ramifications of poor security and the direct effect it has on their portfolios. In an effort to address growing concern surrounding this issue, the White House enlisted the help of The Institute of Internal Audit. The result was "A Call to Action For Corporate Governance," a paper they hope will become the global standard for companies trying to protect themselves. The government insists that each company make security a priority. Imagine that - asking companies to take responsibility for their own security. http://www.timesofindia.com/today/30mbom24.htm The Emotional Side of Cryptography - Encrypting data before storage or transmission involves a bit of extra work. This often means that people who ought to be using encryption, instead of relying that their data will not be intercepted, fail to do so. But it is also true that some of the people who use encryption are keenly aware of the importance of keeping their information secret. http://www.securityportal.com/topnews/emotional20000831.html ComputerWorld: Developer Unleashes Palm Trojan Horse Program - An independent developer inadvertently unleashed a Trojan horse program that can wipe out the files on Palm handhelds. Palm Inc. downplayed the impact but acknowledged that its devices are susceptible, as analysts warned of copycat attacks. http://www.computerworld.com/cwi/story/0,1199,NAV47_STO49272,00.html Aug 30, 2000 ZDNet: Text Messages May Freeze Nokia Phones - A Norwegian company claims coding in text messages could freeze top-selling cell phones. Are viruses far behind? http://www.zdnet.com/zdnn/stories/news/0,4586,2622049,00.html ZDNet: Palm Trojan Fails to Sting Users But Gets Security Pundits in a Flap - Antivirus vendors report that the first Trojan horse program to affect the Palm handheld computers poses little tangible threat but highlights a significant future danger. http://www.zdnet.co.uk/news/2000/34/ns-17579.html CNet: Password Glitch Riles ICQ Users - America Online's efforts to bolster security for its ICQ instant messaging service are drawing complaints from some people who say the measures have locked them out of their accounts. http://news.cnet.com/news/0-1005-200-2652485.html?tag=st.ne.1430735..ni EcommerceTimes.com: Is Anyone Accountable for Net Security Snafus? - The United States is the most litigious country in the world. People sue McDonald's if their coffee is too hot. Prisoners sue if their color TVs are taken away. Doctors, lawyers, big corporations, mom-and-pop corner stores -- no one is immune to being slapped with a contentious lawsuit. Except, apparently, Microsoft and all the other high-tech companies who peddle software with gaping security holes. http://www.ecommercetimes.com/news/viewpoint2000/view-000831-1.shtml LinuxWorld: Attacking Linux - To Stop an Attacker, Think Like a Cracker - Network scanning, password grabbing, trojaned software -- all are the bane of the righteous sysadmin. Craig Ozancin reveals how to beef up network security and ward off attackers at the LinuxWorld Expo, as reported by Rick Moen. http://www.linuxworld.com/linuxworld/lw-2000-08/lw-08-expo00-hacking.html Wired: Joining Forces at New Linux Lab - Computer hardware giants Hewlett-Packard, Intel, IBM, and NEC are joining together to fund an independent, nonprofit laboratory to help speed the development and testing of enterprise-targeted Linux projects. http://www.wired.com/news/business/0,1367,38505,00.html ZDNet: The New Virus War Zone: Your PDA - As more PDAs and smart phones get connected to the Internet, they're increasingly vulnerable to the world of viruses. http://www.zdnet.com/zdnn/stories/news/0,4586,2621395,00.html Top 20 Virus Report - A comprehensive ranking of the 20 most important viruses to be aware of and watch out for this week, including profiles, links, and other timely information. http://securityportal.com/research/virus/virustop20.html SSL Server Security Survey - A random sample of 8081 different secure web servers (servers running the SSL protocol) in active use on the Internet shows that 32% are dangerously weak. These weak servers either support only the flawed SSL v2 protocol, use too-small key sizes ("40 bit" encryption), or have expired or self-signed certificates. Data exchanges with all types of weak servers are vulnerable to attack. http://www.meer.net/~ericm/papers/ssl_servers.html NAI: W32/NewsTick Virus - This is a Windows 9x Internet Backdoor trojan. When running it gives full access to the system over the Internet to anyone running the appropriate client software. The application hides itself from the Win9x task manager http://vil.nai.com/villib/dispvirus.asp?virus_k=98800 Aug 29, 2000 ComputerWorld: Federal Agencies FaceGrading on Security Readiness - The congressional committee that released A, B, C, D and F grades on the year 2000 compliance of federal agencies during the last two years now intends to issue similar grades evaluating the information security readiness of 54 federal agencies and departments http://www.computerworld.com/cwi/story/0,1199,NAV47_STO49211,00.html?OpenDoc ument&~f UK.Internet.com: Security on Q With James Bond device - ComSense, an Israeli startup, has created a James Bond style technology that uses sound waves to tackle fraud and privacy problems on the internet. http://www.uk.internet.com/Article/100460 TheWeb.com: As West Nile Virus Threatens, PC Viruses Live On - As New York, Boston, and other Northeastern cities take precautions to combat the West Nile virus in the real world, take a look at how PC viruses have affected cyberspace in the past decade. http://www.techweb.com/wire/story/TWB20000829S0009 CNN: Auctions No.1 Net Fraud - Online auctions are the number one source of fraud on the Internet, according to a nationwide FBI tally reported Tuesday. The information is based on consumer complaints lodged with the Internet Fraud Complaint Center, a joint project of the Department of Justice and the FBI http://cnnfn.cnn.com/2000/08/29/technology/netfraud/ Reuters: Most Say Computer Hacking Should Be a Felony - Tampering with computers and the Internet should be charged as a felony, most Americans said in a recent nationwide survey. http://dailynews.yahoo.com/h/nm/20000828/zo/crime_1.html ABCNews: A Different Kind of Hijacking is Taking Place in the Skies - Britain's Civil Aviation Authority has issued a safety alert about a new threat to air passengers: hackers taking over air traffic control transmissions and giving pilots bogus orders. http://www.abcnews.go.com/sections/us/DailyNews/FakeAirTraffic000829.html CNet: Net Security Firm Mum on Microsoft Takeover Rumor - Ireland-based Internet security firm Baltimore Technologies declined to comment today on reports that U.S. computing giant Microsoft is considering a takeover bid http://news.cnet.com/news/0-1003-200-2640454.html?tag=st.ne.1002.thed.ni FCW: Internet Enables Surfing For Secrets - A study conducted for the Pentagon has singled out the Internet as one of the primary vehicles by which classified information related to weapons of mass destruction often falls into the wrong hands http://www.fcw.com/fcw/articles/2000/0828/web-secret-08-28-00.asp TechWeb: Trojan Horse App Threatens Palm Platform - A software gaming developer posted a Trojan horse application called the Liberty Emulator that attacks the open-source developer platform of the Palm OS. http://www.techweb.com/wire/story/TWB20000828S0025 Firewalls - Placement - Security is no good if it isn't in the right place. Think about a modern office building - where are the doors with locks? The lobby doors can always be locked, and usually the doors on each floor have locks as well. If only the office doors had locks, the building would be less secure. More security guards would be needed to make sure no one is trying to force a door. In a perfect world, every door would have a strong lock and a guard sitting next to it with a shotgun - but since cost is a factor, this won't happen. The same applies to networks. While there are many free firewalls available, it costs a lot to install and maintain a firewall on each machine. It is much more efficient to have firewalls where your network connects to distrusted networks. You should also consider the type of traffic a firewall will need to handle. The more traffic, the more complex the rules necessary, and the greater the chance an attacker can slip in. http://www.securityportal.com/topnews/fw20000829.html Government-Assisted Cryptography - Given that cryptography is a useful technique to protect the security of financial and other transactions, government restrictions on cryptography have received a great deal of attention in today's wired climate. http://www.securityportal.com/topnews/goascr20000829.html Independent: How to Beat the Net Censors - Filtering software is designed to restrict access to websites which its manufacturers deem unsuitable. But now there's an easy way to bypass all that. http://www.independent.co.uk/news/Digital/Update/2000-08/feature280800.shtml ComputerUser.com: Network Solutions Confirms Internet Addressing Database Glitch - Network Solutions registry division, which maintains a directory of more than 19 million Web addresses and is responsible for making this information available to other computers on the Internet, confirmed a glitch with its system on Wednesday evening. http://www.computeruser.com/news/00/08/28/news4.html ComputerUser.com: Arachne Browser Architect Dismisses Virus Charge - Michael Polak, a Czech scientist whose browser has been causing so many problems for its users that he was accused of disseminating a virus, issued an explanation on his Web site this week. http://www.computeruser.com/news/00/08/28/news1.html CNN.com: Software Security Holes: To Tell, or Not to Tell - Some "bug hunters" who uncover security flaws in computer software and rush to issue public warnings may be helping hackers more than consumers, industry officials worry. http://www.cnn.com/2000/TECH/computing/08/28/computer.bugs.ap/index.html Aug 28, 2000 TechServer.com: Attack on Irish ISP May be the Work of a Teenager - The investigation into a security break-in at Eircom, Ireland's largest ISP, hones in on a 17 year old suspect. The Eircom attack allegedly compromised the usernames and passwords of 30,000 customers. http://www.techserver.com/noframes/story/0,2294,500244325-500361491-50212412 5-0,00.html TheStar.com: Software Trapdoor Threatens Canadian National Security - The Royal Canadian Mounted Police has launched an investigation into a software product named Promis that may have been tampered with in an attempt to obtain classified information. As news of the investigation unfolds, there is a possible link to homicides that are under separate investigation. http://www.thestar.com/editorial/news/20000828NEW01b_NA-MOUNTIE28.html Pretty Good Privacy and the ADK Bug - PGP, the program, will be remembered by many as a watershed event in the popularity of encryption use by ordinary people. Although there was a version 1.0 that used a weak cipher devised by Phil Zimmerman himself, it was version 2 that recieved the publicity. Like PEM (Privacy-Enhanced Mail), it was an implementation of a model of encryption that was known then, and which is now nearly ubiquitous: a public-key cipher is used to convey a session key belonging to a single message, and the message itself is enciphered in a conventional, or "symmetric" cipher using the session key. The legal problems surrounding PGP were also well known: the government's investigation of whether Mr. Zimmerman could be held responsible for the fact that versions were passed around to people outside the United States, and the use of the RSA algorithm in PGP. http://securityportal.com/topnews/pgpadk20000828.html NWFusion: Survival Tips - Here are some cheap, easy and effective steps to keep your network safe from DDoS attacks. http://www.nwfusion.com/research/2000/0828feat2side.html?nf TheRegister: Hacktivists Crash Korea Govt Home Page - Protesters forced the Korean Ministry of Information and Communication's Web site to shut down for 10 hours on Saturday. But was it a mass click-in or a DDoS (Distributed Denial-of-Service) attack which brought the service to its knees? http://www.theregister.co.uk/content/1/12863.html PGPI.org: PGP v6.5.8 Released, Fixing ADK Problems. - PGP 6.5.8 has just been released, and is available for download now (Windows & Macintosh). This release fixes a nasty bug in PGP 5.5.x and 6.x regarding the ADK (Additional Decryption Key) feature. - The NAI security advisory discussion the ADK problems, and countermeasures: http://www.pgp.com/other/advisories/adk.asp - A brief introduction in German is also available from heise.de: http://www.heise.de/newsticker/data/jk-26.08.00-006/ - Updates for the commercial PGP products do not seem to be available yet http://www.pgpi.org/news/#20000825 Anyone with a Screwdriver Can Break In! - This article will discuss the second weakest layer of computer security, Physical Security. As we'll see, any attacker with physical access to a computer, a little ingenuity, and sufficient time can compromise the system http://securityportal.com/cover/coverstory20000828.html ******* What's New With SecurityPortal ******* Debian 2.2 I wanted to write a really positive article about Debian 2.2, which was just released a few weeks ago. Unfortunately, I can't. While Debian itself is a reasonably well-done Linux distribution, it has some major security issues. Read the full story at: http://securityportal.com/closet/closet20000830.html ******* New at SecurityPR.com, a Vendor Press Release Site ******** Foundstone Offers Hacker Investigation Classes - Foundstone Inc., the premier computer security training and consulting company, announced a new series of computer security classes, Ultimate Incident Response: Hands On. http://securityportal.com/pr/pr.20000830101927.html RSA Security Offers Industry's First e-Security Experience to Help Educate Customers on the Benefits of e-Security - RSA Security Inc (NASDAQ: RSAS), the most trusted name in e-security, announced the launch of its inaugural "e-Security Experience," a Webinar designed to deliver a high-level, online, interactive experience to educate e-business organizations on the key issues and decision-making criteria in the e-security space. http://www.rsasecurity.com/news/pr/000817.html The New Israeli Standard for Information Security Will Draw on Comsec e-Sure Methodology - The new Israeli standard will base upon the leading British Standard BS 7799; Implementation will draw on Comsec e-Sure(tm), security standard for e-commerce. http://securityportal.com/pr/pr.20000828023811.html Enter your own Press Releases directly at SecurityPR.com. http://securitypr.com ******************************************* You may leave the list at any time by sending an email to [EMAIL PROTECTED] with the text "SIGNOFF SECURITYPORTAL-L" in the body of the email. We will miss you! Tell us how we're doing. Send any other questions or comments to [EMAIL PROTECTED] Micheal McCrea and Tony Chapman SecurityPortal -- The Focal Point for Security on the Net [EMAIL PROTECTED], [EMAIL PROTECTED] -------------------------------------------------------------------------- Utk berhenti langganan, kirim email ke [EMAIL PROTECTED] Informasi arsip di http://www.linux.or.id/milis.php3 Pengelola dapat dihubungi lewat [EMAIL PROTECTED]
