lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <1c3fa2270601041033o52efe457v1796404098341aa8@mail.gmail.com>
Date: Wed Jan  4 18:33:19 2006
From: yahooinsider at gmail.com (Joe Average)
Subject: Unofficial Microsoft patches help hackers,
	not security

It has been said on C|NET/SecurityFocus and other places that "experts" are
telling people to use unofficial patches, and to make things worse the
"experts" are releasing patches. You've got to wonder who these "experts"
are. By releasing unofficial patches, all you're doing is aiding the
hackers, it doesn't help the situation one little bit for the overall
picture of protecting Microsoft consumers. The majority of consumers aren't
getting your unofficial patches, but you can be sure the hackers are using
them, and using them to their advantage. If these unofficial patches weren't
being released and experts weren't telling people to use them, I wouldn't be
calling for Microsoft to bring forward the release date for the patch before
the end of the week. It's the "experts" here who have now made the situation
ten times worse, by giving their very bad advice and releasing their own
unofficial patches.

Well done the experts,

You deserve the title after all

More some more:
http://n3td3v.blogspot.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060104/9255dd6a/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ