[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Internet security (a bit to feed your security paranoia ...)



PureBytes Links

Trading Reference Links

<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content="text/html; charset=koi8-r" http-equiv=Content-Type>
<META content="MSHTML 5.00.2919.6307" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT face=Arial size=2><STRONG>Vitaly, my firm's MIS consultants tell us 
that the leading edge antivirus outfit is AVP Central Command.&nbsp; Try them at 
www.avp.com or <A 
href="http://www.avp.ch";>http://www.avp.ch</A> the latter site is their Swiss 
site and I have found that it is more responsive [less traffic, because of time 
difference maybe].&nbsp; Their eval version is also the release version.
<DIV>&nbsp;</DIV>
<DIV><FONT face=Arial 
size=2><STRONG>al</STRONG></FONT></DIV></STRONG></FONT></DIV>
<BLOCKQUOTE 
style="BORDER-LEFT: #000000 2px solid; MARGIN-LEFT: 5px; MARGIN-RIGHT: 0px; PADDING-LEFT: 5px; PADDING-RIGHT: 0px">
  <DIV style="FONT: 10pt arial">----- Original Message ----- </DIV>
  <DIV 
  style="BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: black"><B>From:</B> 
  <A href="mailto:vitaly@xxxxxxxxxxxxx"; title=vitaly@xxxxxxxxxxxxx>Vitaly 
  Larichev</A> </DIV>
  <DIV style="FONT: 10pt arial"><B>To:</B> <A 
  href="mailto:metastock@xxxxxxxxxxxxx"; 
  title=metastock@xxxxxxxxxxxxx>metastock@xxxxxxxxxxxxx</A> </DIV>
  <DIV style="FONT: 10pt arial"><B>Sent:</B> Wednesday, November 24, 1999 10:21 
  PM</DIV>
  <DIV style="FONT: 10pt arial"><B>Subject:</B> Re: Internet security (a bit to 
  feed your security paranoia ...)</DIV>
  <DIV><BR></DIV>Glen,<BR><BR>Thanks! I'll check out the sites you gave. To be 
  honest, so far I've been<BR>procrastinating on a really good 
  virus-Tojan-worm-... (what else?) protection.<BR>For weekly checks I use Trend 
  Micro HouseCall, i.e. doing it through the Web<BR>(it's on <A 
  href="http://housecall.antivirus.com";>http://housecall.antivirus.com</A>&nbsp; 
  if somebody interested). It caught a<BR>couple weeks ago a dormant Trojan on 
  my HD. So,&nbsp; no round-the-clock sentinel<BR>yet. Not sure about a 
  firewall, since mine is a single machine, File/Printer<BR>Sharing is off , how 
  much more protection does one need then? O, certainly,<BR>it's not to doubt 
  sense of a firewall, but the question reflects rather my <BR>inner struggle I 
  know I am losing trying to escape an obvious need to do<BR>something more on 
  this virus-shmirus stuff &lt;g&gt;.<BR><BR>Cheers, Vitaly<BR><BR><BR>Glen 
  Wallace wrote:<BR><BR>&gt; Vitaly:<BR>&gt;<BR>&gt; I'm not one to say "We told 
  you so," but ....<BR>&gt;<BR>&gt; You probably identified and eliminated one 
  of the Windows "exploits," but<BR>&gt; incidentally the NetBIOS ports 
  (including 139) are some of the favorite<BR>&gt; ports for hackers and 
  script-kiddies.&nbsp; You should probably do a virus scan<BR>&gt; (I use 
  Norton AntiVirus) and a trojan scan (I like The Cleaner from<BR>&gt; <A 
  href="http://www.moosoft.com";>www.moosoft.com</A> ) to ensure you have no 
  lingering, malicious applications.<BR>&gt;<BR>&gt; You can (and should 
  periodically) use the DOS command 'netstat -an' from an<BR>&gt; MS-DOS window 
  to see what ports are listening for a connection.&nbsp; For more<BR>&gt; 
  information on this, see <A 
  href="http://www.commodon.com/threat/frame.htm";>http://www.commodon.com/threat/frame.htm</A><BR>&gt;<BR>&gt; 
  Also, consider a firewall (yes, Ken and Walter, I am climbing onto my<BR>&gt; 
  soapbox again) for a higher level of protection.&nbsp; As a temporary 
  measure,<BR>&gt; check out a freeware application named NukeNabber to at least 
  monitor the<BR>&gt; more vulnerable ports. Download it from a reliable site 
  like www.tucows.com<BR>&gt; because there 
  are hacked versions out there.<BR>&gt;<BR>&gt; Some other free security 
  scanning sites:<BR>&gt; <A 
  href="http://www.hackerwhacker.com/";>http://www.hackerwhacker.com/</A><BR>&gt; 
  http://www.e-softinc.com/<BR>&gt; <A 
  href="http://www.secure-me.net/";>http://www.secure-me.net/</A><BR>&gt;<BR>&gt; 
  Regards.<BR>&gt;<BR>&gt; ----- Original Message -----<BR>&gt; From: Vitaly 
  Larichev &lt;<A 
  href="mailto:vitaly@xxxxxxxxxxxxx";>vitaly@xxxxxxxxxxxxx</A>&gt;<BR>&gt; To: 
  &lt;<A 
  href="mailto:metastock@xxxxxxxxxxxxx";>metastock@xxxxxxxxxxxxx</A>&gt;<BR>&gt; 
  Sent: November 24, 1999 14:03<BR>&gt; Subject: Internet security (a bit to 
  feed your security paranoia ...)<BR>&gt;<BR>&gt; &gt; Hello,<BR>&gt; 
  &gt;<BR>&gt; &gt; In the current (Dec.) issue of PC World there is a column 
  titled "Stop<BR>&gt; Hackers Before They Attack"<BR>&gt; &gt; (p.51) . It 
  mentions a recently launched site that checks your PC<BR>&gt; "shields" and 
  scans ports (go to<BR>&gt; &gt; <A 
  href="http://grc.com/default.htm";>http://grc.com/default.htm</A> and click on 
  "Shields Up" banner) regarding<BR>&gt; their vulnerability. Port<BR>&gt; &gt; 
  #139 on my machine turned out&nbsp; wide open to something horrible; 
  my<BR>&gt; ignorance on the subject<BR>&gt; &gt; doesn't allow me be more 
  specific describing the horror &lt;g&gt;). Anyhow, I<BR>&gt; used a free 
  utility from<BR>&gt; &gt; the site to close that bloody port #139.<BR>&gt; 
  &gt; The site provides also quite a bit to learn about these things I've 
  never<BR>&gt; wanted to know of,<BR>&gt; &gt; frankly.<BR>&gt; &gt;<BR>&gt; 
  &gt; Surf safe. Happy Thanksgiving.<BR>&gt; &gt;<BR>&gt; &gt; 
Vitaly<BR><BR></BLOCKQUOTE></BODY></HTML>
</x-html>From ???@??? Thu Nov 25 17:05:28 1999
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
	by purebytes.com (8.8.7/8.8.7) with ESMTP id IAA04154
	for <neal@xxxxxxxxxxxxx>; Thu, 25 Nov 1999 08:43:56 -0800
Received: (from majordom@xxxxxxxxx)
	by listserv.equis.com (8.8.7/8.8.7) id HAA06031
	for metastock-outgoing; Thu, 25 Nov 1999 07:43:49 -0700
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
	by listserv.equis.com (8.8.7/8.8.7) with ESMTP id HAA06028
	for <metastock@xxxxxxxxxxxxxxxxxx>; Thu, 25 Nov 1999 07:43:46 -0700
Received: from hme0.mailrouter02.sprint.ca (hme0.mailrouter02.sprint.ca [207.107.250.60])
	by freeze.metastock.com (8.8.5/8.8.5) with ESMTP id HAA23545
	for <metastock@xxxxxxxxxxxxx>; Thu, 25 Nov 1999 07:50:19 -0700 (MST)
Received: from default (spc-isp-mtl-58-4-253.sprint.ca [149.99.137.253])
	by hme0.mailrouter02.sprint.ca (8.8.8/8.8.8) with SMTP id JAA02261
	for <metastock@xxxxxxxxxxxxx>; Thu, 25 Nov 1999 09:35:26 -0500 (EST)
Message-ID: <001b01bf3752$49119c00$fd896395@xxxxxxx>
From: "Walter Lake" <wlake@xxxxxxxxx>
To: <metastock@xxxxxxxxxxxxx>
References: <000201bf36ce$3f8050c0$59a40bd4@xxx> <383CE270.EDDF2075@xxxxxxxxxxxxxxxxx>
Subject: Re: any free upgrde for Metastock 6.51Pro
Date: Thu, 25 Nov 1999 09:35:12 -0500
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2919.6600
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2919.6600
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:   

Hi Lars

How are you?

Everything I touch this week turns into a problem. There seem to be only
hard and harder problems to solve no more easy ones<G>

Best regards

Walter


----- Original Message -----
From: "Lars Andersson" <Lars.Andersson@xxxxxxxxxxxxxxxxx>
To: <metastock@xxxxxxxxxxxxx>
Sent: Thursday, November 25, 1999 2:17 AM
Subject: Re: any free upgrde for Metastock 6.51Pro


| Yes there are a free upgrade to version 6.52 you must check www.equis.com.
| Best regards.
| Lars Andersson
|
| "wsb3000@xxxxx" skrev:
|
| > i have Metastock 6.51 Pro  but as you know it has the y2k bug.
| > Is there a free upgrade to 6.52?
| >
| > thanx
| >
| > wsb
|