LT   EN   RU  
Friday 29 March 2024 Straipsniai.lt - Independent and informative portal
Home
Phorum
Contacts
Login
Register   Login
News subscribe
Subscribe   Unsubscribe
Partners
www.slaptai.lt www.gamezone.lt
www.penki.lt www.hakeriai.lt
   
   
Advertising
Statistic
Visits since 2002 09 12 - 70584094
Pages in Straipsniai.lt: 40735
  
  Computers > Computer technologies > Hackers
Lankomumo reitingas Print version Print version
Feds try to take logs from Nmap creator

The creator of the famous hacking tool Nmap is being hounded by the FBI for copies of Web server log data from his Web site Insecure.org.

Fyodor, as he is known, is a well known figure in the security world, specifically for his work with Nmap. In his blog, Fyodor said that the authorities were asking him for details but failing to give reasons of what they were up to.

His message said: "FBI agents from all over the country have contacted me demanding Web server log data from Insecure.Org. They don't give me reasons, but they generally seem to be investigating a specific attacker whom they think may have visited the Nmap page at a certain time."

The open-source network mapping program was designed to help security experts scan networks, services and applications. But some hackers have used the tool for malicious purposes, which Fyordor indicated he was unhappy with.

"One can argue whether helping the FBI is good or bad. Remember that they might be going after spammers, cyberextortionists, DDoS kiddies, etc. In this, I wish them the best. Nmap was designed to help security -- the criminals and spammers put my work to shame!"

Fyodor said he thought the FBI wanted access to his Web logs to investigate malicious hackers. "They don't give me reasons, but they generally seem to be investigating a specific attacker who they think may have visited the Nmap page at a certain time. So far, I have never given them anything. In some cases, they asked too late and data had already been purged through our data retention policy. In other cases, they failed to serve the subpoena properly. Sometimes they try asking without a subpoena and give up when I demand one."

The security expert added that he would like to protect his privacy when dealing with the Federal Bureau of Investigation. "I'll try to fight anything too broad (like if they ask for weblogs for a whole month). Protecting your privacy is important to me, but Nmap users should be savvy enough to know that all of your network activity leave [sic] traces. I'm not the only one who gets these subpoenas -- large ISPs and Web mail providers receive them daily."

In October, FBI agents seized servers in the UK from news company Indymedia. Agents served a subpoena to Indymedia's hosting company in the US, Rackspace, to hand over the computers beforehand.

British and US governments have failed to provide an explanation for the action and why the FBI was allowed to operate in London.

         
Lankomumo reitingas

Diskusijos - Discusions

Print version - Print version

Atgal








Random tags:    Geology (4)    Science (163)    Films (10)    Art (10)    Beer (10)    Sport (81)    Prose (11)    Cryptography (10)    The Rights of Man (14)    Law (11)    Gymnastics (9)    Pubic Hair Fashion (15)    Scaners (10)    V.Nabokov (54)    Monitors (10)    Mother and child (17)    Heathendom (3)    Aviculture (2)    Cinema (20)    Literature (24)    Show-business (11)    Kisses (13)    Music (10)    Fencing (2)    Transport (54)    PHP (3)    Countries (43)    Yoga (4)    Business (25)    Fishing (14)    Agrobusiness (2)    Security (22)    Communication (38)    Animals (65)    Casino’s (10)    Dragons (13)    Eurointegration (4)    Tales (13)    Sport gymnastics (9)    Cats (14)    Egypt (43)    Hobby (25)    Medicine (5)    Pedagogics (10)    Windows (7)    Law (11)    Formula 1 (2)    Feng Shui (14)    Travels (2)    Paintball (10)
1. Bill Gates and other communists
2. Wi-Fi overtakes Ethernet for home networks
3. Worm plays games with victims
4. McAfee Launches SiteDigger 2.0 - program, which checks sites for their vulnerabilities
5. Troy-horses infects Windows Media files?
6. iWork productivity software targets Microsoft's Office
7. Taiwan police seize 60,000 suspect AMD CPUs
8. IDC: 3 future technologies
9. phpBB Attachment Mod: new vulnerabilities discovered
10. Windows XP SP2 Firewall shows your files and printers to every Internet user
1. Multiple vulnerabilities within PHP <= 4.3.9, PHP5 <= 5.0.2
2. Taiwan police seize 60,000 suspect AMD CPUs
3. Who says safe computing must remain a pipe dream?
4. Bill Gates and other communists
5. phpBB Attachment Mod: new vulnerabilities discovered
6. iWork productivity software targets Microsoft's Office
7. New hacking tool: chocolate
8. McAfee Launches SiteDigger 2.0 - program, which checks sites for their vulnerabilities
9. New Internet domains in the works
10. Windows XP SP2 Firewall shows your files and printers to every Internet user
Map