lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1093110147.2367.8.camel@mesquite.yi.org>
From: michael at puffin.tamucc.edu (michael williamson)
Subject: The 'good worm' from HP

> Except that the scenario you describe isn't near complete.  What will happen 
> is either it will get attacked by a benign worm (possibly breaking something) 
> or a malicious worm (definitely breaking something) only a short while later.
> Which would you prefer then ?

I'd prefer to not have to deal with systems built on house cards, but
sometimes that's just not avoidable nor realistic.   I can't deal with
too much downtime either. 

> I think it is _your_ responsibility to shield your box from the internet

the box _is_ fairly well shielded. 

> if it is that fickle and that important to you.  

I'm really wanting phase this P.O.S. out, but I will mention this sort
of crap is not that uncommon of "turnkey solutions" in the windows
world. 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ