> IOW, you took what Symantec's numbers were for one year, and guessed
> they would be the same for this year, and then posted how you were
> almost right.

You definitely misunderstand.  AFAIK, Symantec do not publish the 
number 243%.  I calculated it myself, using this sum:

(0.92 + 3.67 + 1.64 + 1.24 + 4.44 + 2.65) / 6

I also calculated those numbers, using the general formula y(n+1) / 
y(n).  This is all explained on the link I gave in my original post:

http://www.cyberdelix.net/files/malware_mutation_projection.pdf

Even in the most recent report, Symantec only refer to the growth 
rate by saying it was "more than double" (eg, 200+%) - although I 
haven't read it closely, they may well elaborate on that at some 
point.

> You people really need to get your stories straight.

There is only one of me, I assure you.

> Then you blithe on about how people should "avoid any software that
> locks them into a Microsoft Platform like the plague" and specifically
> note .NET for businesses but of course fail to provide any examples of
> where they should go, or any real advice on your "mitigation
> strategy."  

I agree Windows needs mitigation, that is why I am posting.  I didn't 
mention alternatives as that's not my purpose, to promote a specific 
product, and I wouldn't want my observations to be tainted by it.  
However, now you've asked, I'd recommend FreeBSD, without even seeing 
your spec.  Desktops?  PC-BSD.  As for .NET, off top of head I'd 
suggest a .NET connector for PHP, running on FreeBSD of course.

> What it is about .NET that should be avoided like the plague?  Wait,

Sorry but I already answered that.   It's because it locks the 
customer into a Microsoft platform.

> One must assume that you are an expert .NET developer

You'd assume wrong - it doesn't take an expert to recognise a 
dependency.

> Additionally, you've clearly performed migration engagements for these
> people you "advise."  Please let us know what the actual migration
> plan was, and how you have so brilliantly created a one-off cost
> migration path.  I'm really interested in the details about that.  

I'm sure you are, and I'd be happy to oblige.  My rates for that kind 
of work start at £120/hr.  Please PM me for more info.

> Details on your SDL process would be fantastic as well. 

Continuous incremental improvement (TQM). RERO.  Prototyping.  Agile 
is the word used nowadays I believe... revolution through evolution, 
as I said....

Stu

> -----Original Message-----
> From: full-disclosure-boun...@lists.grok.org.uk 
> [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of lsi
> Sent: Saturday, May 15, 2010 1:07 PM
> To: full-disclosure@lists.grok.org.uk
> Subject: Re: [Full-disclosure] Windows' future (reprise)
> 
> Is that you, Bill?
> 
> I think you misunderstand.  9 months ago, I measured the growth rate at 243%, 
> using Symantec's stats.  9 months ago I posted that number here, together 
> with a prediction of this year's stats.  Recently, I got this year's stats 
> and compared them with that prediction.  I found that this prediction was 
> 75.4% accurate.  I am now reporting those results back to the group.  And 
> this is trolling how?
> 
> My point is that the prediction was not wildly wrong, and so that leads me to 
> wonder if anything else I said, 9 months ago, was also not wildly wrong.
> 
> My main reason for claiming that Windows is inherently insecure is because 
> it's closed source.  However it's also because of the sloppy, monolithic 
> spaghetti code that Windows is made of.  If you're claiming Windows is in 
> fact inherently secure, I assume this means you don't use AV on any of your 
> Windows machines, and advise everyone you know to uninstall it?
> 
> I never said migration would be free or easy.  That is why I am posting this 
> data here, because I see it as a vulnerability, a very big vulnerability that 
> many companies have not woken up to.  The very fact that migration is hard, 
> lengthy, and expensive, means that the vulnerability is larger than ever.
> 
> Stu
> 
> On 15 May 2010 at 14:40, Thor (Hammer of God) wrote:
> 
> From:                 "Thor (Hammer of God)" <t...@hammerofgod.com>
> To:                   "full-disclosure@lists.grok.org.uk" <full-
> disclos...@lists.grok.org.uk>
> Date sent:            Sat, 15 May 2010 14:40:29 +0000
> Subject:              Re: [Full-disclosure] Windows' future (reprise)
> 
> > I am constantly amazed at posts like this where you make yourself sound 
> > like some sort of statistical genius because you were "able to predict" 
> > that since last year was %243, that this year would be %243.  Wow.  Really?
> > 
> > And for the record, these claims of 'inherent insecurity' in Windows are 
> > simply ignorant.  If you are still running Windows 95 that's your problem.  
> > Do a little research before post assertions based on 10 or 20 year old 
> > issues.
> > 
> > This smacks of the classic troll, where you say things like "nothing that 
> > Microsoft makes is secure and it never will be" and then go on to say how 
> > easy it is to migrate, and how it's free, with only a one off cost, and how 
> > to move off of .NET.
> > 
> > Obvious "predictions," ignorant assumptions, and a total lack of any true 
> > understanding of business computing.  Yep, "troll."
> > 
> > t
> > 
> > -----Original Message-----
> > From: full-disclosure-boun...@lists.grok.org.uk 
> > [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of lsi
> > Sent: Saturday, May 15, 2010 6:12 AM
> > To: full-disclosure@lists.grok.org.uk
> > Subject: [Full-disclosure] Windows' future (reprise)
> > 
> > Hi All!
> > 
> > Just a followup from my posting of 9 months ago (which can be found
> > here):
> > 
> > http://www.mail-archive.com/full-disclosure@lists.grok.org.uk/msg37173.html
> > 
> > Symantec have released "Internet Security Threat Report: Volume XV: 
> > April 2010".  My posting from last year was based on the previous "Internet 
> > Security Threat Report: Volume XIV: April 2009".  So I thought it would be 
> > interesting to check my numbers.  The new edition of the Threat Report is 
> > here:
> > 
> > http://www4.symantec.com/Vrt/wl?tu_id=SUKX1271711282503126202
> > 
> > You may recall that last year, the average annual growth rate of new 
> > threats (as defined by Symantec) was 243%.  This enabled me to predict that 
> > the number of new threats in this year's Symantec Threat Report would be 
> > 243% of last years; eg. I predicted 9 months ago the number of new threats 
> > in this year's Symantec Threat Report would be 243% * 1656227, or 
> > 3840485.87.
> > 
> > The actual number of new threats in this year's Symantec Threat Report is 
> > 2895802, an error on my part of 24.6%.
> > 
> > This is quite a chunk, however it is not that far off.  My excuses:
> > 
> > - my number was based on averages, so it will never be exact.  There will 
> > be a natural variance in the growth rate, caused by many factors.
> > 
> > - in the new edition, Symantec have altered the raw data a little - the 
> > number of new threats for 2009, 2008, 2007 etc is slightly different to 
> > those same years, as listed in the previous version of the report.  I have 
> > not updated my projection to allow for this.
> > 
> > - Symantec note that "The slight decline in the rate of growth should not 
> > discount the significant number of new signatures created in 2009. 
> > Signature-based detection is lagging behind the creation of malicious 
> > threats..." (page 48).
> > 
> > Am I retreating from my position?  Absolutely not.  I am now expecting the 
> > number of new threats in next years' report to be 7036798.86. This is 
> > 2895802 * 243%.  This includes the error introduced by Symantec's changes 
> > to the raw data.  I don't think it matters much.
> > 
> > As this flood of new threats will soon overpower AV companies' 
> > ability to catalogue them (by 2015, at 243% growth, there will be
> > 2.739 MILLION new threats PER DAY (over 1900 new threats per minute)), and 
> > as Symantec admits above that "signature-based detection is lagging", and 
> > as Microsoft are not likely to produce a secure version of anything anytime 
> > soon, I am not at all hopeful of a clean resolution to this problem.
> > 
> > I continue to advise that users should, where possible, deploy 
> > alternatives; that they should, if they have not already, create and action 
> > a migration strategy; and that they should avoid like the plague, any 
> > software which locks them into a Microsoft platform.  
> > Business .NET applications, I'm lookin' at you.
> > 
> > Those failing to migrate will discover their hardware runs slower and 
> > slower, while doing the same job as it did previously.  They will need to 
> > take this productivity hit, OR buy a new computer, which will also 
> > eventually surcumb to the same increasing slowness.  They will need to buy 
> > new machines more and more frequently.  Eventually, they will run out of 
> > money - or, for the especially deep-pocketed, they will find they cannot 
> > deploy the new machines fast enough, before they are already too slow to 
> > use.  The only alternative to this treadmill is to dump Windows.  The 
> > sooner it is dumped, the less money is wasted buying new hardware, simply 
> > to keep up with security- induced slowness.
> > 
> > Why spend all that time and money on a series of new Windows machines, 
> > without fixing the actual problem, which is the inherent insecurity of 
> > Windows?  People can spend the same time and money replacing Windows, and 
> > then they won't need to worry about the problem any more.  The difference 
> > is that sticking with Windows incurs ongoing and increasing costs, while a 
> > migration incurs a one- off cost.
> > 
> > I don't think it takes a genius to see which approach will cost less.
> > 
> > Notes:
> > - see page 10 of the Volume XIV (2009) edition, and page 48 of Volume XV 
> > (2010) edition, for the relevant stats
> > 
> > - since my post of last year, I have also noticed a similar exponential 
> > curve in the number of threats detected by Spybot Search and Destroy (a 
> > popular anti-spyware tool). This curve can be seen
> > here:
> > 
> > http://www.safer-networking.org/en/updatehistory/index.html
> > 
> >  - my projection of growth rates up to 2016 (written last year) is
> > here:
> > 
> > http://www.cyberdelix.net/files/malware_mutation_projection.pdf
> > 
> > Comments welcome..
> > 
> > Stu
> > 
> > ---
> > Stuart Udall
> > stuart a...@cyberdelix.dot net - http://www.cyberdelix.net/
> > 
> > ---
> >  * Origin: lsi: revolution through evolution (192:168/0.2)
> > 
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
> > 
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
> 
> 
> 
> ---
> Stuart Udall
> stuart a...@cyberdelix.dot net - http://www.cyberdelix.net/
> 
> --- 
>  * Origin: lsi: revolution through evolution (192:168/0.2)
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/



---
Stuart Udall
stuart a...@cyberdelix.dot net - http://www.cyberdelix.net/

--- 
 * Origin: lsi: revolution through evolution (192:168/0.2)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to