lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <A7043C74B6DA4842BD57E4449F43BB1B028FC3@shiro.oicinc.com>
From: schoe at oicinc.com (Sung J. Choe)
Subject: Re: Securing Windows 2000 Server Documentat
	ion

> Obviously the microsoft certified solitaire experts (aka MCSE) who
administrate 
> the microsoft internal network have not read this propaganda

;-p
Or, similar to Nazi Germany, they began to believe their own propaganda
resulting in undeserved confidence in their internal security posture.


.--------------------------------------------------.
| Sung J. Choe <schoe[at]oicinc.com>, TICSA        |
| Systems Administrator, Facility Security Officer |
.--------------------------------------------------.----.
                    | Oceanic Imaging Consultants, Inc. |
                    | Phone #: (808) 539-3634 x3634     |
                    .-----------------------------------.

568D CAD6 53A0 92E6 4A2A  4E87 3BA0 5F90 37BB 8EE7

> -----Original Message-----
> From: Georgi Guninski [mailto:guninski@...inski.com]
> Sent: Tuesday, February 25, 2003 5:55 AM
> To: Michael Howard
> Cc: full-disclosure@...ts.netsys.com
> Subject: [Full-Disclosure] Re: Securing Windows 2000 Server
> Documentation
> 
> 
> Obviously the microsoft certified solitaire experts (aka 
> MCSE) who administrate 
> the microsoft internal network have not read this propaganda 
> since their 
> internal network got infected by the sql worm according to the news.
> 
> Georgi Guninski
> 
> Michael Howard wrote:
> > The Microsoft Solutions for Security team has released 
> 'Securing Windows
> > 2000 Server'. This is the first of several prescriptive security
> > solutions planned for release this year. These new security 
> solutions
> > are designed to provide customers with authoritative, 
> proven, and tested
> > solutions that address today's security challenges and business
> > requirements.
> > 
> > The contents include:
> > 
> > Chapter 1: Introduction to Securing Windows 2000 Server
> > This chapter introduces the Securing Windows 2000 Server guide. It
> > includes a brief overview of each of the other chapters.
> > 
> <snip>
> 
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
> 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030225/b0fcc4e7/attachment.html
-------------- next part --------------
A non-text attachment was scrubbed...
Name: schoe.vcf
Type: application/octet-stream
Size: 284 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030225/b0fcc4e7/schoe.obj

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ