· Seeing the lives of other people benefiting from your own life
· Seeing how all of life is purposeful, not just your own
· Feeling the presence of God more often
· Experiencing the wonder of life
· Feeling joy
· Finding that you are “at the right
place at the right time” to connect with
· Wanting to do more than merely the required minimum effort
· Experiencing the energy you need to
get the job done, sometimes an energy that
Just remove the last file name so that you get the main directory.
....and if this would not work, just remove this bit:
....and you will get the main directory which will direct you to
the correct page.
> INTERVIEW - PROTECT YOUR SITE FROM HACKERS
> by Dr. Bill Hancock, Chief Technology Officer and Chief Consultant
> of Network-1 Security Solutions, Inc.
> We all grew up trusting the New York Times. So you would think
> that you could trust their online version, www.nytimes.com. But
> think again. On September 13th of this year if you had visited their
> site you would have been confronted with pornographic images instead of
> the traditional daily news. And before you say that couldn't happen to
> me, remember even Yahoo! has been hacked. These hackers didn't learn to
> do this on the Web giants; they started on sites like yours. This week
> we interviewed Dr. Bill Hancock, a renowned computer networking and
> security specialist who has designed secure networks for Fortune 1000
> companies and foreign governments, and asked him how he thought Web site
> owners could better secure their sites.
> VISIT THE ONLINE VERSION AT: http://www.WebSiteJournal.com
> Editor: Should Web site owners be concerned about
> security for their sites?
> Hancock: Absolutely. The mere fact that a site is modified by
> a security breach can label a company as naive or stupid.
> Particularly, if it is an e-commerce site, a breach can deeply
> affect income. Security for a web site is important no matter
> how big or small a site is.
> Editor: Why are small business sites particularly
> appealing targets for hackers?
> Hancock: Small businesses are good practice sites for similar
> attacks on larger sites. Also, many small sites are not on law
> enforcement "radar" and cannot generate enough of a financial
> loss to make it worthwhile for law enforcement to go after
> hackers that have "wronged" them.
> Editor: What types of basic security can a Web site owner
> do to decrease the chance of their site being tampered with?
> Hancock: If you own the site, consider using hard-to-breach
> hardware. Use CD-ROM readers for your data and try to keep
> everything on CD-ROM as much as possible and practical. It's
> pretty hard to hack a read-only device. Simplify the hardware
> configuration so there are not many ways to nail the box.
> Simplify operating system set-up to keep options that can be
> breached to a minimum. Minimize user accounts on the system to
> keep stray accounts from becoming holes to breach the system.
> Editor: What security strategies should Web site owners
> consider for their sites?
> Hancock: Here are my top recommendations to improve security
> on Web sites:
> 1. If you have your own server, put your site's pages on CD-ROM.
> It's really hard to hack a CD-ROM. CD-ROM readers are CHEAP,
> about $20, and CD burners are about $400.00. Blanks are about
> $2.00 each, so it is very cheap insurance.
> 2. Don't put Web content in a site's administrative
> account, this folder is the operating center to the network.
> This is the first place hackers will look to see what they can
> 3. Password protect your access control lists. Once
> broken into anyone can add themselves and access your system.
> 4. Check your CGI scripts. Be careful how you set them
> up and what they can do, bad scripting is notorious for
> security breaches.
> in commerce sites because it is an easy language to design in.
> However, it is also easy for hackers to penetrate. Make sure
> you are taking precautions when using features created with
> 6. Use Secure Socket Layer (SSL) whenever possible. SSL
> prevents hackers from observing the commerce transactions and
> passwords that your visitors use to purchase your products or
> access your site. Many site owners opt not to use this feature
> because it slows the server; don't turn it off on your site!
> 7. Use a firewall and a router. By using firewall
> software you can block access to your server and database
> without a password and ID. Routers are hardware that receives
> communication and determines where on your network to send it.
> If properly programmed a router can spot and deflect
> potentially harmful activities.
> 8. If you are using an ISP or outsourcing company for
> your web site, ensure you understand their security methods,
> precautions, and technologies. Keep your ISPs contact list
> nearby in case you have questions or in the case of a breach.
> Preparation goes a long way to solve problems.
> About the Expert:
> Dr. Bill Hancock, Chief Technology Officer and Chief Consultant
> of Network-1 Security Solutions, Inc. (www.network-1.com), is a
> well-known computer and network consultant, designer and
> engineer. With 25 years of security experience, he has designed
> and re-engineered networks (over 4000) for many Fortune 1000
> companies as well as many international companies and
> governments. He is also the author of more than 23 books on
> computer networking and security and is currently the Editor in
> Chief of Computers and Security Magazine and is a U.S. network
> expert to the ISO.
> From: firstname.lastname@example.org
> Date sent: Tue, 8 Dec 1998 17:58:14
> Subject: Web Site Journal - Vol. 1, No. 13
... and a rather unsettling reply from an Internet Server owner, to a user...
Mon, 14 Dec
Thanks for your information, and concern. You
are quite right to be
Anyone connected to the Internet would be extremely
foolish to claim
As far as I am aware, the only way to make
sure your computer is really
The report you have enclosed is rather meaningless
and shallow. For
There are many new ways hackers are using to
compromise the security of
I am not sure what the answers to this kind
of activity are, other than
There is a ***** newsletter coming out on this
subject prior to
You are right to be concerned though, and *****
has a policy of not
Until the lawmakers and courts recognise that
the hacking community are
Our software suppliers, especially Microsoft,
need to recognise that
Then we may all be able to sleep easier knowing
our computers are our
Merry Christmas in spite of all of that.