[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-Disclosure] Web sites compromised by IIS attack



hi,

> It also is not a list for the benefit exclusively of people who are 
> fortunate enough to have simple security problems. The security issues 
> surrounding the question "how do I keep my home computer safe from 
> attack?" are trivial compared to those surrounding the question "how do 
> I keep the 200,000 computing devices worldwide within my organization 
> from being owned and then attacking each other?"

> Anyone with a truly complex security problem knows that it is hopeless 
> to ever really control many computers in the presence of many people. 
> You have no choice in a complex situation but to let things happen that 
> you think are beneficial to you (the vendor installing patches, in this 
> discussion) and find a way, after the fact, or periodically, to confirm 
> that the end result was in fact beneficial to you. 

Jason, i have to disagree with you. Security is not a technology,
security is a way of thinking (regards goes here to Schneier). And
when you start thinking in right way, then there is no difference
whatsoever whether the subject is home computer or large production
installation.

And i have seen, in reality, uncounted time, in respected companies,
that after vendor specialist comes and installs updates/patches, system is
screwed. Yes, you have contracts, but company's image and face in
front of customers is everything. So at least here, in security list,
it is wrong to propagate the way that just sit and wait and let the
vendor came and fix all.

willem

- even the best hackers will tell you that the game is a mental one.
-- 
___________________________________________________________
Sign-up for Ads Free at Mail.com
http://promo.mail.com/adsfreejump.htm

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html