lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: DARREN.L.BENNETT at saic.com (Darren Bennett)
Subject: east coast powergrid / SCADA [OT?]

Yes, the "five 9's" of reliability that MS talks about is more like
.99999 of the time than 99.999%. Another possibility is that some things
WERE on MS and while not connected to the internet directly, were
infected via a laptop or other internal system.

	-Darren

On Fri, 2003-08-15 at 12:40, RMcElroy@....com wrote:
> At least on the west coast they do not, I think the requirements of the
> systems are way out of Microsoft's range. Lot's and Lot's of Unix
> 
> -----Original Message-----
> From: Michael Scheidell [mailto:scheidell@...nap.net] 
> Sent: Friday, August 15, 2003 11:36 AM
> To: tetsujin
> Cc: full-disclosure@...ts.netsys.com
> Subject: Re: [Full-Disclosure] east coast powergrid / SCADA [OT?]
> 
> 
> > 
> > Paller said it is "highly unlikely" that the process control computers
> 
> > behind critical infrastructure like power in the United States would 
> > run on the Windows operating system.
> 
> well, ONTARIO HYDRO does seem to have SOME windoes boxes.. at least here
> is one that appears to have been infected with slammer:
> 
> http://www.hackertrap.net/LID.pl?IID=39335068
> 
> (Aug 9th through the 12th?)
-- 
-----------------------------------------------
Darren Bennett 
CISSP, Certified Unix Admin., MCSE, MCSA, MCP +I
Sr. Systems Administrator/Manager
Science Applications International Corporation
Advanced Systems Development and Integration
-----------------------------------------------


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ