---------------------------------------------------------------------------- The Florida SunFlash Third Party Products & Announcements SunFLASH Vol 55 #25 July 1993 ---------------------------------------------------------------------------- Summary 55.25.A ACME Widgets - Table and Graph widgets for X windows A set of X Windows widgets which complement the Motif and Olit widget sets. They include: ACME Table Widget, ACME Hypertext Widget, ACME 2D Graph Widget, ACME Stock Chart Widget ACME 3D Shaded Surface Graph Widget 55.25.B Store[TM] - Object Oriented Virtual File System innovative new technology for providing custom applications with transparent access to a number of document formats and file server protocols. 55.25.C ICSW announces UUCPADM for Solaris 2 UUCPADM is the first comprehensive GUI-based package for configuring, testing and maintaining local and remote E-MAIL, asynchronous communications ports, modems, and the Uucp network data communications package. 55.25.D Book: Learning the Korn Shell Bill Rosenblatt This book provides a guide to all aspects of Korn shell usage: interactive "command line" use, plus thorough coverage of shell programming. 55.25.E 5th Computer Security Incident Handling Workshop August 10-13, 1993 Sponsored by the Forum of Incident Response and Security Teams (FIRST) August 10-13, 1993 St. Louis, MO. Topics include Creating a Security Policy; Vulnerabilities of the IBM PC Architecture; Unix Security; International Issues; Professional Certification & Qualification; Incident Aftermath and Press Relations; Preserving Rights During an Investigation; Coordinating an Investigation; Liabilities and Insurance; Incident Role Playing; Virus Incidents; Databases; Threats -------------------------------------------------------------------------------- Details -------------------------------------------------------------------------------- Subject: ACME Widgets - Table and Graph widgets for X windows Newsgroups: comp.newprod From: gtynen@netcom.com (Gerard Tynen) Keywords: Expert Database Systems; ACME Widgets; Unix libraries, X11 phone: (415) 574-4263 ACME Widgets are a set of X Windows widgets which complement the Motif and Olit widget sets. They include: ACME Table Widget The ACME Table Widget provides a spreadsheet or tabular display of data. Over 100,000 cells can easily be displayed with super fast scrolling to any part of the table. There are over 108 convenience functions. The built in functionality includes: Named Column headers; Locking columns; Individual foreground and background color per cell; Over 12 different callbacks based on cells, columns or the entire table; Rearrangement of rows and columns by the user or programmer; Automatic editing functions for each cell; Copy & Paste; Standard scroll bars or the Virtual Scrollbar, which acts as a panning device over the entire table. ACME Hypertext Widget The ACME Hypertext Widget displays the contents of hypertext documents. It automatically allows the user to navigate through linked text items. The programmer can specify the foreground and background colors and fonts to use for hypertext fields, normal text, and section heading text. Also allows the incorporation of GIF format pictures into the document. ACME 2D Graph Widget The ACME 2D Graph Widget displays two dimensional graph data. It can be used for line plots, scatter plots, XY plots, map plots or any other type of two dimensional visual data. Some of the features include: Up to 10 separate plots; Titles for graph, left axis, right axis and horizontal axis; Legend area for labeling graph lines; Each plot can have different colors, widths, and solid, dotted, or dashed line types; Data points can be displayed; Support for N/A data points; Automatic division markings including time/date divisions; 10 text regions for labeling parts of the plot; Automatic resizing and scaling; Real-time response with no flicker ACME Stock Chart Widget Includes all of the features of the 2D graph along with automatic display of high, low, open, close, closing bid, and closing ask prices. It can also be configured to display volume and histogram information. Support is available for up to four moving average lines. ACME 3D Shaded Surface Graph Widget The 3D Surface graph widget displays 3D rectangular surface meshes. A shaded surface option is available for coloring ranges of values. The widget can automatically scale and label division markings. It supports automatic rotate, translation, and zooming by the programmer or by the user through the mouse. Prices are $500 per widget, except for the Hypertext widget, which is $250. Site licensing and source code are available. Runs on Sun (OpenLook or Motif), HP, SGI, Univel, RS6000, VAX VMS and Apollo Domain. ACME Widgets are a product of Expert Database Systems. All ACME software is covered with a 30 day money back guarantee. If you don't like a widget for any reason, we will refund your money. Demo disks are available for Sun4, RS6000, HP-UX, and VMS. Programmer's references are available for evaluation. -------------------------------------------------------------------------------- Subject: Store[TM] - Object Oriented Virtual File System Newsgroups: comp.newprod From: ttl@groucho.sti.fi (Timo Lehtinen) Org: Stream Technologies Inc. Address: Valkjarventie 2 SF-02130 Espoo FINLAND E-Mail: info@sti.fi Fax: +358 (0) 43577348 Tel: +358 (0) 43577340 STORE[TM] OBJECT ORIENTED VIRTUAL FILE SYSTEM INTRODUCED BY STREAM TECHNOLOGIES INC. ESPOO, Finland, June 1, 1993 -- Stream Technologies Inc. today announced the availability of an innovative new technology for providing custom applications with transparent access to a number of document formats and file server protocols. Store[TM] is an implementation of a user file system providing transparent access to foreign file and document service protocols and data representation formats. Store is implemented as an object oriented class with ANSI C and Objective-C API's. Support for individual service protocols are implemented as a set of delegates to the Store abstract class. The Store virtual file system API contains only 12 methods and a carefully designed argument passing convention with support for data hiding and polymorphism. The API is designed to be as simple as possible and yet contain semantics rich enough for all current and foreseen file system targets. This same API is able to provide full access to UNIX file system semantics and at the same time implement a high level interface to services such as FTP and Internet Gopher. A universal reference syntax is used to allow all virtual file system objects, regardless of the service providing protocol, to have unique pathnames. As a consequence of the simplicity of the Store API, taking a generic UNIX application and modifying it to use Store as it's means for persistant data access is a straight forward task. Store is currently shipped with the following protocol modules: Local UNIX file system MH style mail folders FTP - File Transfer Protocol NNTP - Network News Transfer Protocol POP - Post Office Protocol Gopher - Internet Gopher Protocol Future updates will include (among others): tar - Tape Archive Format WWW - World Wide Web OLE2 - Object Linking and Embedding (Windows only) Archie - Internet Archie Service Whois - directory service Adding support for new custom protocols or file system targets is possible either by modifying the product directly (source license required) or by interfacing to the file system hooks with an external library. Store is licensed to software developers either in source or binary form. A one time license fee covers unlimited distribution rights of the library when embedded in an end user application. Initial license includes a support contract for 1 year with quarterly updates. Yearly fee for support after the initial year is 15% of the license price. A prelinked object version of the Store library is currently available for the following environments: NeXTSTEP RISC ULTRIX RS6000 AIX SPARC SunOS Windows 3.1 For more information see contact listed above. Store is a trademark of Stream Technologies Inc. All other trademarks are the property of their respective holders. -------------------------------------------------------------------------------- Subject: ICSW announces UUCPADM for Solaris 2 From: "Gary M. Gere" Org: Intelligent Computer Solutions Worldwide, Inc. Voice: 602-998-8623 Fax: 602-991-1437 Address: 14433 North 73rd Street Scottsdale, AZ 85260 USA E-mail: uucpadm@icsw.Com ICSW ANNOUNCES UUCPADM(tm) FOR SUN SYSTEMS RUNNING SOLARIS 2 THE FIRST GUI-BASED E-MAIL AND COMMUNICATIONS CONFIGURATION AND MONITORING PACKAGE SCOTTSDALE, Arizona, July 15, 1993 -- Intelligent Computer Solutions Worldwide (ICSW) Inc. today announced the availability of UUCPADM for the Solaris 2 environment on Sun SPARC workstations. UUCPADM is the first comprehensive GUI-based package for configuring, testing and maintaining local and remote E-MAIL, asynchronous communications ports, modems, and the Uucp network data communications package. UUCPADM greatly simplifies the task of configuring a Unix system to exchange E-mail and other data over dialup connections. Currently, the average user is daunted by reading hundreds of pages of instructions and manually editing a multitude of interrelated cryptic files. With UUCPADM, an unsophisticated user can accomplish in minutes what a skilled system administrator or a $150/hour consultant may take days to do. The Uucp network data communications software, an optional package bundled with the Solaris operating environment, provides a widely supported method for point to point (dialup) data exchange. It is the foundation for E-mail between sites that do not share a common local area network such as ethernet or token ring. This vital link with the outside world has proven to be a nightmare to properly configure and maintain, until now. UUCPADM is a powerful yet easy to use package that is useful to both novices and experts. While the beginning user may elect to use automatically determined intelligent defaults, the more sophisticated user is provided access to all aspects of the system configuration, such as specific register values in modem configurations. Context-sensitive help is available throughout the program to provide instant answers to any questions. AVAILABILITY: UUCPADM is available now. While the list price is normally $995, ICSW is offering UUCPADM at the special introductory price of only $750. This offer is good through 8/31/93. UUCPADM can be ordered directly from ICSW by calling 1-800-486-7274 (8am-6pm MST). FUTURE FEATURES: Additional modems, FAX, and third party serial communications device support will be available later this year as an inexpensive upgrade. REQUIREMENTS: Hardware: All Sun 4 / SPARCstation Operating System: Solaris 1.x (SunOS 4.1+) Solaris 2.x (SunOS 5.x+) Windowing System: OpenWindows 3.0+ Disk Space: 4Mb Modems: Telebit, Motorola/UDS, Practical Peripherals / Hayes, US Robotics, MultiTech Media: 3.5" floppy disks Other media available on special request -------------------------------------------------------------------------------- Subject: Book: Learning the Korn Shell by Bill Rosenblatt From: Brian Erwin Org: O'Reilly & Associates Address: 103A Morris Street, Sebastopol CA 95472 Phone: 707-829-0515 Fax: 707-829-0104 LEARNING THE KORN SHELL by Bill Rosenblatt 338 pages; ISBN 1-56592-054-6; Price: $27.95 (US) We have just published _Learning the Korn Shell_ by Bill Rosenblatt. It provides a guide to all aspects of Korn shell usage: interactive "command line" use, plus thorough coverage of shell programming. In addition to the basics of UNIX shell programming, _Learning the Korn Shell_ explains ksh string operations, co-processes, signals and signal handling, and one of the worst "dark corners" of shell programming, command-line interpretation. It covers new features like command history, which allows readers to recall and re-use previous commands conveniently, and built-in pattern matching, arithmetic evaluation, and condition evaluation, which allow them to write much more efficient shell scripts. As an extended example of advanced shell programming, it contains kshdb, a Korn shell script that's a debugger for shell scripts. An Appendix summarizes the differences between the Korn shell and the standard Bourne shell, the IEEE 1003.2 POSIX Shell Standard, the Windowing Korn shell (wksh), and such public domain versions as pdksh and bash. TABLE OF CONTENTS 1 - Korn Shell Basics 7 - Input/Output and Command-line 2 - Command-line Editing Processing 3 - Customizing Your Environment 8 - Process Handling 4 - Basic Shell Programming 9 - Debugging Shell Programs 5 - Flow Control 10 - Korn Shell Administration 6 - Command-line Options & Typed Variables --------------------------------------------------------------------- This and other O'Reilly books are available in North America through bookstores or directly from the publisher. For a list of North American bookstores FAX (707/829-0104), phone 707/829-0515 (800/998-9938 in US & Canada), e-mail (order@ora.com), access our gopher catalog by "telnet gopher.ora.com. login as gopher", or write O'Reilly & Associates, 103 Morris St., Sebastopol, CA., 95472, US. GSA # GS-02F-6095A Beginning 11 August 1993, O'Reilly books will be distributed in the UK, Europe, Middle East, and Africa through International Thomson Publishing, Berkshire House, 168-173 High Holburn, London WC1V 7AA, UK. Telephone 071 497 1422; FAX 071 497 1426; or e-mail allison.lawrence@itpuk.co.uk. -------------------------------------------------------------------------------- Subject: 5th Computer Security Incident Handling Workshop August 10-13, 1993 From: Gene Spafford Organization: COAST, Department of Computer Sciences, Purdue Univ. Registration: 412-268-6531 general: Mary Alice "Sam" Toocheck at 214-268-6933 PRELIMINARY AGENDA 5th Computer Security Incident Handling Workshop Sponsored by the Forum of Incident Response and Security Teams (FIRST) August 10-13, 1993 St. Louis, MO TUESDAY, August 10, 1993 Full-day Tutorials 1. Creating a Security Policy presented by Charles Cresson Wood: [no abstract available at time of posting] 2. Vulnerabilities of the IBM PC Architecture: Virus, Worms, Trojan Horses, and Things That Go Bump In The Night presented by A. Padgett Peterson: An intensive look into the architecture of the IBM-PC and MS/PC-DOS -- What it is and why it was designed that way. An understanding of assembly language and the interrupt structure of the Intel 80x86 processor is helpful. The day will begin with the BIOS and what makes the PC a fully functional computer before any higher operating system is introduced. Next will be a discussion of the various operating systems, what they add and what is masked. Finally, the role and effects of the PC and various LAN configurations (peer-peer and client server) will be examined with emphasis on the potential protection afforded by login scripting and RIGHTS. At each step, vulnerabilities will be examined and demonstrations made of how malicious software exploits them. Demonstrations may include STONED, MICHELANGELO, AZUSA, FORM, JERUSALEM, SUNDAY, 4096, and EXEBUG viruses depending on time and equipment available. On completion attendees will understand the vulnerabilities and how to detect attempted exploitation using simple tools included with DOS such as DEBUG and MEM. 3. Unix Security presented by Matt Bishop: Unix can be a secure operating system if the appropriate controls and tools are used. However, it is difficult for even experienced system administrators to know all the appropriate controls to use. This tutorial covers the most important aspects of Unix security administration, including internal and external controls, useful tools, and administration techniques to develop better security. Upon completion, Unix system administrators will have a better understanding of vulnerabilities in Unix, and of methods to protect their systems. WEDNESDAY, August 11, 1993 8:30 - 8:45 Opening Remarks - Rich Pethia (CERT/CC) 8:45 - 9:30 Keynote Speaker - Dr. Vinton Cerf (XXXX) 9:30 - 10:00 Break 10:00 - 12:00 International Issues - Computer networks and communication lines span national borders. This session will focus on how computer incidents may be handled in an international context, and on some ways investigators can coordinate their efforts. SPEAKERS: Harry Onderwater (Dutch Federal Police) John Austien (New Scotland Yard) other speakers pending 12:00 - 1:30 Lunch with Presentations by various Response Teams 1:30 - 3:00 Professional Certification & Qualification - how do you know if the people you hire for security work are qualified for the job? How can we even know what the appropriate qualifications are? The speakers in this session will discuss some approaches to the problem for some segments of industry and government. SPEAKERS: Sally Meglathery ((ISC)2) Lynn McNulty (NIST) Genevieve Burns (ISSA) 3:00 - 3:30 Break 3:30 - 6:00 Incident Aftermath and Press Relations - What happens after an incident has been discovered? What are some of the consequences of dealing with law enforcement and the press? This session will feature presentations on these issues, and include a panel to answer audience questions. SPEAKERS: Laurie Sefton (Apple Computer) Jeffrey Sebring (MITRE) Terry McGillen (Software Engineering Institute) John Markoff (NY Times) Mike Alexander (InfoSecurity News) 7:00 - 9:00 Reception THURSDAY August 12 8:30 - 10:00 Preserving Rights During an Investigation - During an investigation, sometimes more damage is done by the investigators than from the original incident. This session reinforces the importance of respecting the rights of victims, bystanders, and suspects while also gathering evidence that may be used in legal or administrative actions. SPEAKERS: Mike Godwin (Electronic Frontiers Foundation) Scott Charney (Department of Justice) other speaker pending 10:00 - 10:30 Break 10:30 - 12:00 Coordinating an Investigation - What are the steps in an investigation? When should law enforcement be called in? How should evidence be preserved? Veteran investigators discuss these questions. A panel will answer questions, time permitting. SPEAKER: Jim Settle (FBI) other speakers pending 12:00 - 1:30 Special Interest Lunch 1:30 - 3:00 Liabilities and Insurance - You organize security measures but a loss occurs. Can you somehow recover the cost of damages? You investigate an incident, only to cause some incidental damage. Can you be sued? This session examines these and related questions. SPEAKERS: Mark Rasch (Arent Fox) Bill Cook (Willian, Brinks, Olds, Hoffer, & Gibson) Marr Haack (USF&G Insurance Companies) 3:00 - 3:15 Break 3:15 - 5:30 Incident Role Playing -- An exercise by the attendees to develop new insights into the process of investigating a computer security incident. Organized by Dr. Tom Longstaff of the CERT/CC. 7:30 - ? Birds of a Feather and Poster Sessions FRIDAY August 13 8:30 - 10:00 Virus Incidents - How do you organize a sussessful virus analysis and response group? The speakers in this session have considerable experience ans success in doing exactly this. In their talks, and subsequent panel, they will explain how to organize computer virus response. SPEAKERS: Werner Uhrig (Macintosh Anti-virus Expert) David Grisham (University of New Mexico) Christoph Fischer (CARO) Karen Pichnarczyk (LLNL/DoE CIAC) Ken van Wyk (DISA/Virus-L) 10:00 - 10:15 Break 10:15 - 11:15 Databases - How do you store incident, suspect, and vulnerability information safely, but still allow the information to be used effectively? The speakers in this session will share some of their insights and methods on this topic. SPEAKERS: John Carr (CCTA) Michael Higgins (DISA) speaker pending 11:15 - 12:15 Threats - Part of incidence response is to anticipate riska and threats. This session will focus on some likely trends and possible new problems to be faced in computer security. SPEAKERS: Karl A. Seeger speakers pending 12:15 - 12:30 Closing Remarks - Dennis Steinauer (NIST/FIRST) 12:30 - 2:00 Lunch 2:00 - 3:00 FIRST General Meeting and the Steering Committee Elections 3:00 - 4:00 FIRST Steering Committee Meeting ^^^^^^^^^^^^^^^^^^^^^Registration Information/Form Follows^^^^^^^^^^^^^^^^^^^^^ INQUIRES: Direct questions concerning registration and payment to: Events at 412-268-6531 Direct general questions concerning the workshop to: Mary Alice "Sam" Toocheck at 214-268-6933 Return to: Helen E. Joyce Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213-3890 Facsimile: 412-268-7401 TERMS: Please make checks or purchase orders payable to SEI/CMU. Credit cards are not accepted. No refunds will be issued, substitutions are encouraged. The registrations fee includes materials, continential breakfast, lunches (not included on August 13), morning and afternoon breaks and an evening reception on August 11. Completed registration materials must be received by the SEI no later than July 10, 1993. A minimum of 7 attendees are needed for each tutorial and there will be limit of 50 attendees. You MUST indicate which tutorial you would like to attend and an alternate if your first choice is full. GOVERNMENT TERMS: If your organization has not made prior arrangements for reimbursement of workshop expenses, please provide authorization (1556) from your agency at the time of registration. GENERAL REGISTRATION INFORMATION: Workshop................................. ..............$300.00 All registrations received after July 10, 1993..........$350.00 Tutorials (Must be registered by July, 10, 1993)........$190.00 NAME: TITLE: COMPANY: DIVISION: ADDRESS: CITY: STATE: ZIP: BUSINESS PHONE: EMERGENCY PHONE: FACSIMILE NUMBER: E-MAIL ADDRESS: DIETARY/ACCESS REQUIREMENTS: CITIZENSHIP: Are you a U.S. Citizen? YES/NO Identify country where citizenship is held if not the U.S.: (Note: there will be no classified information disclosed at this workshop. There is no attendance restriction based on citizenship or other criteria.) GENERAL HOTEL INFORMATION: RATES: A block of rooms has been reserved at the Hyatt Regency at Union Station, One St. Louis Union Station, St. Louis, Missouri 63103. The hotel will hold these rooms until July 10, 1993. Hotel arrangements should be made directly with the Hyatt, 314-231-1234. To receive the special rate of $65.00 per night, please mention the Fifth Computer Security Incident Handling Workshop when making your hotel arrangements. ACCOMMODATIONS: Six-story hotel featuring 540 guest rooms, including 20 suites. All rooms have individual climate control, direct-dial telephone with message alert, color TV with cable and optional pay movies. Suites available with wet bar. Hotel offers three floors of Regency accomodations, along with a Hyatt Good Passport floor, and a special floor for women travelers. LOCATION/TRANSPORTATION FACTS: Downtown hotel located in historic Union Station one mile from Cervantes Convention Center and St. Louis Convention Center and St. Louis Arch. Fifteen miles (30 minutes) from St. Louis Zoo. DINING/ENTERTAINMENT: Italian Cuisine is features at Aldo's, the hotel's full-service restaurant. Enjoy afternnon cocktails in the Grand Hall, an open-air, six-story area featuring filigree work, fresco and stained glass windows. The station Grille offers a chop house and seafood menu. RECREATIONAL/AMUSEMENT FACILITIES: Seasonal outdoor swimming pool. Full health club; suana in both men's and women's locker rooms. Jogging maps are available at the hotel front desk. SERVICES/FACILITIES/SHOPS: Over 100 specialty shops throughout the hotel, including men's and women's boutiques, children's toy shops and train stores. ********************************************************************** For information about SunFlash send mail to info-sunflash@Sun.COM. Subscription requests should be sent to sunflash-request@Sun.COM. Archives are on solar.nova.edu, ftp.uu.net, sunsite.unc.edu, src.doc.ic.ac.uk and ftp.adelaide.edu.au All prices, availability, and other statements relating to Sun or third party products are valid in the U.S. only. Please contact your local Sales Representative for details of pricing and product availability in your region. Descriptions of, or references to products or publications within SunFlash does not imply an endorsement of that product or publication by Sun Microsystems. Send brief articles (e.g. third party announcements) and include contact information (non-800#, fax #, email, etc) to: John McLaughlin, SunFlash editor, flash@Sun.COM. +1 305 351 4909 TRACE: To: sunflash@suntri Errors-to: owner-sunflash@suntri.east.sun.com