Text 6000, 278 rader
Skriven 2005-07-13 22:01:00 av Rich (1:379/45)
Kommentar till text 5996 av Geo (1:379/45)
Ärende: Re: Unleash Sasser worm - infect 1 million - get 30 hours community ser
===============================================================================
From: "Rich" <@>
This is a multi-part message in MIME format.
------=_NextPart_000_015B_01C587F6.5B7A8D70
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
So please give an example of irresponsible pr from Microsoft. The 5 =
year old q&a to which you linked is not an example. Since you are = trying to
compare this to the irresponsible self-serving pr from eeye, = you should find
a comparable example such as providing the instructions = necessary to create
malware like that eeye provides.
Rich
"Geo" <georger@nls.net> wrote in message news:42d5ed41@w3.nls.net...
Microsoft doesn't promote malware, they do however use lots of =
irresponsible self-serving pr.
Stuff like this line of bullshit then taking 188 days to patch a =
remote root anonymous exploit =
http://www.microsoft.com/presspass/Features/2001/Oct01/10-03securityqa.ms=
px
Geo.
"Rich" <@> wrote in message news:42d5457f@w3.nls.net...
Give me example of a Microsoft pr, say a page on =
www.microsoft.com, that provides the information needed for someone to = create
malware like eeye does.
By interesting I mean intelectually interesting. As for =
understanding, I think you confuse disagreement with and understanding = of.
It's a common flaw.
Rich
"Geo" <georger@nls.net> wrote in message =
news:42d51209$2@w3.nls.net...
I don't have a problem with their self-serving irresponsible pr =
any more than I do with microsofts irresponsible self-serving pr, that's = a
hangup that seems to be unique to you.
As for interesting, you appear to be a programmer not a hacker so =
why would you find anything to do with hacking interesting? You've = proven
several times that you don't even understand the hacker mindset.
Geo.
"Rich" <@> wrote in message news:42d4bd97@w3.nls.net...
You clearly buy into their self-serving irresponsible pr more =
than I do. I was a bit surprised when you stated a few messages back = that
they steal the ideas for the vulnerabilities from others and take = credit for
themselves. While they do not do much interesting, I had at = least though it
was their own. you actually lowered my opinion of them = even further.
Rich
"Geo" <georger@nls.net> wrote in message =
news:42d47f65$1@w3.nls.net...
Oh give me a break, these guys single handedly destroyed NT's =
security reputation.
Hell they were the reason for the "information anarchy" =
program to silence the security lists.
Geo.=20
"Rich" <@> wrote in message news:42d36801$1@w3.nls.net...
An extraordinary one. I suspect there isn't a =
significant difference between what they could do and what you could do =
taking advantage of published information. The only thing remarkable = about
these folks is that they publish press releases putting the public = at risk to
promote themselves for financial gain.
Rich
"John Beckett" <FirstnameSurname@compuserve.com.omit> =
wrote in message news:rcl6d1hegtubg74l7fc4t8e0haom1kvkrc@4ax.com...
"Rich" <@> wrote in message news:<42d3503e$1@w3.nls.net>:
> You should remember that this is true only in =
george's imagination.
Perhaps the 95% is an exaggeration. But there have been =
many examples (I
think starting with the IIS debacles) that show that eeye =
could have owned
an extremely large number of computers if Microsoft had =
not changed its
"release when it's good enough" attitude.
John
------=_NextPart_000_015B_01C587F6.5B7A8D70
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2900.2668" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><FONT face=3DArial size=3D2> So please give an example =
of=20
irresponsible pr from Microsoft. The 5 year old q&a to which = you=20
linked is not an example. Since you are trying to compare this to =
the=20
irresponsible self-serving pr from eeye, you should find a comparable =
example=20
such as providing the instructions necessary to create malware like that =
eeye=20
provides.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Rich</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; =
BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV>"Geo" <<A =
href=3D"mailto:georger@nls.net">georger@nls.net</A>> wrote=20
in message <A=20
=
href=3D"news:42d5ed41@w3.nls.net">news:42d5ed41@w3.nls.net</A>...</DIV>
<DIV><FONT face=3DArial size=3D2>Microsoft doesn't promote malware, =
they do=20
however use lots of irresponsible self-serving pr.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Stuff like this line of bullshit then =
taking 188=20
days to patch a remote root anonymous exploit <A=20
=
href=3D"http://www.microsoft.com/presspass/Features/2001/Oct01/10-03secur=
ityqa.mspx">http://www.microsoft.com/presspass/Features/2001/Oct01/10-03s=
ecurityqa.mspx</A></FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Geo.</FONT></DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; =
BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV>"Rich" <@> wrote in message <A=20
=
href=3D"news:42d5457f@w3.nls.net">news:42d5457f@w3.nls.net</A>...</DIV>
<DIV><FONT face=3DArial size=3D2> Give me example of=20
a Microsoft pr, say a page on <A=20
href=3D"http://www.microsoft.com">www.microsoft.com</A>, that =
provides the=20
information needed for someone to create malware like eeye=20
does.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2> By interesting I mean=20
intelectually interesting. As for understanding, I think you =
confuse=20
disagreement with and understanding of. It's a common=20
flaw.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Rich</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; =
BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV>"Geo" <<A =
href=3D"mailto:georger@nls.net">georger@nls.net</A>>=20
wrote in message <A=20
=
href=3D"news:42d51209$2@w3.nls.net">news:42d51209$2@w3.nls.net</A>...</DI=
V>
<DIV><FONT face=3DArial size=3D2>I don't have a problem with their =
self-serving irresponsible pr any more than I do with microsofts=20
irresponsible self-serving pr, that's a hangup that seems to be =
unique to=20
you.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>As for interesting, you appear to =
be a=20
programmer not a hacker so why would you find anything to do with =
hacking=20
interesting? You've proven several times that you don't even =
understand=20
the hacker mindset.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Geo.</FONT></DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; =
BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV>"Rich" <@> wrote in message <A=20
=
href=3D"news:42d4bd97@w3.nls.net">news:42d4bd97@w3.nls.net</A>...</DIV>
<DIV><FONT face=3DArial size=3D2> You clearly buy=20
into their self-serving irresponsible pr more than I =
do. I=20
was a bit surprised when you stated a few messages back that =
they steal=20
the ideas for the vulnerabilities from others and take credit =
for=20
themselves. While they do not do much interesting, I had =
at least=20
though it was their own. you actually lowered my opinion =
of them=20
even further.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Rich</FONT></DIV>
<DIV> </DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: =
5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV>"Geo" <<A=20
href=3D"mailto:georger@nls.net">georger@nls.net</A>> wrote =
in message=20
<A=20
=
href=3D"news:42d47f65$1@w3.nls.net">news:42d47f65$1@w3.nls.net</A>...</DI=
V>
<DIV><FONT face=3DArial size=3D2>Oh give me a break, these =
guys single=20
handedly destroyed NT's security reputation.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Hell they were the reason for =
the=20
"information anarchy" program to silence the security=20
lists.</FONT></DIV>
<DIV> </DIV>
<DIV><FONT face=3DArial size=3D2>Geo.</FONT> </DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: =
5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV>"Rich" <@> wrote in message <A=20
=
href=3D"news:42d36801$1@w3.nls.net">news:42d36801$1@w3.nls.net</A>...</DI=
V>
<DIV><FONT face=3DArial size=3D2> An =
extraordinary=20
one. I suspect there isn't a significant difference =
between=20
what they could do and what you could do taking =
advantage of=20
published information. The only thing remarkable about =
these=20
folks is that they publish press releases putting the public =
at risk=20
to promote themselves for financial gain.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Rich</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<BLOCKQUOTE=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: =
5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV>"John Beckett" <<A=20
=
href=3D"mailto:FirstnameSurname@compuserve.com.omit">FirstnameSurname@com=
puserve.com.omit</A>>=20
wrote in message <A=20
=
href=3D"news:rcl6d1hegtubg74l7fc4t8e0haom1kvkrc@4ax.com">news:rcl6d1hegtu=
bg74l7fc4t8e0haom1kvkrc@4ax.com</A>...</DIV>"Rich"=20
<@> wrote in message <A=20
=
href=3D"news:<42d3503e$1@w3.nls.net">news:<42d3503e$1@w3.nls.net</A>&g=
t;:<BR>> =20
You should remember that this is true only in george's=20
imagination.<BR><BR>Perhaps the 95% is an exaggeration. =
But there=20
have been many examples (I<BR>think starting with the IIS=20
debacles) that show that eeye could have owned<BR>an =
extremely=20
large number of computers if Microsoft had not changed=20
its<BR>"release when it's good enough"=20
=
attitude.<BR><BR>John<BR></BLOCKQUOTE></BLOCKQUOTE></BLOCKQUOTE></BLOCKQU=
OTE></BLOCKQUOTE></BLOCKQUOTE></BLOCKQUOTE></BODY></HTML>
------=_NextPart_000_015B_01C587F6.5B7A8D70--
--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
|