lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 10 Jun 2012 15:30:13 -0700
From: Ian Hayes <cthulhucalling@...il.com>
To: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Re: Obama Order Sped Up Wave of Cyberattacks
 Against Iran

What she fails to realize is the reason why Stuxnet was written to run on
Windows is because the Siemens PLC software interface runs on Windows.

The operating system is merely a means to the end. The motivation behind
the action is the real issue.

Ponder the Riddle of Steel upon the Tree of Woe.

On Jun 10, 2012 3:16 PM, <valdis.kletnieks@...edu> wrote:

On Sun, 10 Jun 2012 17:06:37 -0400, Laurelai said:

> I am a bit surprised by the direction of this ...
You *do* realize that's basically  the same logic as "Macs don't get
viruses",
only  even worse security-wise.

If your threat model actually includes "attacked by state actors",  then it
should include the possibility that the team of state actors includes an OSX
jockey and a few Linux geeks.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ