lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <410E85DF.1070609@twowaytv.co.uk>
Date: Mon, 02 Aug 2004 19:20:15 +0100
From: Ben <btyson-norrman@...waytv.co.uk>
To: Paul Schmehl <pauls@...allas.edu>
Cc: ben@...waytv.co.uk, bugtraq@...urityfocus.com,
   full-disclosure@...ts.netsys.com
Subject: Re: Fortinet Firewalls


Got that bit..

A lot of these recent vulnerabilites seem quite complex to set up 
content filtering rules for - does the audience really feel that you 
could really get that far on top of the problem...? Hard enough writing 
snort rules without trying to commercially distrubute it...?

All of the audience, that is, except pretty vacant who has a rather more 
difinitive answer :-) I think you might have hit on something there PV



hl wrote:

> --On Monday, August 02, 2004 04:56:42 PM +0100 Ben 
> <btyson-norrman@...waytv.co.uk> wrote:
> 
>>
>> Anyone had any experience with these - they claim to be able to offer
>> content filtering and there by detect malicious content embedded into
>> HTML, as well as the usual deliver systems.
>>
>> Sounds interesting my only concern is how you would stay on top of each
>> new threat...
>>
> Through automatic updates from the vendor.
> 
> Paul Schmehl (pauls@...allas.edu)
> Adjunct Information Security Officer
> The University of Texas at Dallas
> AVIEN Founding Member
> http://www.utdallas.edu/ir/security/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ