Text 5981, 215 rader
Skriven 2005-07-13 09:51:36 av Rich (1:379/45)
   Kommentar till text 5972 av Geo (1:379/45)
Ärende: Re: Unleash Sasser worm - infect 1 million - get 30 hours community ser
===============================================================================
From: "Rich" <@>
This is a multi-part message in MIME format.
------=_NextPart_000_00D3_01C58790.759B4E80
Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
   Give me example of a Microsoft pr, say a page on www.microsoft.com, =
that provides the information needed for someone to create malware like = eeye
does.
   By interesting I mean intelectually interesting.  As for =
understanding, I think you confuse disagreement with and understanding = of. 
It's a common flaw.
Rich
  "Geo" <georger@nls.net> wrote in message news:42d51209$2@w3.nls.net...
  I don't have a problem with their self-serving irresponsible pr any =
more than I do with microsofts irresponsible self-serving pr, that's a = hangup
that seems to be unique to you.
  As for interesting, you appear to be a programmer not a hacker so why =
would you find anything to do with hacking interesting? You've proven = several
times that you don't even understand the hacker mindset.
  Geo.
    "Rich" <@> wrote in message news:42d4bd97@w3.nls.net...
       You clearly buy into their self-serving irresponsible pr more =
than I do.  I was a bit surprised when you stated a few messages back = that
they steal the ideas for the vulnerabilities from others and take = credit for
themselves.  While they do not do much interesting, I had at = least though it
was their own.  you actually lowered my opinion of them = even further.
    Rich
      "Geo" <georger@nls.net> wrote in message =
news:42d47f65$1@w3.nls.net...
      Oh give me a break, these guys single handedly destroyed NT's =
security reputation.
      Hell they were the reason for the "information anarchy" program to =
silence the security lists.
      Geo.=20
        "Rich" <@> wrote in message news:42d36801$1@w3.nls.net...
           An extraordinary one.  I suspect there isn't a significant =
difference between what they could do and what you could do taking = advantage
of published information.  The only thing remarkable about = these folks is
that they publish press releases putting the public at = risk to promote
themselves for financial gain.
        Rich
          "John Beckett" <FirstnameSurname@compuserve.com.omit> wrote in =
message news:rcl6d1hegtubg74l7fc4t8e0haom1kvkrc@4ax.com...
          "Rich" <@> wrote in message news:<42d3503e$1@w3.nls.net>:
          >    You should remember that this is true only in george's =
imagination.
          Perhaps the 95% is an exaggeration. But there have been many =
examples (I
          think starting with the IIS debacles) that show that eeye =
could have owned
          an extremely large number of computers if Microsoft had not =
changed its
          "release when it's good enough" attitude.
          John
------=_NextPart_000_00D3_01C58790.759B4E80
Content-Type: text/html;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2900.2668" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><FONT face=3DArial size=3D2>   Give me example of =
a Microsoft=20
pr, say a page on <A =
href=3D"http://www.microsoft.com">www.microsoft.com</A>, that=20 provides the
information needed for someone to create malware like eeye=20
does.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>   By interesting I mean =
intelectually=20
interesting.  As for understanding, I think you confuse = disagreement
with=20
and understanding of.  It's a common flaw.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Rich</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; =
BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
  <DIV>"Geo" <<A =
href=3D"mailto:georger@nls.net">georger@nls.net</A>> wrote=20
  in message <A=20
  =
href=3D"news:42d51209$2@w3.nls.net">news:42d51209$2@w3.nls.net</A>...</DI=
V>
  <DIV><FONT face=3DArial size=3D2>I don't have a problem with their =
self-serving=20
  irresponsible pr any more than I do with microsofts irresponsible =
self-serving=20
  pr, that's a hangup that seems to be unique to you.</FONT></DIV>
  <DIV><FONT face=3DArial size=3D2></FONT> </DIV>
  <DIV><FONT face=3DArial size=3D2>As for interesting, you appear to be =
a programmer=20
  not a hacker so why would you find anything to do with hacking =
interesting?=20
  You've proven several times that you don't even understand the hacker=20
  mindset.</FONT></DIV>
  <DIV><FONT face=3DArial size=3D2></FONT> </DIV>
  <DIV><FONT face=3DArial size=3D2>Geo.</FONT></DIV>
  <BLOCKQUOTE dir=3Dltr=20
  style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; =
BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
    <DIV>"Rich" <@> wrote in message <A=20
    =
href=3D"news:42d4bd97@w3.nls.net">news:42d4bd97@w3.nls.net</A>...</DIV>
    <DIV><FONT face=3DArial size=3D2>   You clearly buy =
into their=20
    self-serving irresponsible pr more than I do.  I was a bit =
surprised=20
    when you stated a few messages back that they steal the ideas for =
the=20
    vulnerabilities from others and take credit for themselves.  =
While they=20
    do not do much interesting, I had at least though it was their =
own. =20
    you actually lowered my opinion of them even further.</FONT></DIV>
    <DIV><FONT face=3DArial size=3D2></FONT> </DIV>
    <DIV><FONT face=3DArial size=3D2>Rich</FONT></DIV>
    <DIV> </DIV>
    <BLOCKQUOTE dir=3Dltr=20
    style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; =
BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
      <DIV>"Geo" <<A =
href=3D"mailto:georger@nls.net">georger@nls.net</A>>=20
      wrote in message <A=20
      =
href=3D"news:42d47f65$1@w3.nls.net">news:42d47f65$1@w3.nls.net</A>...</DI=
V>
      <DIV><FONT face=3DArial size=3D2>Oh give me a break, these guys =
single=20
      handedly destroyed NT's security reputation.</FONT></DIV>
      <DIV><FONT face=3DArial size=3D2></FONT> </DIV>
      <DIV><FONT face=3DArial size=3D2>Hell they were the reason for the =
      "information anarchy" program to silence the security=20
      lists.</FONT></DIV>
      <DIV> </DIV>
      <DIV><FONT face=3DArial size=3D2>Geo.</FONT> </DIV>
      <BLOCKQUOTE dir=3Dltr=20
      style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; =
BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
        <DIV>"Rich" <@> wrote in message <A=20
        =
href=3D"news:42d36801$1@w3.nls.net">news:42d36801$1@w3.nls.net</A>...</DI=
V>
        <DIV><FONT face=3DArial size=3D2>   An extraordinary =
one.  I=20
        suspect there isn't a significant difference between what they =
could do=20
        and what you could do taking advantage of published=20
        information.  The only thing remarkable about these folks =
is that=20
        they publish press releases putting the public at risk to =
promote=20
        themselves for financial gain.</FONT></DIV>
        <DIV><FONT face=3DArial size=3D2></FONT> </DIV>
        <DIV><FONT face=3DArial size=3D2>Rich</FONT></DIV>
        <DIV><FONT face=3DArial size=3D2></FONT> </DIV>
        <BLOCKQUOTE=20
        style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: =
5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
          <DIV>"John Beckett" <<A=20
          =
href=3D"mailto:FirstnameSurname@compuserve.com.omit">FirstnameSurname@com=
puserve.com.omit</A>>=20
          wrote in message <A=20
          =
href=3D"news:rcl6d1hegtubg74l7fc4t8e0haom1kvkrc@4ax.com">news:rcl6d1hegtu=
bg74l7fc4t8e0haom1kvkrc@4ax.com</A>...</DIV>"Rich"=20
          <@> wrote in message <A=20
          =
href=3D"news:<42d3503e$1@w3.nls.net">news:<42d3503e$1@w3.nls.net</A>&g=
t;:<BR>>   =20
          You should remember that this is true only in george's=20
          imagination.<BR><BR>Perhaps the 95% is an exaggeration. But =
there have=20
          been many examples (I<BR>think starting with the IIS debacles) =
that=20
          show that eeye could have owned<BR>an extremely large number =
of=20
          computers if Microsoft had not changed its<BR>"release when =
it's good=20
          enough"=20
  =
attitude.<BR><BR>John<BR></BLOCKQUOTE></BLOCKQUOTE></BLOCKQUOTE></BLOCKQU=
OTE></BLOCKQUOTE></BODY></HTML>
------=_NextPart_000_00D3_01C58790.759B4E80--
--- BBBS/NT v4.01 Flag-5
 * Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
 |