I've emailed Andy Briney. I've also tried emailing the author. His
email listed bounces, and if you visit his 'Opus' company web page
his email listed their gives you a form email response.

Ron Gula, CTO
Tenable Network Security
http://www.tenablesecurity.com


At 03:04 PM 3/4/2003 -0600, Gilbert, Austin wrote:
I think that everyone's comments and objections to the errors in this article are well placed. However, I feel that the Nessus community would benefit to a greater extent if these comments were directed to the editors of InfoSecurity Magazine. I'm sure that they have some kind of comment section for letters to the editor...
I think you get my drift:


HOW TO CONTACT US

Information Security
85 Astor Ave., Suite 2
Norwood, Mass. 02062
PHONE 781-255-0200
FAX 781-255-0215
<http://www.infosecuritymag.com>www.infosecuritymag.com

EDITORIAL BOARD:
Andy Briney
Editor-in-Chief
PH: 781-255-0200 x13

Shawna McAlearney
Online Editor
PH: 781-255-0200 x12

Larry Walsh
Managing Editor
PH: 781-255-0200 x14

Anne Saita
Senior Writer
PH: 858-695-8420

Neil Roiter
Features Editor
PH: 781-255-0200 x23
-----Original Message-----
From: Corrales Romero Jorge [mailto:[EMAIL PROTECTED]
Sent: Tuesday, March 04, 2003 2:57 PM
To: [EMAIL PROTECTED]
Subject: RE: Nessus featured in InfoSecurity Magazine

I think this report is not acurate. It said nessus cannot detect old SSH versions and it is not true.

-----Mensaje original-----
De: Michael Scheidell [<mailto:[EMAIL PROTECTED]>mailto:[EMAIL PROTECTED]
Enviado el: martes, 04 de marzo de 2003 14:38
Para: Javier Fernandez-Sanguino
CC: [EMAIL PROTECTED]
Asunto: Re: Nessus featured in InfoSecurity Magazine


> <http://www.infosecuritymag.com/2003/mar/cover.shtml>http://www.infosecuritymag.com/2003/mar/cover.shtml

>
> It's unfortunate to see that there are wrong statements in the article
> such as: (when talking of plugin updates)
> "Nessus' vulnerability database is updated regularly, but you have to go
> to the Web site."

Lots of things missing in the report, and , well wrong.

But, its a start.

Also, I find this amusing, not for its humor value, but it tells us
that they had unknown/undocumented vulnerabilities in several servers.

Nessus gets our vote for "Most Unsafe Program to Have on Your Network." We
not only crashed servers and clients consistently with Nessus; we even
confused our GPS-based NTP server enough that it had to be re-FLASHed with
new firmware.

--
Michael Scheidell, CEO
SECNAP Network Security, LLC
Sales: 866-SECNAPNET / (1-866-732-6276)
Main: 561-368-9561 / www.secnap.net
Looking for a career in Internet security?
<http://www.secnap.net/employment/>http://www.secnap.net/employment/



IMPORTANT NOTICE:

This message is intended only for the use of the individual or entity to which it is addressed and may contain information that is privileged, confidential and exempt from disclosure under applicable law. If you have received this message in error, you are hereby notified that we do not consent to any reading, dissemination, distribution or copying of this message. If you have received this communication in error, please notify the sender immediately and destroy the transmitted information.




Reply via email to