lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <LEEBJDNLINGKPEIBJAEFOEIBCAAA.dan.bolton@crenlo.com>
From: dan.bolton at crenlo.com (Dan Bolton)
Subject: MyDoom bios infection


-----Original Message-----
>
>Sorry Juari,
>
>> It appears that what I called sooner a BIOS BackDoor is more of a
>> Microsoft Windows exploit.
>
>.. but you've lost all credibility.

While I applaud Juari's efforts, there is a BIG difference between a Windows
exploit and alteration of the system BIOS (not that I doubt the latter is
possible, just a big jump).  In order for one to maintain credibility of
information, statements of discoveries must be made carefully.  What MAY
have been an otherwise correct report is now tarnished with questionability.
I can't fault anyone that doesn't take it as fact.


----- Original Message -----
>
> As a reminder to the various persons which contacted me privately via
> email and to whom I shared more information PLEASE keep it private.
>
> 					Juari Bosnikovich
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>

Juari, which part of "Full-Disclosure" don't you understand?




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ