lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030213174820.GC9555@netsys.com>
From: len at netsys.com (Len Rose)
Subject: [sean@...elan.com: Symantec detected Slammer worm "hours" before]

----- Forwarded message from Sean Donelan <sean@...elan.com> -----

Delivered-To: nanog-outgoing@...pdoor.merit.edu
Delivered-To: nanog@...pdoor.merit.edu
Delivered-To: nanog@...it.edu
Date: Thu, 13 Feb 2003 11:59:48 -0500 (EST)
From: Sean Donelan <sean@...elan.com>
To: nanog@...it.edu
Subject: Symantec detected Slammer worm "hours" before
Precedence: bulk
Errors-To: owner-nanog-outgoing@...it.edu
X-Loop: nanog



Wow, Symantec is making an amazing claim.  They were able to detect
the slammer worm "hours" before.  Did anyone receive early alerts from
Symantec about the SQL slammer worm hours earlier?  Academics have
estimated the worm spread world-wide, and reached its maximum scanning
rate in less than 10 minutes.

I assume Symantec has some data to back up their claim.

http://enterprisesecurity.symantec.com/content.cfm?articleid=1985&EID=0
  "For example, the DeepSight Threat Management System discovered the
  Slammer worm hours before it began rapidly propagating. Symantec's
  DeepSight Threat Management System then delivered timely alerts and
  procedures, enabling administrators to protect against the attack
  before their environment was compromised."

----- End forwarded message -----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ