Got that bit..

A lot of these recent vulnerabilites seem quite complex to set up content filtering rules for - does the audience really feel that you could really get that far on top of the problem...? Hard enough writing snort rules without trying to commercially distrubute it...?

All of the audience, that is, except pretty vacant who has a rather more difinitive answer :-) I think you might have hit on something there PV



hl wrote:

--On Monday, August 02, 2004 04:56:42 PM +0100 Ben <[EMAIL PROTECTED]> wrote:


Anyone had any experience with these - they claim to be able to offer content filtering and there by detect malicious content embedded into HTML, as well as the usual deliver systems.

Sounds interesting my only concern is how you would stay on top of each
new threat...

Through automatic updates from the vendor.

Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu/ir/security/

_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to