Text 5996, 247 rader
Skriven 2005-07-14 00:45:34 av Geo (1:379/45)
Kommentar till text 5981 av Rich (1:379/45)
Ärende: Re: Unleash Sasser worm - infect 1 million - get 30 hours community ser
===============================================================================
From: "Geo" <georger@nls.net>
This is a multi-part message in MIME format.
------=_NextPart_000_0148_01C5880D.580D34A0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Microsoft doesn't promote malware, they do however use lots of = irresponsible
self-serving pr.
Stuff like this line of bullshit then taking 188 days to patch a remote = root
anonymous exploit =
http://www.microsoft.com/presspass/Features/2001/Oct01/10-03securityqa.ms=
px
Geo.
"Rich" <@> wrote in message news:42d5457f@w3.nls.net...
Give me example of a Microsoft pr, say a page on www.microsoft.com, =
that provides the information needed for someone to create malware like = eeye
does.
By interesting I mean intelectually interesting. As for =
understanding, I think you confuse disagreement with and understanding = of.
It's a common flaw.
Rich
"Geo" <georger@nls.net> wrote in message =
news:42d51209$2@w3.nls.net...
I don't have a problem with their self-serving irresponsible pr any =
more than I do with microsofts irresponsible self-serving pr, that's a = hangup
that seems to be unique to you.
As for interesting, you appear to be a programmer not a hacker so =
why would you find anything to do with hacking interesting? You've = proven
several times that you don't even understand the hacker mindset.
Geo.
"Rich" <@> wrote in message news:42d4bd97@w3.nls.net...
You clearly buy into their self-serving irresponsible pr more =
than I do. I was a bit surprised when you stated a few messages back = that
they steal the ideas for the vulnerabilities from others and take = credit for
themselves. While they do not do much interesting, I had at = least though it
was their own. you actually lowered my opinion of them = even further.
Rich
"Geo" <georger@nls.net> wrote in message =
news:42d47f65$1@w3.nls.net...
Oh give me a break, these guys single handedly destroyed NT's =
security reputation.
Hell they were the reason for the "information anarchy" program =
to silence the security lists.
Geo.=20
"Rich" <@> wrote in message news:42d36801$1@w3.nls.net...
An extraordinary one. I suspect there isn't a significant =
difference between what they could do and what you could do taking = advantage
of published information. The only thing remarkable about = these folks is
that they publish press releases putting the public at = risk to promote
themselves for financial gain.
Rich
"John Beckett" <FirstnameSurname@compuserve.com.omit> wrote =
in message news:rcl6d1hegtubg74l7fc4t8e0haom1kvkrc@4ax.com...
"Rich" <@> wrote in message news:<42d3503e$1@w3.nls.net>:
> You should remember that this is true only in george's =
imagination.
Perhaps the 95% is an exaggeration. But there have been many =
examples (I
think starting with the IIS debacles) that show that eeye =
could have owned
an extremely large number of computers if Microsoft had not =
changed its
"release when it's good enough" attitude.
John
------=_NextPart_000_0148_01C5880D.580D34A0
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2800.1505" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><FONT face=3DArial size=3D2>Microsoft doesn't promote malware, they =
do however=20
use lots of irresponsible self-serving pr.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Stuff like this line of bullshit then =
taking 188=20
days to patch a remote root anonymous exploit <A=20
href=3D"http://www.microsoft.com/presspass/Features/2001/Oct01/10-03secur=
ityqa.mspx">http://www.microsoft.com/presspass/Features/2001/Oct01/10-03s=
ecurityqa.mspx</A></FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Geo.</FONT></DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; =
BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV>"Rich" <@> wrote in message <A=20
=
href=3D"news:42d5457f@w3.nls.net">news:42d5457f@w3.nls.net</A>...</DIV>
<DIV><FONT face=3DArial size=3D2> Give me example of =
a Microsoft=20
pr, say a page on <A =
href=3D"http://www.microsoft.com">www.microsoft.com</A>,=20
that provides the information needed for someone to create malware =
like eeye=20
does.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2> By interesting I mean =
intelectually=20
interesting. As for understanding, I think you confuse =
disagreement with=20
and understanding of. It's a common flaw.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Rich</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; =
BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV>"Geo" <<A =
href=3D"mailto:georger@nls.net">georger@nls.net</A>>=20
wrote in message <A=20
=
href=3D"news:42d51209$2@w3.nls.net">news:42d51209$2@w3.nls.net</A>...</DI=
V>
<DIV><FONT face=3DArial size=3D2>I don't have a problem with their =
self-serving=20
irresponsible pr any more than I do with microsofts irresponsible=20
self-serving pr, that's a hangup that seems to be unique to=20
you.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>As for interesting, you appear to =
be a=20
programmer not a hacker so why would you find anything to do with =
hacking=20
interesting? You've proven several times that you don't even =
understand the=20
hacker mindset.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Geo.</FONT></DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; =
BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV>"Rich" <@> wrote in message <A=20
=
href=3D"news:42d4bd97@w3.nls.net">news:42d4bd97@w3.nls.net</A>...</DIV>
<DIV><FONT face=3DArial size=3D2> You clearly buy =
into their=20
self-serving irresponsible pr more than I do. I was a bit =
surprised=20
when you stated a few messages back that they steal the ideas for =
the=20
vulnerabilities from others and take credit for themselves. =
While=20
they do not do much interesting, I had at least though it was =
their=20
own. you actually lowered my opinion of them even=20
further.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Rich</FONT></DIV>
<DIV> </DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; =
BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV>"Geo" <<A =
href=3D"mailto:georger@nls.net">georger@nls.net</A>>=20
wrote in message <A=20
=
href=3D"news:42d47f65$1@w3.nls.net">news:42d47f65$1@w3.nls.net</A>...</DI=
V>
<DIV><FONT face=3DArial size=3D2>Oh give me a break, these guys =
single=20
handedly destroyed NT's security reputation.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Hell they were the reason for =
the=20
"information anarchy" program to silence the security=20
lists.</FONT></DIV>
<DIV> </DIV>
<DIV><FONT face=3DArial size=3D2>Geo.</FONT> </DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: =
5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV>"Rich" <@> wrote in message <A=20
=
href=3D"news:42d36801$1@w3.nls.net">news:42d36801$1@w3.nls.net</A>...</DI=
V>
<DIV><FONT face=3DArial size=3D2> An extraordinary =
one. =20
I suspect there isn't a significant difference between what =
they could=20
do and what you could do taking advantage of published=20
information. The only thing remarkable about these folks =
is that=20
they publish press releases putting the public at risk to =
promote=20
themselves for financial gain.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Rich</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<BLOCKQUOTE=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: =
5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV>"John Beckett" <<A=20
=
href=3D"mailto:FirstnameSurname@compuserve.com.omit">FirstnameSurname@com=
puserve.com.omit</A>>=20
wrote in message <A=20
=
href=3D"news:rcl6d1hegtubg74l7fc4t8e0haom1kvkrc@4ax.com">news:rcl6d1hegtu=
bg74l7fc4t8e0haom1kvkrc@4ax.com</A>...</DIV>"Rich"=20
<@> wrote in message <A=20
=
href=3D"news:<42d3503e$1@w3.nls.net">news:<42d3503e$1@w3.nls.net</A>&g=
t;:<BR>> =20
You should remember that this is true only in george's=20
imagination.<BR><BR>Perhaps the 95% is an exaggeration. But =
there=20
have been many examples (I<BR>think starting with the IIS =
debacles)=20
that show that eeye could have owned<BR>an extremely large =
number of=20
computers if Microsoft had not changed its<BR>"release when =
it's=20
good enough"=20
=
attitude.<BR><BR>John<BR></BLOCKQUOTE></BLOCKQUOTE></BLOCKQUOTE></BLOCKQU=
OTE></BLOCKQUOTE></BLOCKQUOTE></BODY></HTML>
------=_NextPart_000_0148_01C5880D.580D34A0--
--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
|