lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040823212242.GC88339@netpublishing.com>
From: ggilliss at netpublishing.com (Gregory A. Gilliss)
Subject: Re-write with  security in mind all ops.

As someone who's been around for a few years, replies like this cause me
to sit up and ask "who let you on?"

People, believe it or not, before there was Dubya, before there were mad
rag heads disgracing one of the world's most civilized religions, before 
Sir Tim Berners-Lee <Gack> 'invented' the Web, there was a network of people
who shared information pretty freely and who, occasionally, would shell
out of an app and gain root somewhere. All in all, it wasn't bad at all.

Now we have "no unencrypted links" which is a nice way of saying "I bet
I can keep you off my swings". Funny how someone with a citigroup.com
email is making such bold security claims. Two words - Vladimir Levin.

In case you haven't figured it out yet from the caustic replies you've
received, around here the only credibility is clue. Abbreviations and 
boasting count for diddly.

G

On or about 2004.08.23 13:10:12 +0000, Clairmont, Jan M (jan.m.clairmont@...igroup.com) said:

> Having worked on NATO security specs and other highly secured
> networks.  It wouldn't be that hard, just no unencrypted traffic
> and no unencrypted interprocess communication. Spammers and bozos would have to work a lot harder for their fun.  
> 
> You can laugh all you want happy boy, but that is what is coming
> next. Get used to it.

-- 
Gregory A. Gilliss, CISSP                              E-mail: greg@...liss.com
Computer Security                             WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ