Distributing the News: UUCP to UUNET Ued Revising B News Until 1984, When He Produced Version 2.10.1
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
SMTP (Simple Mail Transfer Protocol)
P1: JsY JWBS001A-60.tex WL041/Bidgoli WL041-Bidgoli.cls May 12, 2005 3:27 Char Count= 0 SMTP (Simple Mail Transfer Protocol) Vladimir V. Riabov, Rivier College Introduction 1 SMTP Security Issues 12 SMTP Fundamentals 1 SMTP Vulnerabilities 12 SMTP Model and Protocol 2 SMTP Server Buffer Overflow Vulnerability 15 User Agent 4 Mail Relaying SMTP Vulnerability 15 Sending e-Mail 4 Mail Relaying SMTP Vulnerability in Microsoft Mail Header Format 4 Windows 2000 15 Receiving e-Mail 4 Encapsulated SMTP Address Vulnerability 15 The SMTP Destination Address 4 Malformed Request Denial of Service 16 Delayed Delivery 4 Extended Verb Request Handling Flaw 16 Aliases 5 Reverse DNS Response Buffer Overflow 16 Mail Transfer Agent 5 Firewall SMTP Filtering Vulnerability 16 SMTP Mail Transaction Flow 5 Spoofing 16 SMTP Commands 6 Bounce Attack 16 Mail Service Types 6 Restricting Access to an Outgoing Mail SMTP Service Extensions 8 Server 17 SMTP Responses 8 Mail Encryption 17 SMTP Server 8 Bastille Hardening System 17 On-Demand Mail Relay 8 POP and IMAP Vulnerabilities 17 Multipurpose Internet Mail Extensions Standards, Organizations, and (MIME) 8 Associations 18 MIME-Version 10 Internet Assigned Numbers Authority 18 Content-Type 10 Internet Engineering Task Force Working Content-Transfer-Encoding 10 Groups 18 Content-Id 11 Internet Mail Consortium 18 Content-Description 11 Mitre Corporation 18 Security Scheme for MIME 11 Conclusion 18 Mail Transmission Types 11 Glossary 18 Mail Access Modes 11 Cross References 19 Mail Access Protocols 11 References 19 POP3 11 Further Reading 22 IMAP4 12 INTRODUCTION and IMAP4), SMTP software, vulnerability and security issues, standards, associations, and organizations. -
CSE 127 Computer Security Stefan Savage, Spring 2018, Lecture 16
CSE 127 Computer Security Stefan Savage, Spring 2018, Lecture 16 Network Security I Objectives ▪ Understand – Architecture of the Internet protocol suite (TCP/IP) ▪ CSE123 in 20mins – Common weaknesses in networking protocols – Available mitigations and their limitations Review: Internet Protocol Suite ▪ Application Layer – Examples: SMTP, FTP, SSH, HTTP, etc. ▪ Transport Layer: Port-addressed host-to-host communications (on LAN or WAN). – User Datagram Protocol (UDP): single packet transmission with no reliability or ordering mechanisms. – Transmission Control Protocol (TCP): connection establishment, reliable transmission, and flow-control. ▪ Internet Layer (IP): Fragmentation, reassembly, and end-to-end (across network boundaries) routing of data packets. – Provides a uniform interface that hides the underlying network topology. ▪ Link Layer: Transmission of data frames within a local network (without intervening routers). – Example: Ethernet ▪ Physical Layer: Transmission of raw bits (rather than logical data packets) over a physical data link connecting network nodes. – Example: 100BASE-T – [Technically not part of the Internet Protocol Model, but is still there] Review: Internet Protocol Suite https://en.wikipedia.org/wiki/Internet_protocol_suite Review: Internet Protocol Suite https://en.wikipedia.org/wiki/Internet_protocol_suite TCP/IP Protocol Stack by Example ▪ ROUGHLY, what happens when I click on a URL while UCSD’s network? My computer www.yahoo.com Application Layer (HTTP) ▪ Turn click into HTTP GET request GET http://www.yahoo.com/r/mp HTTP/1.1 Host: www.yahoo.com Connection:keep-alive … Application Layer (Name Resolution) ▪ Where is www.yahoo.com? What’s the address for www.yahoo.com My computer Oh, you can find it at 64.58.76.177 132.239.9.64 Local DNS server 132.239.51.18 Transport Layer (TCP) ▪ Break message into packets (TCP segments) ▪ Should be delivered reliably & in-order GET http://www.yahoo.com/r/mp HTTP/1.1 Host: www.yahoo.com Connection:keep-alive … 3 yahoo.c 2 p://www. -
Functional HCL Notes Email Archiving Solution
AM ™ ArchiveMail DATASHEET Functional HCL Notes™ email archiving solution Key In Detail on Introducti Characteristics Benefits For the Users: Continuous growth in data volumes related to messaging and the practical limits imposed by Notes database architecture make email archiving systems essential. M Improved productivity due to automatic management of archive. COOPERTEAM’s Archive Mail™ is a functional archiving solution which responds to the M needs of administrators by allowing them to manage archiving policies efficiently and Access to archived documents from automatically, whilst still guaranteeing their users access to their documents and the Notes client, iNotes and mobile attached files. devices. Archive Mail™ automates the archiving of messages, calendar entries, tasks and contacts M Multi-criteria searching available for to one archive per year, hosted on either dedicated or shared function servers. Archiving both server & workstation. policies can be based on document ageing criteria. In addition, the archive process can be triggered when the mail database exceeds its For the Administrators: threshold (quota), or manually by users after selecting documents to be archived. M Optimization of the Domino Archive Mail™ allows administrators to manage multiple archive databases and easily infrastructure. implement ILM (Information Lifecycle Management) policies, and to correctly align the M Align messaging storage costs, value storage costs of the archived documents with their value to the business. for the business and quota policies. M Once Archive Mail™ is implemented, documents that meet the configured ageing Automated and centralised parameters for archiving are transferred to an archive database at a frequency predeter- management of archiving mined by their profile administrator. -
Zimbra Tips & Tricks
TOP ZIMBRA 15 TIPS & TRICKS This guide brings you the top 15 Zimbra Tips & Tricks to help you save time while working in Zimbra. If you find these Tips & Tricks helpful, you may also like our tutorial demos: The top 15 Zimbra Tips & Tricks (based on clicks on Zimbra’s “Did You Know?” blog) are: Throughout this guide, look for pop-up boxes highlighting quick tips Email Tips and Tricks and facts. 1 Searching in Zimbra TIP: Skip ahead to any 2 Importing Into and Exporting From Zimbra section of the 15 Tips & 3 Changing Your Zimbra Preferences Tricks by clicking on the 4 Changing Your Zimbra Theme titles to the right. 5 Setting Zimbra Email and SMS (text) Reminders 6 Enabling Zimbra’s Mandatory Spellcheck 7 Sorting Email 8 Creating an Appointment with the Mini Calendar 9 Creating an Email Distribution List or Contact Group 10 Opening an Email in a Separate Window 11 Turning on Zimbra’s Activity Stream 12 Switching from Conversation View to Message View 13 Sharing Your Zimbra Calendar Outside Your Organization 14 Sharing in Zimbra 15 Enabling Zimbra Two-Factor Authentication 1 Searching in Zimbra There are many great and easy ways to search in Zimbra: • Quick keyword search • Complex search • Right-click search Quick Keyword Search You can do a quick search using keywords like from, to, in, etc. Click here to see all search keywords. How much time do you spend searching To search by keyword: for a specific email? keyword: search word(s) Searches are easy and fast in Zimbra. Search Examples: your entire Zimbra • Find all email received from Mark (all email with “Mark” in the From account, including attachments, in seconds. -
Table of Contents
Table of Contents Preface .................................................................................................... xiii Part I: The Web Environment Chapter 1—Designing for a Variety of Browsers ...................... 3 Browsers ................................................................................................. 3 Design Strategies .................................................................................... 9 Writing Good HTML ............................................................................. 11 Knowing Your Audience ..................................................................... 12 Considering Your Site’s Purpose ......................................................... 13 Test! Test! Test! ..................................................................................... 13 Chapter 2—Designing for a Variety of Displays .................... 14 Dealing with Unknown Monitor Resolutions ..................................... 14 Fixed versus Flexible Web Page Design ............................................. 19 Accessibility .......................................................................................... 23 Alternative Displays .............................................................................. 26 Chapter 3—Web Design Principles for Print Designers ...................................................................... 28 Color on the Web ................................................................................. 28 Graphics on the Web .......................................................................... -
The History of Spam Timeline of Events and Notable Occurrences in the Advance of Spam
The History of Spam Timeline of events and notable occurrences in the advance of spam July 2014 The History of Spam The growth of unsolicited e-mail imposes increasing costs on networks and causes considerable aggravation on the part of e-mail recipients. The history of spam is one that is closely tied to the history and evolution of the Internet itself. 1971 RFC 733: Mail Specifications 1978 First email spam was sent out to users of ARPANET – it was an ad for a presentation by Digital Equipment Corporation (DEC) 1984 Domain Name System (DNS) introduced 1986 Eric Thomas develops first commercial mailing list program called LISTSERV 1988 First know email Chain letter sent 1988 “Spamming” starts as prank by participants in multi-user dungeon games by MUDers (Multi User Dungeon) to fill rivals accounts with unwanted electronic junk mail. 1990 ARPANET terminates 1993 First use of the term spam was for a post from USENET by Richard Depew to news.admin.policy, which was the result of a bug in a software program that caused 200 messages to go out to the news group. The term “spam” itself was thought to have come from the spam skit by Monty Python's Flying Circus. In the sketch, a restaurant serves all its food with lots of spam, and the waitress repeats the word several times in describing how much spam is in the items. When she does this, a group of Vikings in the corner start a song: "Spam, spam, spam, spam, spam, spam, spam, spam, lovely spam! Wonderful spam!" Until told to shut up. -
Guest Artist Agreement
Artists Agreement Unitarian Universalist Congregation of Phoenix 4027 E. Lincoln Drive, Paradise Valley, AZ 85253 Phone: 602-840-8400 Email: [email protected] The Sanctuary Art Team of the Unitarian Universalist Congregation of Phoenix (UUCP) welcomes you. We are pleased that you are participating in our art exhibit. The following guidelines and liability agreement should be helpful to you in preparing for installation of your artwork. 1) All works selected for exhibit will be displayed in the Sanctuary or Hall in spaces reserved for that purpose. 2) An art inventory should be completed before arrival and sent to the email above or as directed. It MUST be completed when the art is delivered to UUCP. Artists must provide the following information: Artist's Name, Title of Work, Medium, Dimensions, and Sale Price or NFS (See inventory form). 3) All work must be ready for hanging. Any work over 600 square inches requiring protective covering must be covered in Plexiglas (NOT glass). 4) All works must remain on display until the termination of the show unless previously arranged with the Sanctuary Art Team. At the close of the show, the lender/artist agrees to remove the pieces on exhibit or arrange for their removal. Any object remaining in the Sanctuary for 30 days following the scheduled close of the show will be handled at the discretion of the Sanctuary Art Team. 5) Each object displayed will be exhibited in such manner as the Sanctuary Art Team decides. 6) The Sanctuary Art Team reserves the right to select and/or reject works, bearing in mind that the Sanctuary is not a conventional gallery and the selected works must be appropriate for all congregational activities. -
Competing in Book Retailing
COMPETINGCOMPETING ININ CENTER FOR RESEARCH BOOK RETAILING: ON INFORMATION TECHNOLOGY AND THE CASE OF AMAZON.COM ORGANIZATIONS University of California, Irvine AUTHORS: 3200 Berkeley Place Aarti Shrikhande and Irvine, California 92697-4650 Vijay Gurbaxani and Graduate School of Management NOVEMBER 1999 Acknowledgement: This research has been supported by grants from the CISE/IIS/CSS Division of the U.S. National Science Foundation and the NSF Industry/University Cooperative Research Center (CISE/EEC) to the Center for Research on Information Technology and Organizations (CRITO) at the University of California, Irvine. Industry sponsors include: ATL Products, the Boeing Company, Bristol-Myers Squibb, Canon Information Systems, IBM, Nortel Networks, Rockwell International, Microsoft, Seagate Technology, Sun Microsystems, and Systems Management Specialists (SMS). The authors would like to thank Asish Ramchandran for his assistance on this project. TABLE OF CONTENTS INTRODUCTION....................................................................................................................................................................1 INDUSTRY ENVIRONMENT AND COMPETITION .......................................................................................................2 FIRM LEVEL ANALYSIS ......................................................................................................................................................9 BUSINESS MODEL .........................................................................................................................................................9 -
Internet Pricing and the History of Communications
Internet pricing and the history of communications Andrew Odlyzko AT&T Labs - Research [email protected] http://www.research.att.com/ amo Revised version, February 8, 2001. Abstract There are repeating patterns in the histories of communication technologies, including ordinary mail, the telegraph, the telephone, and the Internet. In particular, the typical story for each service is that quality rises, prices decrease, and usage increases to produce increased total revenues. At the same time, prices become simpler. The historical analogies of this paper suggest that the Internet will evolve in a similar way, towards simplicity. The schemes that aim to provide differentiated service levels and sophisticated pricing schemes are unlikely to be widely adopted. Price and quality differentiation are valuable tools that can provide higher revenues and increase utilization efficiency of a network, and thus in general increase social welfare. Such measures, most noticeable in airline pricing, are spreading to many services and products, especially high-tech ones. However, it appears that as communication services become less expensive and are used more fre- quently, those arguments lose out to customers’ desire for simplicity. In practice, user preferences express themselves through willingness to pay more for simple pricing plans. In addition, there is a strong “threshhold” effect to usage-sensitive billing. Even tiny charges based on utilization decrease usage substantially. In a rapidly growing market, it is in the service providers’ interest to encourage usage, and that argues for simple, preferably flat rate, pricing. Histori- cal evidence suggests that when service costs decrease, such arguments prevail over the need to operate a network at high utilization levels and to extract the highest possible revenues. -
Research Articles in the American Economic Review, the RAND Journal Ofeconomics, The
3 I. Introduction And Qualifications 1. My name is Nicholas S. Economides. I am a Professor ofEconomics at the Stern School ofBusiness ofNew York University, located at 44 West 4th Street New York, NY 10012. 2. I received a B.Sc. degree in Mathematical Economics (first class honors) from the London School ofEconomics in 1976, a Masters degree in Economics from the University of California at Berkeley in 1979 and a Ph.D. degree in Economics from Berkeley in 1981, specializing in Industrial Organization. 3. From 1981 to 1988, I was assistant and then associate professor ofeconomics at Columbia University. From 1988 to 1990, I was associate professor ofeconomics at Stanford University. I have taught at the Stern School ofBusiness since 1990. During the academic year 1996-1997, I was visiting professor at Stanford University. 4. I have published more than seventy research papers in the areas ofindustrial organization, microeconomics, network economics, antitrust, finance, and telecommunications policy, and I have given numerous seminar presentations at academic and government institutions and conferences. I have published academic research articles in the American Economic Review, the RAND Journal ofEconomics, the International Journal ofIndustrial Organization, the International Economic Review, the Journal ofEconomic Theory, and the Journal ofIndustrial Economics, among others. I am currently editor ofthe International Journal ofIndustrial Organization and ofNetnomics. I have served as advisor and consultant to major telecommunications companies, a number of 4 the Federal Reserve Banks, the Bank ofGreece, and major Financial Exchanges. I teach graduate (MBA and Ph.D.) courses in antitrust, industrial organization, microeconomics, and telecommunications. A copy ofmy curriculum vitae is attached as Attachment 1. -
INSIDE MICROSOFT (Part 2) 2/7/04 2:30 PM
07/15/96 INSIDE MICROSOFT (Part 2) 2/7/04 2:30 PM INSIDE MICROSOFT (Part 2) The untold story of how the Internet forced Bill Gates to reverse course (Continued from Part 1) BABY STEPS. In one breakout group, Allard tangled with Russell Siegelman, who was heading Marvel, the code name for what's now the Microsoft Network online service. Allard argued that instead of being proprietary, Marvel should be based on Web standards. Siegelman held his ground--and won. It was a decision that would later cost millions to reverse. Still, Net progress was made: TCP/IP would be integrated into Win95 and Windows NT, the version of Windows that runs network-server computers. The sales team was told to use the Web to dispense marketing information. The applications group agreed to give Word, the word-processing program, the ability to create Web pages. Next, Gates jumped deeper into the process by devoting much of his April Think Week--a semiannual retreat--to the Internet. His Apr. 16 memo, ``Internet Strategy and Technical Goals,'' contained the first signs of a growing corporate commitment. ``We want to and will invest resources to be a leader in Internet support,'' wrote Gates. It was a first step, albeit a measured one. ``I don't think he knew how much to bet yet,'' says Allard. But board member David F. Marquardt did: He recalls that he was ``amazed'' that Microsoft was putting so little into the Net. ``They weren't in Silicon Valley. When you're here, you feel it all around you,'' says Marquardt, a general partner at Technology Venture Investors in Menlo Park, Calif. -
Monthly Worship Themes What Does It Mean to Be a People Of
2 Begin Your Journey Here Sunday Worship Monthly Worship Themes What does it mean to be a people of... Welcome to UUCP! This is a religious community September Covenant Welcoming all as we Rev. Susan October Freedom Share our Journeys Frederick-Gray Grow in Spirit November Gratitude Together work to Advance Justice December Tradition The best way to see, feel and get to know this community January Truth is through Sunday morning services. Each month we February Love explore a theme in depth. Our themes challenge us to grow in meaning, build connections across diversities and March Hope make our world a better place. April Service May Peace Service times: May – September 13: 10:30 AM June Strength September 20 – April 17: 9:30 AM and 11:15 AM July/August Spirituality Starting Point Community Nights Are you new to UUCP? Do you have questions Break Bread and Make Friends at UUCP. Community about UUCP and Unitarian Universalism? Nights are a time of fellowship and community building Starting Point is an informal program for all ages. We provide the main dish with a vegetarian especially for you! Meet a representative from option and one side. Just bring your appetite, enthusi- the Membership Committee by the Starting asm, and a side dish or dessert to share if able. You are Point sign in the front lobby any second Sunday of the also welcome to bring a sack supper if you prefer. month. You don’t have to sign up. Just show up! Chalice Kids is a program for children that begins right In twenty to thirty minutes, we will answer questions and after the meal at 6:30 PM.