Yikes, I think Steve Ballmer just hacked into Phil's email account ;-)

Clayton Doige
IT Project Manager
CME Development Corporation
T: 020 7430 5355
M: 07949 255062
E:[EMAIL PROTECTED]
W:www.cetv-net.com

-----Original Message-----
From: Phil Thompson [mailto:[EMAIL PROTECTED] 
Sent: 27 October 2008 11:55
To: NT System Admin Issues
Subject: RE: Out of Cycle Critical Windows Patch ?

I LOVE MICROSOFT..


-----Original Message-----
From: Rod Trent [mailto:[EMAIL PROTECTED]
Sent: Monday, October 27, 2008 7:37 AM
To: NT System Admin Issues
Subject: RE: Out of Cycle Critical Windows Patch ?

Please apply your personal opinions to all other vendors.

-----Original Message-----
From: Phil Thompson [mailto:[EMAIL PROTECTED]
Sent: Monday, October 27, 2008 7:31 AM
To: NT System Admin Issues
Subject: RE: Out of Cycle Critical Windows Patch ?

I don't see Microsoft.com in your email. Do you work for them?

After 20 years MS should have these holes fixed by now. No excuses!!



-----Original Message-----
From: Ken Schaefer [mailto:[EMAIL PROTECTED]
Sent: Sunday, October 26, 2008 6:31 PM
To: NT System Admin Issues
Subject: RE: Out of Cycle Critical Windows Patch ?

Microsoft does have this...

They also have a bunch of internal staff (ACE) that train developers,
work
on automated tools that analyse code, random code reviews, and creating
prescriptive guidance on how to write better code.

I know one of the guys (Rocky Heckman) on the ACE team out of CBR. He
used
to be a security MVP, and he's one of the smartest coders (and a
security
guy to boot) I know.

Cheers
Ken

> -----Original Message-----
> From: Ziots, Edward [mailto:[EMAIL PROTECTED]
> Sent: Monday, 27 October 2008 8:11 AM
> To: NT System Admin Issues
> Subject: RE: Out of Cycle Critical Windows Patch ?
>
> I see ya point, my real point is why don't they have pen-testers on
> staff, looking at there systems trying to find the exploits and fix
them
> before the bad-guys do. I mean hiring some security researchers on
staff
> and have them pen-test the non-sense out of your software could go a
> long way in keeping stuff secure..
>
> Z
>
> Edward E. Ziots
> Network Engineer
> Lifespan Organization
> MCSE,MCSA,MCP,Security+,Network+,CCA
> Phone: 401-639-3505
>
> -----Original Message-----
> From: Martin Blackstone [mailto:[EMAIL PROTECTED]
> Sent: Sunday, October 26, 2008 10:28 AM
> To: NT System Admin Issues
> Subject: RE: Out of Cycle Critical Windows Patch ?
>
> Fax = fix
>
> -----Original Message-----
> From: Martin Blackstone [mailto:[EMAIL PROTECTED]
> Sent: Sunday, October 26, 2008 7:18 AM
> To: NT System Admin Issues
> Subject: RE: Out of Cycle Critical Windows Patch ?
>
> I'm not sure I would agree with that. Developing a fix isn't a 15
minute
> job. The chances are they were already hard at work on it. There is a
> ton of
> compatibility and regression testing that goes into a fax.
> They probably got their hand forced because it was out in the wild,
but
> I
> wouldn't go so far as imply they were just sitting around on their
asses
> until something happened.
>
> -----Original Message-----
> From: Ziots, Edward [mailto:[EMAIL PROTECTED]
> Sent: Sunday, October 26, 2008 6:45 AM
> To: NT System Admin Issues
> Subject: RE: Out of Cycle Critical Windows Patch ?
>
> Yeah someone lit a fire under MSFT arse and they got with the program
on
> this one, but only after they detected systems getting exploited in
the
> wild. Why they didn't determine this flaw back when they patched
06-040
> for the same type of issue we probably will never know...
>
> Z
>
> Edward E. Ziots
> Network Engineer
> Lifespan Organization
> MCSE,MCSA,MCP,Security+,Network+,CCA
> Phone: 401-639-3505
>
> -----Original Message-----
> From: Kurt Buff [mailto:[EMAIL PROTECTED]
> Sent: Friday, October 24, 2008 8:08 PM
> To: NT System Admin Issues
> Subject: Re: Out of Cycle Critical Windows Patch ?
>
> Taking this in a slightly different direction...
>
> I told the IT Director and COO yesterday that I was patching all
> servers, and sending an email to all of the laptop users to do the
> same.
>
> They were a bit skeptical, but not only did the emails that I
> forwarded them from various lists buttress my opinion, this morning I
> got forwarded a voicemail by the IT Director, from a rep at MSFT. Gist
> of the message - MSFT is taking this extremely seriously, and you
> should patch now.
>
> Director's comments was "nice job, good of you to jump on this."
>
> Anyone else get a call like this from MSFT? It's the first time I've
> heard of them doing this, and I take it as a really good sign - MSFT
> is finally getting the real clue about this stuff.
>
> Kurt
>
> On Fri, Oct 24, 2008 at 3:52 AM, Oliver Marshall
> <[EMAIL PROTECTED]> wrote:
> > Chaps,
> >
> > The update that was sent out last night, has that caused any issues
> > elsewhere? We've had a spate of calls from users about problems
today,
> > several servers which were set to auto-update for various reasons
have
> > had varying levels of failure. It's mentally busy here for a Friday,
> and
> > the one thing they have in common is that all the machine rebooted
for
> > an update last night.
> >
> > Is it just us ?
> >
> > Olly
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~




~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
______________________________________________________________________

______________________________________________________________________
This electronic mail message and any attached files contain information 
intended for the exclusive use of the person(s) to whom it is addressed and may 
contain information that is proprietary, privileged, confidential and/or exempt 
from disclosure under applicable law. If you are not the intended recipient, 
you are hereby notified that any viewing, copying, disclosure or distribution 
of this message or its contents may be subject to legal restriction or 
sanction. If you have received this message in error, please notify the sender 
immediately by electronic mail and delete the original message and any 
attachments without retaining any copies. 
_____________________________________________________________________

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to