lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
From: kenng at (Ng, Kenneth (US))
Subject: no more public exploits

Sadly, for the most part, no.  But, don't just blame the sysadmins.  Also
blame the business owners who demand to see a person being electricuted
before they believe a wire is unsafe.  And blame the vendors for bundling
stealth updates along with their security fixes.  Stealth updates that
"accidentally" break competitors products.  There is plenty of blame to go

-----Original Message-----
[]On Behalf Of Duquette,
Sent: Tuesday, April 27, 2004 1:52 PM
To: Yabby;
Subject: RE: [Full-Disclosure] no more public exploits

That is a terrible policy to follow.  If the vulnerability is real enough
for the vendor to publish a patch, then sysadmins should patch their
systems.  Haven't all the recent worms taught people anything?

The information in this email is confidential and may be legally privileged.
It is intended solely for the addressee. Access to this email by anyone else
is unauthorized. 

If you are not the intended recipient, any disclosure, copying, distribution
or any action taken or omitted to be taken in reliance on it, is prohibited
and may be unlawful. When addressed to our clients any opinions or advice
contained in this email are subject to the terms and conditions expressed in
the governing KPMG client engagement letter.         

Powered by blists - more mailing lists