lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <2f6cb7b40605172135v433cc432wb67b89267dd64cda@mail.gmail.com>
Date: Thu May 18 05:35:55 2006
From: nocfed at gmail.com (nocfed)
Subject: blue security folds

On 5/17/06, Peter Besenbruch <prb@...a.net> wrote:
> Mike Adams wrote:
> > I'm really disappointed.
> >
> > All this will do is give all the other scumbag spammers out there proof
> > that using these tactics will work, and they will be able to extort
> > anyone.
> >
> > Who will be next, Trend Micro? Fortinet? Symantec? SANS?
>
> If they actually do something effective against spam, then yes. Blue
> Security was effective in hitting spammers in the pocketbook. Therefore,
> they were targeted. More than that, the spammers began targeting broader
> swaths of the Internet, taking out Typepad, Livejournal, and Tucows. The
> attacker, a person whose handle is "Pharma Master," basically stated, if
> he couldn't spam, there would be no Internet. Given that botnets are so
> cheap, that was not an idle threat.
>
> Bill Gates, I would personally like to thank you for creating a monopoly
> operating system that is so easy to compromise. I'm sure Pharma Master
> thanks you as well, though he may never publicly express it. He really
> should consider a generous donation to the Bill and Melinda Gates
> foundation as a token of appreciation. Any Mafia boss worth his salt
> would do the same.
>
> --
> Hawaiian Astronomical Society: http://www.hawastsoc.org
> HAS Deepsky Atlas: http://www.hawastsoc.org/deepsky
>

And if the ISP's could get their act together then most of the botnets
would be no more.  This _IS_ something that can be controlled, to an
extent.  Many of the network administrators need a course in
Networking 101 which will greatly assist in tracking down the source
of attacks.  If botnets are required to use their own IP's then how
hard would it really be to track them down and disable them?
Disruption of the end users connection and a flag on their account
should clean them up, although not 100%.  So if you want someone to
blame, blame the ISP, blame the hosting service, and blame the end
user.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ