lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <OF0AA0E4EF.580D69E8-ON48256E84.001BE112@int.csc.com.au>
From: tcleary2 at csc.com.au (tcleary2@....com.au)
Subject: AW: no more public exploits

Cael Abal said:

>Realistically,the lack of a widespread published exploit means an 
>attack on any given machine is less likely.  An admin who chooses 
>to ignore these probabilities isn't looking at their job with the right 
perspective.

You missed the "IMHO".

In the Military your generalisation is probably not a self evident truth.

To quote another posters sig. "Knowing what you don't know is more 
important
than knowing what you know." and I would add that that's because what you
do know you can try to deal with.

Enough of the philosophy class.

Regards,

tom.
----------------------------------------------------------------------------------------
Tom Cleary - Security Architect

"In IT, acceptable solutions depend upon humans - Computers don't 
negotiate."
----------------------------------------------------------------------------------------
This is a PRIVATE message. If you are not the intended recipient, please 
delete without copying and kindly advise us by e-mail of the mistake in 
delivery. NOTE: Regardless of content, this e-mail shall not operate to 
bind CSC to any order or other contract unless pursuant to explicit 
written agreement or government initiative expressly permitting the use of 
e-mail for such purpose.
----------------------------------------------------------------------------------------


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ