I've emailed Andy Briney. I've also tried emailing the author. His email listed bounces, and if you visit his 'Opus' company web page his email listed their gives you a form email response.
Ron Gula, CTO Tenable Network Security http://www.tenablesecurity.com
At 03:04 PM 3/4/2003 -0600, Gilbert, Austin wrote:
I think that everyone's comments and objections to the errors in this article are well placed. However, I feel that the Nessus community would benefit to a greater extent if these comments were directed to the editors of InfoSecurity Magazine. I'm sure that they have some kind of comment section for letters to the editor...
I think you get my drift:
HOW TO CONTACT US
Information Security 85 Astor Ave., Suite 2 Norwood, Mass. 02062 PHONE 781-255-0200 FAX 781-255-0215 <http://www.infosecuritymag.com>www.infosecuritymag.com
EDITORIAL BOARD: Andy Briney Editor-in-Chief PH: 781-255-0200 x13
Shawna McAlearney Online Editor PH: 781-255-0200 x12
Larry Walsh Managing Editor PH: 781-255-0200 x14
Anne Saita Senior Writer PH: 858-695-8420
Neil Roiter Features Editor PH: 781-255-0200 x23 -----Original Message----- From: Corrales Romero Jorge [mailto:[EMAIL PROTECTED] Sent: Tuesday, March 04, 2003 2:57 PM To: [EMAIL PROTECTED] Subject: RE: Nessus featured in InfoSecurity Magazine
I think this report is not acurate. It said nessus cannot detect old SSH versions and it is not true.
-----Mensaje original-----
De: Michael Scheidell [<mailto:[EMAIL PROTECTED]>mailto:[EMAIL PROTECTED]
Enviado el: martes, 04 de marzo de 2003 14:38
Para: Javier Fernandez-Sanguino
CC: [EMAIL PROTECTED]
Asunto: Re: Nessus featured in InfoSecurity Magazine
> <http://www.infosecuritymag.com/2003/mar/cover.shtml>http://www.infosecuritymag.com/2003/mar/cover.shtml
> > It's unfortunate to see that there are wrong statements in the article > such as: (when talking of plugin updates) > "Nessus' vulnerability database is updated regularly, but you have to go > to the Web site."
Lots of things missing in the report, and , well wrong.
But, its a start.
Also, I find this amusing, not for its humor value, but it tells us that they had unknown/undocumented vulnerabilities in several servers.
Nessus gets our vote for "Most Unsafe Program to Have on Your Network." We not only crashed servers and clients consistently with Nessus; we even confused our GPS-based NTP server enough that it had to be re-FLASHed with new firmware.
-- Michael Scheidell, CEO SECNAP Network Security, LLC Sales: 866-SECNAPNET / (1-866-732-6276) Main: 561-368-9561 / www.secnap.net Looking for a career in Internet security? <http://www.secnap.net/employment/>http://www.secnap.net/employment/
IMPORTANT NOTICE:
This message is intended only for the use of the individual or entity to which it is addressed and may contain information that is privileged, confidential and exempt from disclosure under applicable law. If you have received this message in error, you are hereby notified that we do not consent to any reading, dissemination, distribution or copying of this message. If you have received this communication in error, please notify the sender immediately and destroy the transmitted information.
