[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20050410202810.46720693@lists.grok.org.uk>
Date: Sun Apr 10 21:28:25 2005
From: purdy at tecman.com (Curt Purdy)
Subject: How to Report a Security
VulnerabilitytoMicrosoft
Jason Coombs wrote:
<snip?
> Business depends on secrets for viability.
Not necessarily Jaon. We operate on an open basis here (save for our
customer list of course). I have found that in business, viability relies
more on business-plan and execution than anything else.
> MICROSOFT: STOP THE WAR! NO MORE SECRETS!
Unfortunatly those words are falling on deaf ears, which is why I am
becoming a Novell evangelist. They are giving a lot of their stuff to the
open-source community like the code for SuSE Yast.
Curt Purdy CISSP, GSEC, CNE, MCSE+I, CCDA
Senior Security Engineer
Continental Technologies, Inc.
cpurdy@...cti.com
-----------------------------
If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- former White House cybersecurity czar Richard Clarke
Powered by blists - more mailing lists