lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4F5C3F52.60907@systeminplace.net>
Date: Sat, 10 Mar 2012 23:59:46 -0600
From: William Pitcock <nenolod@...teminplace.net>
To: Valdis.Kletnieks@...edu
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: The Mystery of the Duqu Framework

On 3/10/2012 10:04 PM, Valdis.Kletnieks@...edu wrote:
> On Sat, 10 Mar 2012 14:16:26 CST, William Pitcock said:
>    
>> If it looks like COM, smells like COM, and acts like COM, then it's
>> probably COM.  It certainly isn't "some new programming language" like
>> Kaspersky says.  That's just the dumbest thing I've heard this year.
>>      
> So what you're saying here is that there's a lot of people accepting
> security advice and/or software from professionals who wouldn't recognize
> a COM object if it came up and bit them on the butt...
>
>    
Either that or it's intentional misinformation.  Whichever is worse is 
for the users of Kaspersky products to decide, I suppose.

William

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ