Hi Keith, Just a quick OT question. I can understand obfuscating malware links in order to allow email filters to let messages through (though we should have all whitelisted the mailing lists we are on) and I can understand doing it to prevent the inadvertent brain fail and unintentional click.
Why is it necessary to do so for Microsoft's update URLs? I have seen the odd Exchange setup where an overzealous admin has prevented messages with http or www in them from exiting the network but it is odd to see it happen for addresses that should be benign (though that all depends on how you view Microsoft and their products). Carl Sûnnet Beskerming On 29/11/2008, at 1:50 AM, Young, Keith wrote: > > Is anyone else noticing problems with > "hXXp://windowsupdate.microsoft.com/" and > "hXXp://update.microsoft.com/"? Both are either re-directing to MSN, > showing a 404 error, or coming up with a "Server too busy" message. > > (Normal system issues or DDoS timed for U.S. holiday....?) > > --Keith > > Keith Young, Security Official > Department of Technology Services > Montgomery County, Maryland > phone - (240) 777-2955 > > _______________________________________________ > Fun and Misc security discussion for OT posts. > https://linuxbox.org/cgi-bin/mailman/listinfo/funsec > Note: funsec is a public and open mailing list. _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
