lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <AE46D0386422BF4FA18E1A9FB67161A004D0822C@GOAEVS01.abf.ad.airborne.com> From: Brad.Bemis at airborne.com (Brad Bemis) Subject: "MS Blast" Win2000 Patch Download -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > It's probably worth mentioning even more that if you have > port 135 bocked on your firewall, you wouldn't have to worry > about it :( Personally I am getting tired of people making these kinds of comments. It is obvious that these people have never had responsibility for a large-scale, multi-national enterprise environment that touches so many different organizations world-wide that it is nearly impossible to account for every single Internet access point (not to mention remote access and mobile computers). While it may be true that blocking port 135 at the firewall would work in an ideal environment, very few of us that deal with security matters in the real world have anything that even begins to approach an ideal environment. We need to be discussing real solutions to real problems, not verbalizing a continued ignorance of reality. Sorry for the rant, but this topic is getting old quickly! Thank you for your time and attention, ======================== Brad Bemis ======================== -----BEGIN PGP SIGNATURE----- iQA/AwUBPzu3JJDnOfS48mrdEQJ1GACg984qft3Pbr5v2SXbG2Yi72T65rYAoMeH N6LbpR3GXG27Dx19DEthJP0N =GRs4 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists