lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed Nov 23 13:52:38 2005 From: anonymous.squirrel at gmail.com (Anonymous Squirrel) Subject: SANS Top 20: Mac OS X? I see SANS has put the Mac OS X in it's "Top 20" list of vulnerabilities. Not parts of the OS, and not misconfigurations, but ALL of the Mac OS X. Is that OS really a "vulnerability" of such magnitude that it deserves a "Top 20" listing? I'm puzzled, SANS remediation is merely patch, turn on the firewall, and configure per published guidelines. That fits for _any_ OS. It just doesn't make sense that the _entire_ OS is a "Top 20" yet the remediation is so basic. Does SANS know something we don't? Is the mere existence of OS X in a network so bad that it deserves to be tagged as a "Top 20"? -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20051123/4f6ad8ef/attachment.html
Powered by blists - more mailing lists