lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
From: root at transientimages.com (Oliver Raymond)
Subject: Support the Sasser-author fund started

I am no more likely to support a German committing terroristic 
acts on electronic infrastructure than I am a <pick_a_nationality> 
committing terroristic acts to real world infrastructure.

Availablity?
Patches for the previous Slammer, Blaster and Sasser worms have 
all been available for 14 days or more from Microsoft. Bad 
management practices or poor administration practices are to blame.

Management!
I overheard the following in a senior management meeting at a site 
I consult at: [20 April] : "No. Even though Microsoft say it's 
critical, it's not. We don't think its critical, and don't need to 
apply that patch.". The patches in question were MS04-11,12,14. 

Guess who's company got taken offline for a day?

Just my 'angry 2c' today.

Oliver

---------- Original Message ----------------------------------
From: <support-sasser@...hmail.com>
Date:  Wed, 12 May 2004 12:55:29 -0700

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At the moment the Author of SASSER, Sven Jaschan is free again. 
Don't
let him be a victim of the mistakes microsoft makes. Microsoft is 
still
working on a new process, we want to give Mr. Jaschan some money 
to at
least hire a lawyer to stand against the troll called Microsoft!
At http://support-sasser.homepage.dk you can support this project 
using
PayPal.
We'll wait for a few weeks and then use the money the way money is 
meant
to be used.
Let's all make sure that microsoft can't blame engineers and worm-
authors
for using these so-called "Microsoft Features" also known as bugs!
After all, SASSER was intended as a harmless wake-up call to the 
world.
Imagine what could happen if this had been done by criminals with 
no
respect for the public. Medical systems could be open for 
tampering,
harbor control systems could cause massive oil spills by 
terrorists and
so on. Sven did the right thing by making this alarm call. When 
will
people realise that microsofts base products are not fit to be 
subjected
to the hostile environment that the internet is these days?

PLEASE HELP US SUPPORT THE CAUSE! THIS INSANE MICROSOFT MANIA MUST 
END!

Cheers,
The support sasser team.
http://support-sasser.homepage.dk
support-sasser@...hmail.com
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at 
https://www.hushtools.com/verify
Version: Hush 2.4

wkYEARECAAYFAkCigVQACgkQmCuz7F30nzPhGgCeOqsvJK8VdA+WCsRHDiRbzQg76Bg
A
n1862ImdimreEPw7xHEAyy3Xl08h
=2V2K
-----END PGP SIGNATURE-----




Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2

Free, ultra-private instant messaging with Hush Messenger
https://www.hushmail.com/services.php?subloc=messenger&l=434

Promote security and make money with the Hushmail Affiliate 
Program: 
https://www.hushmail.com/about.php?subloc=affiliate&l=427

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

 


 
                   


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ