lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <444E7489.7060801@csuohio.edu>
Date: Tue Apr 25 20:13:38 2006
From: michael.holstein at csuohio.edu (Michael Holstein)
Subject: What is wrong with schools these days?

> You know, having made a few NTexploit lists in the past, I wanted to
> make the point the M$ was less secure.  Unfortunately the facts were
> against me.

You do realize that in this case the "facts" have more to do with how 
things are reported by the two companies.

Case in point : a typical IIS security advisory will read ...
	"MS06-xxx" Vulnerability in IIS

whereas ones for Apache will be much more specific ...
	"CVE-xxx" fixed tiny little bug in some script
	"CVE-xxx" fixed different tiny little bug in other script

I agree though that $anyOS is dangerous in the case of 'clue <= 0'.

/mike.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ