lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <061201c3eb2d$10633a60$5b00005a@moregarlic.com>
Date: Wed, 4 Feb 2004 09:41:39 -0500
From: "Larry Seltzer" <larry@...ryseltzer.com>
To: <Valdis.Kletnieks@...edu>
Cc: <bugtraq@...urityfocus.com>
Subject: RE: Hysterical first technical alert from US-CERT


>>OK. So let's see.  We've got one highly successful virus (MyDoom.A) on the loose at
the time of writing, another variant that's essentially identical except for the target,
and no clear indication why this one *shouldn't* take off as well.
>>...
>>Yes, it took an extreme view that nobody is supporting *NOW*.  Now isn't last
Wednesday night, when there wasn't a week's worth of hindsight.

The advisory specifically says that MyDoom.B is spreading rapidly, and that was never
the case. It didn't say that it *could* spread rapidly. Maybe you think misinforming in
order to induce caution is a good idea, but I expect nothing but the truth from an
agency like this.

Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
larryseltzer@...fdavis.com 




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ