lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <002201c3a1c2$d76fc6a0$6101a8c0@fosi>
From: steve.wray at paradise.net.nz (Steve Wray)
Subject: Microsoft plans tighter security measures in
 Windows XP SP2

I think that people are just misinterpreting Microsoft;
The most important security concern for them is, and always
has been, financial security.

When they say that security is their number one priority
*that* is what they mean.

> -----Original Message-----
> From: full-disclosure-admin@...ts.netsys.com 
> [mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of 
> Georgi Guninski
> Sent: Monday, 3 November 2003 9:44 a.m.
> To: Valdis.Kletnieks@...edu
> Cc: ksmith@...rtwelltechnology.com; full-disclosure@...ts.netsys.com
> Subject: Re: [Full-Disclosure] Microsoft plans tighter 
> security measures in Windows XP SP2
> 
> 
> On Sat, 01 Nov 2003 13:27:36 -0500
> Valdis.Kletnieks@...edu wrote:
> 
> > 1) Actually fix the software. Total rewrite, $200M.
> > 2) Bribe all the major reporters of bugs. $20M.
> > 
> > Which of these sounds like a better deal for Microsoft? ;)
> > 
> 
> What about taking counter measures against the bribery :)
> Have you thought about supporting Liu by buying his shareware?
> Liu disclosed about 13 bugs in exploder on one day, it would 
> be a pitty if he gets bribed.
> Check http://www.safecenter.net/UMBRELLAWEBV4/ie_unpatched/index.html
> 
> georgi
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
> 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ