lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1083093842.4651.20.camel@Stargate.dlcty01.va.comcast.net>
From: nodialtone at comcast.net (Byron Copeland)
Subject: AW: no more public exploits

On Tue, 2004-04-27 at 14:06, Baum, Stefan wrote:
> IMHO, no sysadmin taking his work seriously, will wait patching the systems
> until an exploit is available throughout the internet.
> 

That may be the case with a handful.  But MOST sysadmins that do take
their work seriously DON'T fire for effect 6 rounds on production
servers every time a patch bundle is released immediately.  Sometimes
the testing/verification window overlaps with exploits being publicized.

> Stefan
> (I AM A SYSADMIN)
> 

Oh, O.K.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040427/8a67c50f/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ