Text 6077, 220 rader
Skriven 2005-07-15 13:45:04 av Rich (1:379/45)
Kommentar till text 6073 av Geo (1:379/45)
Ärende: Re: eeye's irresponsible self-serving behavior
======================================================
From: "Rich" <@>
This is a multi-part message in MIME format.
------=_NextPart_000_00B7_01C58943.68763A80
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Randy.
Rich
"Geo" <georger@nls.net> wrote in message news:42d81cce@w3.nls.net...
heh, who's confused?
Geo.
"Rich" <@> wrote in message news:42d73362@w3.nls.net...
You are confused. SO does not require someone to provide =
instructions on how to commit a crime as eeye does in provding = instructions
on how to malware.
Rich
. =20
"Randy" <dev@null.org> wrote in message =
news:42d72baa@w3.nls.net...
Why do you think Sarbanes-Oxley was passed?=20
"Geo" <georger@nls.net> wrote in message =
news:42d70ed8@w3.nls.net...
the guys at eeye believe making exploits public knowledge lowers =
the value thus the cost that security companies can charge customers for = that
knowledge.
Geo.
"Rich" <@> wrote in message news:42d6d8ee$1@w3.nls.net...
No. I consider this irresponsible. For all we know folks =
at eeye do too but greed trumps responsibility.
Rich
"Geo" <georger@nls.net> wrote in message =
news:42d6befe@w3.nls.net...
So you consider this responsible behavior?
Geo.
"Rich" <@> wrote in message news:42d6a0c1$1@w3.nls.net...
Where do you get this taboo nonsense? Look at =
http://www.eeye.com/html/research/advisories/AD20040615A.html and =
http://www.eeye.com/html/research/advisories/AD20040615B.html. These = are
among the simplest but by far not the only. eeye appears to try to = provide
instructions to exploit in all of these. If you are going to be = in denial
about this behavior of theirs then no wonder you are in denial = about the
damage they cause.
Rich
"Geo" <georger@nls.net> wrote in message =
news:42d696e9$1@w3.nls.net...
But instead he want's evidence that the exploits eeye =
has discovered over
the past year or so are dangerous, and since exploit =
code is now taboo that
becomes quite difficult to prove doesn't it?
Geo.
------=_NextPart_000_00B7_01C58943.68763A80
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2900.2668" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><FONT face=3DArial size=3D2> Randy.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Rich</FONT></DIV>
<DIV> </DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; =
BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV>"Geo" <<A =
href=3D"mailto:georger@nls.net">georger@nls.net</A>> wrote=20
in message <A=20
=
href=3D"news:42d81cce@w3.nls.net">news:42d81cce@w3.nls.net</A>...</DIV>
<DIV><FONT face=3DArial size=3D2>heh, who's confused?</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Geo.</FONT></DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; =
BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV>"Rich" <@> wrote in message <A=20
=
href=3D"news:42d73362@w3.nls.net">news:42d73362@w3.nls.net</A>...</DIV>
<DIV><FONT face=3DArial size=3D2> You are =
confused. SO does=20
not require someone to provide instructions on how to commit a crime =
as eeye=20
does in provding instructions on how to malware.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Rich</FONT></DIV>
<DIV><FONT face=3DArial size=3D2>. </FONT></DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; =
BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV>"Randy" <<A =
href=3D"mailto:dev@null.org">dev@null.org</A>> wrote=20
in message <A=20
=
href=3D"news:42d72baa@w3.nls.net">news:42d72baa@w3.nls.net</A>...</DIV>
<DIV><FONT size=3D2>Why do you think Sarbanes-Oxley was passed?=20
</FONT></DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; =
BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV>"Geo" <<A =
href=3D"mailto:georger@nls.net">georger@nls.net</A>>=20
wrote in message <A=20
=
href=3D"news:42d70ed8@w3.nls.net">news:42d70ed8@w3.nls.net</A>...</DIV>
<DIV><FONT face=3DArial size=3D2>the guys at eeye believe making =
exploits=20
public knowledge lowers the value thus the cost that security =
companies=20
can charge customers for that knowledge.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Geo.</FONT></DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: =
5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV>"Rich" <@> wrote in message <A=20
=
href=3D"news:42d6d8ee$1@w3.nls.net">news:42d6d8ee$1@w3.nls.net</A>...</DI=
V>
<DIV><FONT face=3DArial size=3D2> No. I =
consider this=20
irresponsible. For all we know folks at eeye do =
too but=20
greed trumps responsibility.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Rich</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: =
5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV>"Geo" <<A=20
href=3D"mailto:georger@nls.net">georger@nls.net</A>> =
wrote in=20
message <A=20
=
href=3D"news:42d6befe@w3.nls.net">news:42d6befe@w3.nls.net</A>...</DIV>
<DIV><FONT face=3DArial size=3D2>So you consider this =
responsible=20
behavior?</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Geo.</FONT></DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: =
5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV>"Rich" <@> wrote in message <A=20
=
href=3D"news:42d6a0c1$1@w3.nls.net">news:42d6a0c1$1@w3.nls.net</A>...</DI=
V>
<DIV><FONT face=3DArial size=3D2> Where do you =
get this=20
taboo nonsense? Look at <A=20
=
href=3D"http://www.eeye.com/html/research/advisories/AD20040615A.html">ht=
tp://www.eeye.com/html/research/advisories/AD20040615A.html</A>=20
and <A=20
=
href=3D"http://www.eeye.com/html/research/advisories/AD20040615B.html">ht=
tp://www.eeye.com/html/research/advisories/AD20040615B.html</A>. =20
These are among the simplest but by far not the =
only. eeye=20
appears to try to provide instructions to exploit in all =
of=20
these. If you are going to be in denial about this =
behavior=20
of theirs then no wonder you are in denial about the =
damage they=20
cause.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Rich</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<BLOCKQUOTE=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; =
MARGIN-LEFT: 5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV>"Geo" <<A=20
href=3D"mailto:georger@nls.net">georger@nls.net</A>> =
wrote in=20
message <A=20
=
href=3D"news:42d696e9$1@w3.nls.net">news:42d696e9$1@w3.nls.net</A>...</DI=
V><BR><BR>But=20
instead he want's evidence that the exploits eeye has =
discovered=20
over<BR>the past year or so are dangerous, and since =
exploit=20
code is now taboo that<BR>becomes quite difficult to =
prove=20
doesn't=20
=
it?<BR><BR><BR>Geo.<BR><BR></BLOCKQUOTE></BLOCKQUOTE></BLOCKQUOTE></BLOCK=
QUOTE></BLOCKQUOTE></BLOCKQUOTE></BLOCKQUOTE></BLOCKQUOTE></BODY></HTML>
------=_NextPart_000_00B7_01C58943.68763A80--
--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
|