lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
From: pauls at utdallas.edu (Schmehl, Paul L)
Subject: CERT Employee Gets Owned

> -----Original Message-----
> From: Myers, Marvin [mailto:MRMyers@...eon.com] 
> Sent: Tuesday, August 26, 2003 7:16 AM
> To: Kurt Seifried; full-disclosure@...ts.netsys.com
> Subject: RE: [Full-Disclosure] CERT Employee Gets Owned
> 
> 
> As being one who was rightfully chastised by Kurt recently, I 
> do believe that this could indeed have some relevance to the 
> FD list. If by this mans actions, his past work could at all 
> be suspect, then this is the proper venue to post it. If 
> someone of his caliber, someone who should know the 

This is like the SCADA threads.  Nothing but the purest and rankest
speculation.  Why humans feel compelled to speculate about things of
which they know *no* facts or details is beyond me, but ISTM if you just
cannot stop yourself from speculating about it, the least you could do
is have respect for the members of this list and do your speculation
elsewhere.

Here it serves no useful purpose whatsoever.  (And yes, I know how to
filter, so shut up.)

Paul Schmehl (pauls@...allas.edu)
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu/~pauls/ 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ