Be sure to read the source: intelreport.mandiant.com/Mandiant_APT1_Report.pdf I'm only part way through, but I find it hard to believe that only micro$loth computers are used as the attack OS. Maybe I haven't gotten far enough through report to find the part where they use the *nix boxes? scott
- Re: Network security on multi... Owen DeLong
- Re: Network security on m... Jay Ashworth
- Re: Network security on m... Warren Bailey
- Re: Network security on m... Owen DeLong
- Re: Network security on m... David Barak
- Re: Network security on multiple l... Cameron Byrne
- Re: Network security on multiple l... Jon Lewis
- Re: Network security on multi... Jack Bates
- Re: Network security on m... Steven Bellovin
- Re: NYT covers China cyberthreat .
- Re: NYT covers China cyberthreat Scott Weeks
- Re: NYT covers China cyberthreat calin.chiorean
- Re: NYT covers China cyberthreat Barry Shein
- Re: NYT covers China cyberthreat Scott Weeks
- Re: NYT covers China cyberthreat Warren Bailey
- Re: NYT covers China cyberthreat calin.chiorean
- Re: NYT covers China cyberthreat Warren Bailey
- Re: NYT covers China cyberthreat calin.chiorean
- Re: NYT covers China cyberthreat Scott Weeks
- Re: NYT covers China cyberthreat Suresh Ramasubramanian
- Re: NYT covers China cyberthreat Randy Bush