lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
From: pauls at utdallas.edu (Schmehl, Paul L)
Subject: Re: Microsoft Security, baby steps ?

> -----Original Message-----
> From: full-disclosure-admin@...ts.netsys.com 
> [mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of 
> Full-Disclosure
> Sent: Thursday, March 18, 2004 2:17 AM
> To: full-disclosure@...ts.netsys.com
> Subject: RE: [Full-Disclosure] Re: Microsoft Security, baby steps ?
> 
> In an corporate environment, you will have SUS or SMS 
> running. If so, no need for internet access.
>
I'm seeing statements like this more and more, on this list and others,
and it's really starting to bug me.  (Not picking on you personally.)
Most of the attacks on corporate boxes come from the inside.  Blocking
internet access does very little to protect you.  Don't believe it?
Then explain how Slammer and Sobig and Mydoom and Nachi and Blaster
managed to spread in corporate environments that have very good
firewalling.

Putting up a firewall is one small step in a very large process that
gets you some semblance of security.  You are not "safe" simply because
the firewall is up and running.  All it take is *one* improperly
maintained box on the inside to be compromised/infected, and the hacker
is off to the races.  What will SUS/SMS do for you then?

By all means, automate patching.  But for god's sake, don't think that
once you've done that you're done!  You've only just begun.
 
Paul Schmehl (pauls@...allas.edu)
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu/~pauls/ 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ