lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <87ekpo6nym.fsf@it029205.massey.ac.nz>
From: j.riden at massey.ac.nz (James Riden)
Subject: Support the Sasser-author fund started

"Oliver Raymond" <root@...nsientimages.com> writes:

> I am no more likely to support a German committing terroristic 
> acts on electronic infrastructure than I am a <pick_a_nationality> 
> committing terroristic acts to real world infrastructure.
>
> Availablity?
> Patches for the previous Slammer, Blaster and Sasser worms have 
> all been available for 14 days or more from Microsoft. Bad 
> management practices or poor administration practices are to blame.

14 days is fine if the patch works straight out-of-the-box. I'd
usually expect to deploy within around 10 days with a clean patch.

MS04-011 did NOT work fine; in particular it's causing us BSODs and
USB issues on a large number of hosts.

-- 
James Riden / j.riden@...sey.ac.nz / Systems Security Engineer
Information Technology Services, Massey University, NZ.
GPG public key available at: http://www.massey.ac.nz/~jriden/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ