Miscellaneous Non-Astrological Items
 
 
Sign Posts That you are Living Your Mission in Life

· Seeing the lives of other people benefiting from your own life 

· Seeing how all of life is purposeful, not just your own 

· Feeling the presence of God more often 

· Experiencing the wonder of life 

· Feeling joy 

· Finding that you are “at the right place at the right time” to connect with 
needed resources 

· Wanting to do more than merely the required minimum effort 

· Experiencing the energy you need to get the job done, sometimes an energy that 
seems to come from beyond yourself 

 
 
 
 
When surfing the Net and  a URL 
(web site address) does not work...

Just remove the last file name so that you get the main directory. 
Example: 
This is a page from one of my two sites: 
http://members.tripod.com/~junojuno2/links2.htm 

....and if this would not work, just remove this bit: 
        links2.htm 

....and you will get the main directory which will direct you to the correct page. 
  

 
 
 
Hackers and Computer Security
You may want to contact your local internet server about thiese matters.
 
> INTERVIEW - PROTECT YOUR SITE FROM HACKERS 
> by Dr. Bill Hancock, Chief Technology Officer and Chief Consultant 
> of Network-1 Security Solutions, Inc. 
 
> We all grew up trusting the New York Times. So you would think 
> that you could trust their online version, www.nytimes.com.  But 
> think again. On September 13th of this year if you had visited their 
> site you would have been confronted with pornographic images instead of 
> the traditional daily news. And before you say that couldn't happen to 
> me, remember even Yahoo! has been hacked. These hackers didn't learn to 
> do this on the Web giants; they started on sites like yours.  This week 
> we interviewed Dr. Bill Hancock, a renowned computer networking and 
> security specialist who has designed secure networks for Fortune 1000 
> companies and foreign governments, and asked him how he thought Web site 
> owners could better secure their sites. 
 
> VISIT THE ONLINE VERSION AT: http://www.WebSiteJournal.com 
 
> Editor:       Should Web site owners be concerned about 
> security for their sites? 
 
> Hancock:   Absolutely. The mere fact that a site is modified by 
> a security breach can label a company as naive or stupid. 
> Particularly, if it is an e-commerce site, a breach can deeply 
> affect income. Security for a web site is important no matter 
> how big or small a site is. 
 
> Editor:      Why are small business sites particularly 
> appealing targets for hackers? 
 
> Hancock:   Small businesses are good practice sites for similar 
> attacks on larger sites. Also, many small sites are not on law 
> enforcement "radar" and cannot generate enough of a financial 
> loss to make it worthwhile for law enforcement to go after 
> hackers that have "wronged" them. 
 
> Editor:      What types of basic security can a Web site owner 
> do to decrease the chance of their site being tampered with? 
 
> Hancock:   If you own the site, consider using hard-to-breach 
> hardware. Use CD-ROM readers for your data and try to keep 
> everything on CD-ROM as much as possible and practical. It's 
> pretty hard to hack a read-only device. Simplify the hardware 
> configuration so there are not many ways to nail the box. 
> Simplify operating system set-up to keep options that can be 
> breached to a minimum. Minimize user accounts on the system to 
> keep stray accounts from becoming holes to breach the system. 
 
> Editor:       What security strategies should Web site owners 
> consider for their sites? 
 
> Hancock:    Here are my top recommendations to improve security 
> on Web sites: 
 
> 1. If you have your own server, put your site's pages on CD-ROM. 
> It's really hard to hack a CD-ROM. CD-ROM readers are CHEAP, 
> about $20, and CD burners are about $400.00. Blanks are about 
> $2.00 each, so it is very cheap insurance. 
 
>        2. Don't put Web content in a site's administrative 
> account, this folder is the operating center to the network. 
> This is the first place hackers will look to see what they can 
> access. 
 
>        3. Password protect your access control lists. Once 
> broken into anyone can add themselves and access your system. 
 
>        4. Check your CGI scripts. Be careful how you set them 
> up and what they can do, bad scripting is notorious for 
> security breaches. 
 
>        5. Be careful when using JavaScript. Java is widely used 
> in commerce sites because it is an easy language to design in. 
> However, it is also easy for hackers to penetrate. Make sure 
> you are taking precautions when using features created with 
> JavaScript. 
 
>        6. Use Secure Socket Layer (SSL) whenever possible. SSL 
> prevents hackers from observing the commerce transactions and 
> passwords that your visitors use to purchase your products or 
> access your site. Many site owners opt not to use this feature 
> because it slows the server; don't turn it off on your site! 
 
>         7. Use a firewall and a router. By using firewall 
> software you can block access to your server and database 
> without a password and ID. Routers are hardware that receives 
> communication and determines where on your network to send it. 
> If properly programmed a router can spot and deflect 
> potentially harmful activities. 
 
>         8. If you are using an ISP or outsourcing company for 
> your web site, ensure you understand their security methods, 
> precautions, and technologies. Keep your ISPs contact list 
> nearby in case you have questions or in the case of a breach. 
> Preparation goes a long way to solve problems. 
 
> About the Expert: 
 
> Dr. Bill Hancock, Chief Technology Officer and Chief Consultant 
> of Network-1 Security Solutions, Inc. (www.network-1.com), is a 
> well-known computer and network consultant, designer and 
> engineer. With 25 years of security experience, he has designed 
> and re-engineered networks (over 4000) for many Fortune 1000 
> companies as well as many international companies and 
> governments. He is also the author of more than 23 books on 
> computer networking and security and is currently the Editor in 
> Chief of Computers and Security Magazine and is a U.S. network 
> expert to the ISO. 
 
> From:                   news@register-it.com 
> Date sent:              Tue, 8 Dec 1998 17:58:14 
> Subject:                Web Site Journal - Vol. 1, No. 13 

 
> Dear !Register-It! and Web Site Garage Customer, 
 
> The Web is the ultimate communication tool. Not only does it allow 
> you to post whatever you like, but also it allows people world to 
> see what you have posted. We have to remember that maintaining 
> a Web site goes beyond just getting new visitors and keeping the 
> ones we have; it also includes making sure that our sites are 
> secure.  Online security is a crucial concern for many and should 
> also be for us as Web site owners. So this week we brought in a 
> security expert to teach us how to protect our sites from being the next 
> target. 
 
> -The Editor, Web Site Journal 
> editor@websitejournal.com 
> http://www.WebSiteJournal.com 
 



... and a rather unsettling reply from an Internet Server owner, to a user... 

Date sent:       Mon, 14 Dec  
 

Thanks for your information, and concern. You are quite right to be 
concerned. Hacking is becoming a participative sport, and the recent 
successful intrusions in +++++ and ++++ certainly prove the trend is 
indeed global.  

Anyone connected to the Internet would be extremely foolish to claim 
that they have unbeatable security. NASA, the US Defence, the FBI, many 
major international banks, and even the Spice Girls have all been hacked, 
and I dare say that we would not survive a concerted attack either.  

As far as I am aware, the only way to make sure your computer is really 
safe is to secure it in a lead lined, steel room, with armed guards, and 
never plug it in or turn it on. The moment a computer is networked for 
access, it is open to the potential of having its security compromised. 

The report you have enclosed is rather meaningless and shallow. For 
example, what is the purpose of using CD's for web sites ? It is only the 
final throws of the hack that involves changing web site content. The fact 
that all ISP user names, passwords and credit card numbers may have been 
stolen in the process (or security in any way has been compromised) must 
rate of far greater concern. Once security has been compromised, the 
entire network must be taken back to absolute basics, reformatting of all 
hard drives and rebuilding of all data from scratch. 

There are many new ways hackers are using to compromise the security of 
Internet connected machines, including some variants of a trojan horse 
known as "Back Orifice" These charming pieces of code can be transferred 
via any .exe file, and in other ways, and infect Windows 95, Windows 98 
and Windows NT machines. These trojans does not usually appear to do 
anything to the users machine (unlike viruses -or is that virii ?- which 
tend to make their presence rather obvious) but they create an immediate 
and automatic hole through which access to the users computer can be 
gained. From there, a back door entrance can be gained to the ***** network 
(the ***** network does not use windows in any form). So any ***** user 
infected by such a trojan could be putting the entire network at risk. 

I am not sure what the answers to this kind of activity are, other than 
practicing safe computing. It is not easy to convince new computer users 
of the needs to be safe, just as the spread of AIDS etc is the result of 
people not being convinced of the needs to practice safe sex.  

There is a ***** newsletter coming out on this subject prior to 
Christmas. 

You are right to be concerned though, and ***** has a policy of not 
discussing what security it has in place (as that in itself would be a 
breach of security). We are sure that if determined and experienced 
hackers wished to target our network, they would eventually be able to 
find their way in. I don't believe there is a single network in the world 
that has remained utterly inviolate from concerted attempts. 

Until the lawmakers and courts recognise that the hacking community are 
just common thugs, who use computers instead of crowbars to gain illegal 
entry, and until society stops regarding these people as some kind of 
heroes, and recognise them as no better than house breakers or 
shoplifters, and until we have laws that can actually place the convicted 
hackers behind bars, we can only be seen to be encouraging this type of 
behaviour. 

Our software suppliers, especially Microsoft, need to recognise that 
their security systems are woefully inadequate, and create software with 
meaningful security coding. 

Then we may all be able to sleep easier knowing our computers are our 
private property. 

Merry Christmas in spite of all of that. 
 

 
Subway reading enjoyment !
   
"I just printed thirteen pages from your (still) very nice and generous website
 and will print out your posts for my subway reading enjoyment today!"
- by a visitor to this web site  :-))
   
 
 
 
  Midpoints 101  Main Index  
  Uranian Astrology  Main Index   
  Email Steve - creator of these sites