lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 03 Mar 2010 19:54:25 +0000
From: mrx <mrx@...pergander.org.uk>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: To Ryan Naraine

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Valdis.Kletnieks@...edu wrote:
> On Wed, 03 Mar 2010 15:33:59 +0100, Son of Ram said:
> 
>> ZDNet and Cnet?
> ...
>> i can't think of a single thing of value that has came from layman websites like that.
> 
> You do have to admit - when you see something mentioned on those sites,
> it's the penultimate indicator that it's been played out already.
> 
> All that's left at that point is for Gartner to mention it.
> 

Most if not all "laypeople" are behind the curve.
And although Cnet and ZDnet are the last place I would look for contemporary information,
they do help some layfolk actually realise there is a curve.
My own attempts at creating an informative and helpful website wrt security are also behind the curve,
but if the information provided stops one person clicking on that link that will turn their box into a zombie...

Yes for security professionals at the cutting edge ZDNet and Cnet are lacking.


On an entirely different tack.
I wonder how many of those subscribed to this list had a mentor during their development.
Are your skills honed from reading and associating disparate information sources, analysing
the provided information and recreating those scenarios using a lab, devised through trail and error,
on your own hardware. Or did someone hold your hand and guide you through setting up your working environment
whilst indicating the must not and must do? Or did you just learn to use metasploit and consider yourself a hacker?

Sometimes I wish I had a mentor, only because I can take it so far alone before I need a rest to allow may brain
to comprehend what I have been feeding it. It would be nice now and again to be able to take something for granted,
a trusted source of info I didn't have to double check.

Then again there is fun to be had tapping a white stick against a wall.

My apologies too much wine and too few friends ;-)

Take care


- --
Mankind's systems are white sticks tapping walls.

http://www.propergander.org.uk
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEVAwUBS46+cbIvn8UFHWSmAQL0jQgAvgAONaRxEWuoe9vTFy19XGoppXsyw0jx
AdCQujUR/6vdKrrp3+pTpoJ8iPNdHyyyv9ZD6ldQ/cNZOH9ql/q+V3In5iTFBwk4
6MIgwyR2LoaeVN/XUDHmRliRxTBChEZoVrfGsiCKZV/wSrD3Xqy/5nEQ/Jo7ow02
/iMMkF48ESx/1cOaAeaCZgjbBZn4akFcTp8Z5ZanESwV8plTolKhs3fij7OzVDkF
D7CdrZDmuUahuuXSFZyiJuixAUOXP1idDalzM7TEtTUo1TU6sDIsFwPKWewfV0IW
CxhMVxgIN2W8YoyMIMSU5mfXjyDzVguIYvDeFdL2F+VExdsdnuhAXg==
=VEJj
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ