[Micronet] Fwd: Zero day exploit in Adobe Flash

classic Classic list List threaded Threaded
6 messages Options
Reply | Threaded
Open this post in threaded view
|

[Micronet] Fwd: Zero day exploit in Adobe Flash

Jake -F Harwood
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Just a heads up

- -------- Original Message --------
Subject: Zero day exploit in Adobe Flash
Date: Mon, 7 Jun 2010 14:16:33 -0700
From: Sue Bardakos <[hidden email]>

Hi Folks,

Heads up on a Zero Day exploit IBM X-Force is seeing in the wild.  This
affects Windows, Macintosh, Linux and Solaris operating systems.  There's
no patch however Adobe has a security bulletin and will hopefully update
soon.  We have published a Level 0 alert.  Please see the links below for
more details.

For IBM ISS customers with Network or Host IDS / IPS, here's the key
signature which provides zero day protection:
PDF_Javascript_Exploit  - released  Feb 13, 2008;  this signature is
turned on by default and will re-write /neuter packet (or high priority
alert in IDS mode)

http://www.iss.net/threats/369.html

http://xforce.iss.net/xforce/xfdb/59137

http://www.adobe.com/support/security/advisories/apsa10-01.html

http://blogs.adobe.com/psirt/



Sue Bardakos
IBM Internet Security Systems
Security Solutions Sales Specialist, CISSP
925-425-9489 (work)
925-918-0915 (cell)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJMDWIdAAoJECIJRNHUFoUu9oIIALm9gavYcpeMu8AX0G/2dvdX
sp4CYLDNacW8iCf2URDto8OpIKVRzkypfwGZOj3qmrCbDDLuTN+6vRZBqYLf5ewt
SjVmrzlrWCDtn0FL2Wa8lJpM6B+d5gZiT5P9DP6sg6Yw1viC6o7hr/F3z0/CxX/F
aHU5DBbOrTh2QgiyDNkn/nWBIdJ2iUvRSN6x+99COcl2p6u3w+xWWIysRqsgU8yO
WZL8g9op8xK/6cS6aYs66uEGw6qfN50ksusnxNe0f3OrePyhn/R0R3MAIjK/JqrK
EqXBjq8IGYhyneOH6BUSJ4Jr7/ftqKfaAOv5cCXhKy4jMlMWsNzHb1l8H/MSabY=
=AvyL
-----END PGP SIGNATURE-----

 
-------------------------------------------------------------------------
The following was automatically added to this message by the list server:

To learn more about Micronet, including how to subscribe to or unsubscribe from its mailing list and how to find out about upcoming meetings, please visit the Micronet Web site:

http://micronet.berkeley.edu

Messages you send to this mailing list are public and world-viewable, and the list's archives can be browsed and searched on the Internet.  This means these messages can be viewed by (among others) your bosses, prospective employers, and people who have known you in the past.
Reply | Threaded
Open this post in threaded view
|

Re: [Micronet] Fwd: Zero day exploit in Adobe Flash

Lucy Greco
Could someone explain this one in English I have been fighting the blue
screen all day and don't want to think of what to do about this thanks

Lucy Greco
Assistive Technology Specialist
University of California, Berkeley
http://www.attlc.berkeley.edu
(51) 643-7591

-----Original Message-----
From: [hidden email]
[mailto:[hidden email]] On Behalf Of Jake -F
Harwood
Sent: Monday, June 07, 2010 2:18 PM
To: [hidden email]
Subject: [Micronet] Fwd: Zero day exploit in Adobe Flash

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Just a heads up

- -------- Original Message --------
Subject: Zero day exploit in Adobe Flash
Date: Mon, 7 Jun 2010 14:16:33 -0700
From: Sue Bardakos <[hidden email]>

Hi Folks,

Heads up on a Zero Day exploit IBM X-Force is seeing in the wild.  This
affects Windows, Macintosh, Linux and Solaris operating systems.  There's
no patch however Adobe has a security bulletin and will hopefully update
soon.  We have published a Level 0 alert.  Please see the links below for
more details.

For IBM ISS customers with Network or Host IDS / IPS, here's the key
signature which provides zero day protection:
PDF_Javascript_Exploit  - released  Feb 13, 2008;  this signature is
turned on by default and will re-write /neuter packet (or high priority
alert in IDS mode)

http://www.iss.net/threats/369.html

http://xforce.iss.net/xforce/xfdb/59137

http://www.adobe.com/support/security/advisories/apsa10-01.html

http://blogs.adobe.com/psirt/



Sue Bardakos
IBM Internet Security Systems
Security Solutions Sales Specialist, CISSP
925-425-9489 (work)
925-918-0915 (cell)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJMDWIdAAoJECIJRNHUFoUu9oIIALm9gavYcpeMu8AX0G/2dvdX
sp4CYLDNacW8iCf2URDto8OpIKVRzkypfwGZOj3qmrCbDDLuTN+6vRZBqYLf5ewt
SjVmrzlrWCDtn0FL2Wa8lJpM6B+d5gZiT5P9DP6sg6Yw1viC6o7hr/F3z0/CxX/F
aHU5DBbOrTh2QgiyDNkn/nWBIdJ2iUvRSN6x+99COcl2p6u3w+xWWIysRqsgU8yO
WZL8g9op8xK/6cS6aYs66uEGw6qfN50ksusnxNe0f3OrePyhn/R0R3MAIjK/JqrK
EqXBjq8IGYhyneOH6BUSJ4Jr7/ftqKfaAOv5cCXhKy4jMlMWsNzHb1l8H/MSabY=
=AvyL
-----END PGP SIGNATURE-----

 
-------------------------------------------------------------------------
The following was automatically added to this message by the list server:

To learn more about Micronet, including how to subscribe to or unsubscribe
from its mailing list and how to find out about upcoming meetings, please
visit the Micronet Web site:

http://micronet.berkeley.edu

Messages you send to this mailing list are public and world-viewable, and
the list's archives can be browsed and searched on the Internet.  This means
these messages can be viewed by (among others) your bosses, prospective
employers, and people who have known you in the past.


 
-------------------------------------------------------------------------
The following was automatically added to this message by the list server:

To learn more about Micronet, including how to subscribe to or unsubscribe from its mailing list and how to find out about upcoming meetings, please visit the Micronet Web site:

http://micronet.berkeley.edu

Messages you send to this mailing list are public and world-viewable, and the list's archives can be browsed and searched on the Internet.  This means these messages can be viewed by (among others) your bosses, prospective employers, and people who have known you in the past.
Reply | Threaded
Open this post in threaded view
|

Re: [Micronet] Fwd: Zero day exploit in Adobe Flash

Jake -F Harwood
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Sure thing,

I'll give you a call.

jake

On 6/7/2010 2:49 PM, Lucy Greco wrote:

> Could someone explain this one in English I have been fighting the blue
> screen all day and don't want to think of what to do about this thanks
>
> Lucy Greco
> Assistive Technology Specialist
> University of California, Berkeley
> http://www.attlc.berkeley.edu
> (51) 643-7591
>
> -----Original Message-----
> From: [hidden email]
> [mailto:[hidden email]] On Behalf Of Jake -F
> Harwood
> Sent: Monday, June 07, 2010 2:18 PM
> To: [hidden email]
> Subject: [Micronet] Fwd: Zero day exploit in Adobe Flash
>
> Just a heads up
>
> -------- Original Message --------
> Subject: Zero day exploit in Adobe Flash
> Date: Mon, 7 Jun 2010 14:16:33 -0700
> From: Sue Bardakos <[hidden email]>
>
> Hi Folks,
>
> Heads up on a Zero Day exploit IBM X-Force is seeing in the wild.  This
> affects Windows, Macintosh, Linux and Solaris operating systems.  There's
> no patch however Adobe has a security bulletin and will hopefully update
> soon.  We have published a Level 0 alert.  Please see the links below for
> more details.
>
> For IBM ISS customers with Network or Host IDS / IPS, here's the key
> signature which provides zero day protection:
> PDF_Javascript_Exploit  - released  Feb 13, 2008;  this signature is
> turned on by default and will re-write /neuter packet (or high priority
> alert in IDS mode)
>
> http://www.iss.net/threats/369.html
>
> http://xforce.iss.net/xforce/xfdb/59137
>
> http://www.adobe.com/support/security/advisories/apsa10-01.html
>
> http://blogs.adobe.com/psirt/
>
>
>
> Sue Bardakos
> IBM Internet Security Systems
> Security Solutions Sales Specialist, CISSP
> 925-425-9489 (work)
> 925-918-0915 (cell)

- -------------------------------------------------------------------------
The following was automatically added to this message by the list server:

To learn more about Micronet, including how to subscribe to or unsubscribe
from its mailing list and how to find out about upcoming meetings, please
visit the Micronet Web site:

http://micronet.berkeley.edu

Messages you send to this mailing list are public and world-viewable, and
the list's archives can be browsed and searched on the Internet.  This means
these messages can be viewed by (among others) your bosses, prospective
employers, and people who have known you in the past.



- -------------------------------------------------------------------------
The following was automatically added to this message by the list server:

To learn more about Micronet, including how to subscribe to or
unsubscribe from its mailing list and how to find out about upcoming
meetings, please visit the Micronet Web site:

http://micronet.berkeley.edu

Messages you send to this mailing list are public and world-viewable,
and the list's archives can be browsed and searched on the Internet.
This means these messages can be viewed by (among others) your bosses,
prospective employers, and people who have known you in the past.


- --
- -----------------------------------------------------------------------
Jake-F Harwood     Systems and Network Security, IST
SNS Security     University of California, Berkeley

                                          Phone(510)643-8241
                                          Cell (510)390-2580
                                  Home (510)758-7512 (use at own risk)

   "Who is this General Failure and why is he reading my hard drive?" -F
        https://security.berkeley.edu/PGPkeys/PGPkeyJHarwood.txt
- -
- ------------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJMDWqbAAoJECIJRNHUFoUuz3QIAKcn75HMkLaEMziSW/36/YJl
ZVydCbZhXTkVUcmJqBqG+yvJLUpQzQGUtMA+/hG5mq8t9WwDfmaWvkj9jCsF69x1
Q77Rr5f1Cq2+EXmcbCTSY42wG9WDeSZthmY897i6jVWg/ZMt09N9rTD+f/gLlsRp
TuhDTNZDfMVycNwL9Wr70VZI3hz/k31QWxsfG6CEjoX//IALqa099EGcJ+J0bw2I
/cum70XRY3Bh84IVP7Kdxd6k474SKEDo9Ws+BcIiiUtv3qjcVsTqip6x4JHcGcvv
ppqm2aOyVdV+v+d/pa0ykS0a9JIXqlOzVOXYMmkLagaIKt6K1VspbYHUVuUw4bg=
=bRwX
-----END PGP SIGNATURE-----

 
-------------------------------------------------------------------------
The following was automatically added to this message by the list server:

To learn more about Micronet, including how to subscribe to or unsubscribe from its mailing list and how to find out about upcoming meetings, please visit the Micronet Web site:

http://micronet.berkeley.edu

Messages you send to this mailing list are public and world-viewable, and the list's archives can be browsed and searched on the Internet.  This means these messages can be viewed by (among others) your bosses, prospective employers, and people who have known you in the past.
Reply | Threaded
Open this post in threaded view
|

Re: [Micronet] Fwd: Zero day exploit in Adobe Flash

Beth Muramoto
In reply to this post by Jake -F Harwood
So is this still Adobe's schedule?:

This evening, we updated APSA10-01 for CVE-2010-1297 to include the target ship schedules for the security updates for Adobe Flash Player, Adobe Reader and Acrobat. The security update for Flash Player will be available by June 10, 2010. The security update for Adobe Reader and Acrobat will be available by June 29, 2010.

Would we go to Adobe for these patches and implement on all computers that have these applications? We're mostly on Macs using Leopard (there are some other variables) and only a handful have Adobe 9.

Thanks for your patience in case this is a dumb question. I just need an idea of how to approach deployment.

Beth


On Jun 7, 2010, at 2:18 PM, Jake -F Harwood wrote:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Just a heads up

- -------- Original Message --------
Subject: Zero day exploit in Adobe Flash
Date: Mon, 7 Jun 2010 14:16:33 -0700
From: Sue Bardakos <[hidden email]>

Hi Folks,

Heads up on a Zero Day exploit IBM X-Force is seeing in the wild.  This
affects Windows, Macintosh, Linux and Solaris operating systems.  There's
no patch however Adobe has a security bulletin and will hopefully update
soon.  We have published a Level 0 alert.  Please see the links below for
more details.

For IBM ISS customers with Network or Host IDS / IPS, here's the key
signature which provides zero day protection:
PDF_Javascript_Exploit  - released  Feb 13, 2008;  this signature is
turned on by default and will re-write /neuter packet (or high priority
alert in IDS mode)

http://www.iss.net/threats/369.html

http://xforce.iss.net/xforce/xfdb/59137

http://www.adobe.com/support/security/advisories/apsa10-01.html

http://blogs.adobe.com/psirt/



Sue Bardakos
IBM Internet Security Systems
Security Solutions Sales Specialist, CISSP
925-425-9489 (work)
925-918-0915 (cell)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJMDWIdAAoJECIJRNHUFoUu9oIIALm9gavYcpeMu8AX0G/2dvdX
sp4CYLDNacW8iCf2URDto8OpIKVRzkypfwGZOj3qmrCbDDLuTN+6vRZBqYLf5ewt
SjVmrzlrWCDtn0FL2Wa8lJpM6B+d5gZiT5P9DP6sg6Yw1viC6o7hr/F3z0/CxX/F
aHU5DBbOrTh2QgiyDNkn/nWBIdJ2iUvRSN6x+99COcl2p6u3w+xWWIysRqsgU8yO
WZL8g9op8xK/6cS6aYs66uEGw6qfN50ksusnxNe0f3OrePyhn/R0R3MAIjK/JqrK
EqXBjq8IGYhyneOH6BUSJ4Jr7/ftqKfaAOv5cCXhKy4jMlMWsNzHb1l8H/MSabY=
=AvyL
-----END PGP SIGNATURE-----


-------------------------------------------------------------------------
The following was automatically added to this message by the list server:

To learn more about Micronet, including how to subscribe to or unsubscribe from its mailing list and how to find out about upcoming meetings, please visit the Micronet Web site:

http://micronet.berkeley.edu

Messages you send to this mailing list are public and world-viewable, and the list's archives can be browsed and searched on the Internet.  This means these messages can be viewed by (among others) your bosses, prospective employers, and people who have known you in the past.

***********************************************
Beth Muramoto
Computer Resource Specialist
Graduate School of Education
University of California, Berkeley
1650 Tolman Hall
Berkeley, CA 94720
Phone:  (510) 643-0203 
Fax:  (510) 643-6239

The Formula for Success:  Underpromise, overdeliver

- Tom Peters

***********************************************




 
-------------------------------------------------------------------------
The following was automatically added to this message by the list server:

To learn more about Micronet, including how to subscribe to or unsubscribe from its mailing list and how to find out about upcoming meetings, please visit the Micronet Web site:

http://micronet.berkeley.edu

Messages you send to this mailing list are public and world-viewable, and the list's archives can be browsed and searched on the Internet.  This means these messages can be viewed by (among others) your bosses, prospective employers, and people who have known you in the past.
Reply | Threaded
Open this post in threaded view
|

Re: [Micronet] Fwd: Zero day exploit in Adobe Flash

Ken Tang
Regarding software and patch deployments, we use Bigfix.  It's a commercial 3rd party tool that allows us to patch and deploy software easily to our Windows, Mac and Linux machines.  If you can afford it, go with it.  Works like a charm for us.  We heard about it through RSSP.  http://www.bigfix.com

On 6/9/2010 9:44 AM, Beth Muramoto wrote:
So is this still Adobe's schedule?:

This evening, we updated APSA10-01 for CVE-2010-1297 to include the target ship schedules for the security updates for Adobe Flash Player, Adobe Reader and Acrobat. The security update for Flash Player will be available by June 10, 2010. The security update for Adobe Reader and Acrobat will be available by June 29, 2010.

Would we go to Adobe for these patches and implement on all computers that have these applications? We're mostly on Macs using Leopard (there are some other variables) and only a handful have Adobe 9.

Thanks for your patience in case this is a dumb question. I just need an idea of how to approach deployment.

Beth


On Jun 7, 2010, at 2:18 PM, Jake -F Harwood wrote:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Just a heads up

- -------- Original Message --------
Subject: Zero day exploit in Adobe Flash
Date: Mon, 7 Jun 2010 14:16:33 -0700
From: Sue Bardakos <[hidden email]>

Hi Folks,

Heads up on a Zero Day exploit IBM X-Force is seeing in the wild.  This
affects Windows, Macintosh, Linux and Solaris operating systems.  There's
no patch however Adobe has a security bulletin and will hopefully update
soon.  We have published a Level 0 alert.  Please see the links below for
more details.

For IBM ISS customers with Network or Host IDS / IPS, here's the key
signature which provides zero day protection:
PDF_Javascript_Exploit  - released  Feb 13, 2008;  this signature is
turned on by default and will re-write /neuter packet (or high priority
alert in IDS mode)

http://www.iss.net/threats/369.html

http://xforce.iss.net/xforce/xfdb/59137

http://www.adobe.com/support/security/advisories/apsa10-01.html

http://blogs.adobe.com/psirt/



Sue Bardakos
IBM Internet Security Systems
Security Solutions Sales Specialist, CISSP
925-425-9489 (work)
925-918-0915 (cell)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJMDWIdAAoJECIJRNHUFoUu9oIIALm9gavYcpeMu8AX0G/2dvdX
sp4CYLDNacW8iCf2URDto8OpIKVRzkypfwGZOj3qmrCbDDLuTN+6vRZBqYLf5ewt
SjVmrzlrWCDtn0FL2Wa8lJpM6B+d5gZiT5P9DP6sg6Yw1viC6o7hr/F3z0/CxX/F
aHU5DBbOrTh2QgiyDNkn/nWBIdJ2iUvRSN6x+99COcl2p6u3w+xWWIysRqsgU8yO
WZL8g9op8xK/6cS6aYs66uEGw6qfN50ksusnxNe0f3OrePyhn/R0R3MAIjK/JqrK
EqXBjq8IGYhyneOH6BUSJ4Jr7/ftqKfaAOv5cCXhKy4jMlMWsNzHb1l8H/MSabY=
=AvyL
-----END PGP SIGNATURE-----


-------------------------------------------------------------------------
The following was automatically added to this message by the list server:

To learn more about Micronet, including how to subscribe to or unsubscribe from its mailing list and how to find out about upcoming meetings, please visit the Micronet Web site:

http://micronet.berkeley.edu

Messages you send to this mailing list are public and world-viewable, and the list's archives can be browsed and searched on the Internet.  This means these messages can be viewed by (among others) your bosses, prospective employers, and people who have known you in the past.

***********************************************
Beth Muramoto
Computer Resource Specialist
Graduate School of Education
University of California, Berkeley
1650 Tolman Hall
Berkeley, CA 94720
Phone:  (510) 643-0203 
Fax:  (510) 643-6239

The Formula for Success:  Underpromise, overdeliver

- Tom Peters

***********************************************




-- 
Ken Tang
Systems Administrator II 1/2
Berkeley Wireless Research Center
2108 Allston Way, Suite #200
Berkeley, CA  94704
(510) 332-8725 (cell)
(510) 883-0270 (fax)
[hidden email]
http://bwrc.eecs.berkeley.edu

 
-------------------------------------------------------------------------
The following was automatically added to this message by the list server:

To learn more about Micronet, including how to subscribe to or unsubscribe from its mailing list and how to find out about upcoming meetings, please visit the Micronet Web site:

http://micronet.berkeley.edu

Messages you send to this mailing list are public and world-viewable, and the list's archives can be browsed and searched on the Internet.  This means these messages can be viewed by (among others) your bosses, prospective employers, and people who have known you in the past.
Reply | Threaded
Open this post in threaded view
|

Re: [Micronet] Fwd: Zero day exploit in Adobe Flash

Jake -F Harwood
In reply to this post by Beth Muramoto
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi Beth,

It is my understanding that is the time line for release.

I would go to Adobe for these patches. You would most likely get a pop
up on these hosts letting you know there were updates available and a
button click hear to upgrade.

Personal note on the subject, I have seen _many_ exploits on you-tube
that present them selves as the Adobe updater or similar Codex updater
requiring you to update to the latest flash version. Clicking the link
then installs malware. Do a quick Google search for "fake adobe update"
you get about About 6,270,000 results, most of people asking for help.

Once this exploit vector became so popular I started going directly to
the vendor for my updates. This is a personal view, and others may
disagree with it, and may not map well in your environment.

It's a requirement to the Minimum Security Standards that we all keep up
to date on security patches. So I would start with the Flash Player
updates on any hosts that contain restricted data, then move on to other
important hosts you may have.

We will be talking about this in SNS's staff meeting today, so we may
have an update by the end of the day, or we may not.

I hope this helps somewhat.

jakef



On 6/9/2010 9:44 AM, Beth Muramoto wrote:

> So is this still Adobe's schedule?:
>
> This evening, we updated APSA10-01 for CVE-2010-1297 to include the
> target ship schedules for the security updates for Adobe Flash Player,
> Adobe Reader and Acrobat. The security update for Flash Player will be
> available by June 10, 2010. The security update for Adobe Reader and
> Acrobat will be available by June 29, 2010.
>
> Would we go to Adobe for these patches and implement on all computers
> that have these applications? We're mostly on Macs using Leopard (there
> are some other variables) and only a handful have Adobe 9.
>
> Thanks for your patience in case this is a dumb question. I just need an
> idea of how to approach deployment.
>
> Beth
>
>
> On Jun 7, 2010, at 2:18 PM, Jake -F Harwood wrote:
>
> Just a heads up
>
Hi Beth,

> -------- Original Message --------
> Subject: Zero day exploit in Adobe Flash
> Date: Mon, 7 Jun 2010 14:16:33 -0700
> From: Sue Bardakos <[hidden email]>
>
> Hi Folks,
>
> Heads up on a Zero Day exploit IBM X-Force is seeing in the wild.  This
> affects Windows, Macintosh, Linux and Solaris operating systems.  There's
> no patch however Adobe has a security bulletin and will hopefully update
> soon.  We have published a Level 0 alert.  Please see the links below for
> more details.
>
> For IBM ISS customers with Network or Host IDS / IPS, here's the key
> signature which provides zero day protection:
> PDF_Javascript_Exploit  - released  Feb 13, 2008;  this signature is
> turned on by default and will re-write /neuter packet (or high priority
> alert in IDS mode)
>
> http://www.iss.net/threats/369.html
>
> http://xforce.iss.net/xforce/xfdb/59137
>
> http://www.adobe.com/support/security/advisories/apsa10-01.html
>
> http://blogs.adobe.com/psirt/
>
>
>
> Sue Bardakos
> IBM Internet Security Systems
> Security Solutions Sales Specialist, CISSP
> 925-425-9489 (work)
> 925-918-0915 (cell)
>>
>>
- -------------------------------------------------------------------------
The following was automatically added to this message by the list server:
>>
To learn more about Micronet, including how to subscribe to or
unsubscribe from its mailing list and how to find out about upcoming
meetings, please visit the Micronet Web site:
>>
http://micronet.berkeley.edu
>>
Messages you send to this mailing list are public and world-viewable,
and the list's archives can be browsed and searched on the Internet.
This means these messages can be viewed by (among others) your bosses,
prospective employers, and people who have known you in the past.

> ***********************************************
> Beth Muramoto
> Computer Resource Specialist
> Graduate School of Education
> University of California, Berkeley
> 1650 Tolman Hall
> Berkeley, CA 94720
> Email:  mailto:[hidden email]
> Phone:  (510) 643-0203
> Fax:  (510) 643-6239

> The Formula for Success:  Underpromise, overdeliver

>                 - Tom Peters

> ***********************************************






- --
- -----------------------------------------------------------------------
Jake-F Harwood     Systems and Network Security, IST
SNS Security     University of California, Berkeley

                                          Phone(510)643-8241
                                          Cell (510)390-2580
                                  Home (510)758-7512 (use at own risk)

   "Who is this General Failure and why is he reading my hard drive?" -F
        https://security.berkeley.edu/PGPkeys/PGPkeyJHarwood.txt
- -
- ------------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJMD95UAAoJECIJRNHUFoUu3J0IALJyG2VWCjamx5mt4sfYqS4v
4w13izJk3tGAWXNGel7xjLyu4GlqsY+rxGY/l8OgNdtP6FhpyW8B4Lbvd635y2kf
t7jIv+nctRRlkRVMvr/fbRBtzs/FEwKWIQQpgVobaCUbEKho8yUQ/B9qcz4GYH++
u6DGWwJNSQSEbLuaIfb8RaTkz3vTKfvBzeM36nk/dCZRRk6U+xwjrmURODZdx8Fg
xSk8FyXRyRxSNjN4eax54HVjzqEV1uIyhHHyW5mfQLgdcK4OO67WoG4ZXdUTLZq1
jDaEVWGCVkv10uAs8SazZ0MfdQLbYRupeL8D8rG9qwHix46D0SkIeO8w6AN4K5k=
=Ebmv
-----END PGP SIGNATURE-----

 
-------------------------------------------------------------------------
The following was automatically added to this message by the list server:

To learn more about Micronet, including how to subscribe to or unsubscribe from its mailing list and how to find out about upcoming meetings, please visit the Micronet Web site:

http://micronet.berkeley.edu

Messages you send to this mailing list are public and world-viewable, and the list's archives can be browsed and searched on the Internet.  This means these messages can be viewed by (among others) your bosses, prospective employers, and people who have known you in the past.