New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 22)
· Marcia's (CO8)
· Bill G's (CO10)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Search (Topics)
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 852
Comments: 19
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image hole: Editorials: Fort Knox vs. Monkey with a Gun image
Security Hole
Anonymous writes "Is too much security ever enough?Until recently I would have sided on the response of no, but then something happened to make me reconsider.I run a small network.It has several users, all who use different branches of the network for extremely varied reasons.The network contains everything from MMUD games to personal credit accounts.As such, while some security is needed very little by some of the users, a great deal is needed by others.To that end, and that of the work I do, I place my system into the category of Fort Knox;everyone knows about it, but what goes on inside is a mystery to most.Analogy aside, what I have is basically a system thats reside behind 6 levels of firewall, a DMZ, a primary network, sub-networks, and a gateway.

Each terminal has a separate firewall, and each runs portblockers, sandboxes, three type of anti-viral, anti-trojan, anti-spyware.Logs are kept of everything.The network at every point has various means of anti-intrusion.Heavy levels of encryption are used.It is a fortress by today's computer standards.It ensures the best protection I can afford my users, while at the same time remains functional and useful.Now, everyone/anyone, having permission to use my network, also knows, various booby-traps exist within the system.Only senior personnel have knowledge of these devices.Only I, as the owner, have complete knowledge of all the security.I have been proud to say, that in over 3 years, my system has remained virtually unscathed.Until this week.Was is a massive Denial of Service attack?Was it a new trojan or virus?Was it harmful phreakers or crackers?Nope.In the end, it was a disgruntled gamer, who after dying off a half a dozen times lost his temper, and started beating on the keyboard.Call it fate, a one in a million chance, or just dumb luck...they managed to hit just the right combination of keys to initiate a self destruct protocol script that can secretly be triggered from any terminal.It is not a simple combination, and must be done in the proper order...a 10 second abort exists...just enough time to decide, was it a mistake, or short enough to fight off any invasion long enough to carry out the process.To the unexpecting, it is also just enough time to panic, run around screaming (as I am told), and allow the process to continue before a phone call could be placed to me.That process... eliminate all data on various harddrives containing confidential information by tripping a relay tied to an uninteruptable power supply, which in turn charges a television degaussing coil wrapped around the selected drives.I had once considered taking even more extreme measures, but weighed safety over destruction.In light of recent events, I think it a wise choice.So, where does that leave me and my network?With 3 days of down time, 26 Gb of data lost, and a friend who feels bad because he thinks he only crashed a game.I am also reconsidering my security.The moral of the story, I leave to you."
Posted on Sunday, 14 July 2002 @ 10:57:55 EDT by Paul
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Linux Games
· HotScripts
· W3 Consortium
· More about Security Hole
· News by Paul


Most read story about Security Hole:
Windows Media Player, Spyware and Trojan

image
Article Rating
Average Score: 4.71
Votes: 7


Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 7 comments | _SEARCHDIS
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register

Re: Fort Knox vs. Monkey with a Gun (Score: 1)
by (paul[at]computercops.biz)  on Sunday, 14 July 2002 @ 11:12:54 EDT
(User Info | Send a Message | _JOURNAL) http://computercops.biz
Wow.. that is a most impressive and ultra-secure configuration you have adapated. What I'm curious with, is the history you have lived through which brought you to this level of caution?