lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: j at pureftpd.org (Jedi/Sector One)
Subject: no more public exploits and general PoC gui de lines

On Tue, Apr 27, 2004 at 04:05:13PM -0400, kquest@...layer.com wrote:
> Are you saying that unless there's an exploit
> that gives you access to the target machine
> your company wouldn't patch

  It's a matter of priority.
  
  For most PHBs, proactive security must be very low priority because
keeping systems up to date doesn't bring any money to the company.  

> (even if there's
> an exploit that crashes the target)? 

  A DoS will usually not be enough to get some press. Unless most PHBs have
read on ZDNet and Yahoo that "a critical flaw has been found in xxx and is
actively being exploited by black hats", they will consider patching as a
waste of time. They may even yell at you if patching systems implies a
small downtime, even if it'ss a critical patch, as long as it has not been
covered by for-PHBs press.

  Best regards,

-- 
 __  /*-    Frank DENIS (Jedi/Sector One) <j at 42-Networks.Com>    -*\  __
 \ '/    <a href="http://www.PureFTPd.Org/"> Secure FTP Server </a>    \' /
  \/  <a href="http://www.Jedi.Claranet.Fr/"> Misc. free software </a>  \/


Powered by blists - more mailing lists