My guess is the Checkpoint CEO has a "working relationship" with a
reporter. Checkpoint is implying that they (and FW-1) could have
stopped the attack had they set them up -- effective advertising to
the technically inept that make security decisions. I wonder how many
managers read this and calls the network grunts saying "we'd better
give Checkpoint a call"....
Besides, anyone can see they must have had port 25 wide open and
hackers found a host (and probably a buffer) they could overrun.
My opinions are not my employer's
______________________________ Reply Separator _________________________________
Subject: RE: Anyone have more info about this breakin?
Author: kahar @
se at internet
Date: 2/23/96 8:33 AM
Since a president and chief executive of CheckPoint Software
Technologies Inc. was quoted, does that mean Los Alamos's
firewall was a FW-1 ???
> Among other things, the hackers' robot exploited a known
> security hole in a Unix e-mail program. Most people program
> their firewalls to accept e-mail from the outside, which would
> allow such an attack. One way to prevent that is to set up
> another firewall that screens mail sent from the server
> computer to individuals' desktops, said Deborah Triant,
> president and chief executive of CheckPoint Software
> Technologies Inc., Redwood City, Calif.
/ Katarina Harcus