lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <BANLkTi=YZB6hczJZEoipL6nv+nWF7zEWyw@mail.gmail.com>
Date: Fri, 29 Apr 2011 16:44:08 +0100
From: Benji <me@...ji.com>
To: Valdis.Kletnieks@...edu
Cc: Full Disclosure <full-disclosure@...ts.grok.org.uk>,
Tõnu Samuel <tonu@....ee>
Subject: Re: Barracuda backdoor
The real question is why is this guy using a fish to protect his network? is
it dead?
On Fri, Apr 29, 2011 at 4:38 PM, <Valdis.Kletnieks@...edu> wrote:
> On Fri, 29 Apr 2011 08:13:31 PDT, bk said:
>
> (Agreeing with most of what you said)
>
> > Anyone with a reasonable level of technical competence who has ever
> > implemented one of these appliances from any vendor in this space would
> > already be well aware of these facts.
>
> On the other hand, remember that Barracuda gear is targeted at those
> sites who *don't* roll their own...
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists