[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20100702113447.GA23835@bundy.vistech.net>
Date: Fri, 2 Jul 2010 07:34:47 -0400
From: "Champ Clark III [Softwink]" <champ@...twink.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: Should nmap cause a DoS on cisco routers?
On Fri, Jul 02, 2010 at 01:31:07PM +0200, Christian Sciberras wrote:
> > I've noticed that even if the orginazation has a
> very capable security staff
> > Again, it's a environment that's 'magical' and not well
> understood so once it's 'working', don't touch anything!
>
> If you call that "capable security staff" I'd expect you to call Windows a
> "unix-like" os...
Hah. I probably didn't make my point properly. They _have_
a capable security staff that was instructed by "upper management"
_not_ to touch the VoIP network. They _wanted_ to, but where
instructed to 'stay away!'. Sad state.
--
Champ Clark III | Softwink, Inc | 800-538-9357 x 101
http://www.softwink.com
GPG Key ID: 58A2A58F
Key fingerprint = 7734 2A1C 007D 581E BDF7 6AD5 0F1F 655F 58A2 A58F
If it wasn't for C, we'd be using BASI, PASAL and OBOL.
Content of type "application/pgp-signature" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists