lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed May 11 19:22:59 2005
From: byte.busters at gmail.com (byte busters)
Subject: Useless tidbit (MS AntiSpyware)

On 5/11/05, Randall M <randallm@...mail.com> wrote:
> 
> 
> :-----Original Message-----
> :From: full-disclosure-bounces@...ts.grok.org.uk
> :[mailto:full-disclosure-bounces@...ts.grok.org.uk] On Behalf
> :Of Nick FitzGerald
> :Sent: Tuesday, May 10, 2005 6:17 PM
> :To: full-disclosure@...ts.grok.org.uk
> :Subject: RE: [Full-disclosure] Useless tidbit (MS AntiSpyware)
> :
> :
> :_THAT_ is a far larger problem you should have considered long
> :before you discovered that one (or more) of the many
> :"band-aid" programs (like MS AntiSpyware, most other
> :anti-spywares, known virus scanning "antivirus" programs,
> :software firewalls, and so on) so commonly advocated by lame
> :(or hamstrung) system admins has this (and dozens of
> :other) trivial, stupid holes.
> :
> :
> :Regards,
> :
> :Nick FitzGerald
> :
> 
> Nick,
> Would you please elaborate futhur on this? I read it to say we should have
> cleaned out the machines first by hand and we are lame or hamstrug for
> relying on anti-virus, anti-spyware programs to find them.
> 
> RandallM
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> 

If one [or more] of you on the list could be so kind to indicate a
[many] resource[s] that lame hamstung admins would be wise to follow
as guidlines to secure Windows systems.. it would be so much more
productive. espcially  for those lazy a$$ admins who may overlook the
single [or multiple] missed step that lets them become owned, hacked,
infected, unpatched, bugged, spewing, spamming, bots, rooted .... [I
am sure to have skipped a few important ones] ;-P

steve

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ