lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: cheekypeople at sec33.com (cheekypeople@...33.com)
Subject: Security Sites

www.seethrusec.co.uk

www.net-security.org




Quoting Harlan Carvey <keydet89@...oo.com>:

> 
> > > I have been looking around and haven't found a
> > very good security forum
> > > and
> > > I was wondering if anyone has some ideas. Im new
> > to the security field and
> > > am looking at learning as much as possible. Also
> > maybe even some more
> > > mailing lists. I appreciate everyone that posts
> > here I enjoy reading the
> > > comments. Thanks in advance
> 
> Good luck.  I've been at this since about '95 or so,
> going on Usenet, listservs, forums, you name it.  I
> won't even begin to suggest that I've seen everything,
> b/c I haven't.  But in most of the cases I've seen, if
> you open something up to the public, your
> signal-to-noise ratio drops to very close to zero. 
> 
> There have been suggestions to start closed forums,
> open only to people who are "in the business" and are
> sponsored of validated by someone else.  Well, what
> happens then is that there is NO traffic, b/c
> everyone's too busy, or are under NDAs, or the stuff
> they do is classified...
> 
> Anyway, just food for thought...I love the idea of a
> specific list for security, but the only way to really
> do it is to have it moderated, and that's a lot of work.
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
> 




----------------------------------------------------------------
This message was sent using IMP, the Internet Messaging Program.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ