lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <AE46D0386422BF4FA18E1A9FB67161A004D0822C@GOAEVS01.abf.ad.airborne.com>
From: Brad.Bemis at airborne.com (Brad Bemis)
Subject: "MS Blast" Win2000 Patch Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> It's probably worth mentioning even more that if you have 
> port 135 bocked on your firewall, you wouldn't have to worry 
> about it :(

Personally I am getting tired of people making these kinds of comments.  It
is obvious that these people have never had responsibility for a
large-scale, multi-national enterprise environment that touches so many
different organizations world-wide that it is nearly impossible to account
for every single Internet access point (not to mention remote access and
mobile computers).  While it may be true that blocking port 135 at the
firewall would work in an ideal environment, very few of us that deal with
security matters in the real world have anything that even begins to
approach an ideal environment.  We need to be discussing real solutions to
real problems, not verbalizing a continued ignorance of reality.  Sorry for
the rant, but this topic is getting old quickly!     

Thank you for your time and attention,

========================
Brad Bemis
========================





-----BEGIN PGP SIGNATURE-----

iQA/AwUBPzu3JJDnOfS48mrdEQJ1GACg984qft3Pbr5v2SXbG2Yi72T65rYAoMeH
N6LbpR3GXG27Dx19DEthJP0N
=GRs4
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ