Yikes, I think Steve Ballmer just hacked into Phil's email account ;-) Clayton Doige IT Project Manager CME Development Corporation T: 020 7430 5355 M: 07949 255062 E:[EMAIL PROTECTED] W:www.cetv-net.com
-----Original Message----- From: Phil Thompson [mailto:[EMAIL PROTECTED] Sent: 27 October 2008 11:55 To: NT System Admin Issues Subject: RE: Out of Cycle Critical Windows Patch ? I LOVE MICROSOFT.. -----Original Message----- From: Rod Trent [mailto:[EMAIL PROTECTED] Sent: Monday, October 27, 2008 7:37 AM To: NT System Admin Issues Subject: RE: Out of Cycle Critical Windows Patch ? Please apply your personal opinions to all other vendors. -----Original Message----- From: Phil Thompson [mailto:[EMAIL PROTECTED] Sent: Monday, October 27, 2008 7:31 AM To: NT System Admin Issues Subject: RE: Out of Cycle Critical Windows Patch ? I don't see Microsoft.com in your email. Do you work for them? After 20 years MS should have these holes fixed by now. No excuses!! -----Original Message----- From: Ken Schaefer [mailto:[EMAIL PROTECTED] Sent: Sunday, October 26, 2008 6:31 PM To: NT System Admin Issues Subject: RE: Out of Cycle Critical Windows Patch ? Microsoft does have this... They also have a bunch of internal staff (ACE) that train developers, work on automated tools that analyse code, random code reviews, and creating prescriptive guidance on how to write better code. I know one of the guys (Rocky Heckman) on the ACE team out of CBR. He used to be a security MVP, and he's one of the smartest coders (and a security guy to boot) I know. Cheers Ken > -----Original Message----- > From: Ziots, Edward [mailto:[EMAIL PROTECTED] > Sent: Monday, 27 October 2008 8:11 AM > To: NT System Admin Issues > Subject: RE: Out of Cycle Critical Windows Patch ? > > I see ya point, my real point is why don't they have pen-testers on > staff, looking at there systems trying to find the exploits and fix them > before the bad-guys do. I mean hiring some security researchers on staff > and have them pen-test the non-sense out of your software could go a > long way in keeping stuff secure.. > > Z > > Edward E. Ziots > Network Engineer > Lifespan Organization > MCSE,MCSA,MCP,Security+,Network+,CCA > Phone: 401-639-3505 > > -----Original Message----- > From: Martin Blackstone [mailto:[EMAIL PROTECTED] > Sent: Sunday, October 26, 2008 10:28 AM > To: NT System Admin Issues > Subject: RE: Out of Cycle Critical Windows Patch ? > > Fax = fix > > -----Original Message----- > From: Martin Blackstone [mailto:[EMAIL PROTECTED] > Sent: Sunday, October 26, 2008 7:18 AM > To: NT System Admin Issues > Subject: RE: Out of Cycle Critical Windows Patch ? > > I'm not sure I would agree with that. Developing a fix isn't a 15 minute > job. The chances are they were already hard at work on it. There is a > ton of > compatibility and regression testing that goes into a fax. > They probably got their hand forced because it was out in the wild, but > I > wouldn't go so far as imply they were just sitting around on their asses > until something happened. > > -----Original Message----- > From: Ziots, Edward [mailto:[EMAIL PROTECTED] > Sent: Sunday, October 26, 2008 6:45 AM > To: NT System Admin Issues > Subject: RE: Out of Cycle Critical Windows Patch ? > > Yeah someone lit a fire under MSFT arse and they got with the program on > this one, but only after they detected systems getting exploited in the > wild. Why they didn't determine this flaw back when they patched 06-040 > for the same type of issue we probably will never know... > > Z > > Edward E. Ziots > Network Engineer > Lifespan Organization > MCSE,MCSA,MCP,Security+,Network+,CCA > Phone: 401-639-3505 > > -----Original Message----- > From: Kurt Buff [mailto:[EMAIL PROTECTED] > Sent: Friday, October 24, 2008 8:08 PM > To: NT System Admin Issues > Subject: Re: Out of Cycle Critical Windows Patch ? > > Taking this in a slightly different direction... > > I told the IT Director and COO yesterday that I was patching all > servers, and sending an email to all of the laptop users to do the > same. > > They were a bit skeptical, but not only did the emails that I > forwarded them from various lists buttress my opinion, this morning I > got forwarded a voicemail by the IT Director, from a rep at MSFT. Gist > of the message - MSFT is taking this extremely seriously, and you > should patch now. > > Director's comments was "nice job, good of you to jump on this." > > Anyone else get a call like this from MSFT? It's the first time I've > heard of them doing this, and I take it as a really good sign - MSFT > is finally getting the real clue about this stuff. > > Kurt > > On Fri, Oct 24, 2008 at 3:52 AM, Oliver Marshall > <[EMAIL PROTECTED]> wrote: > > Chaps, > > > > The update that was sent out last night, has that caused any issues > > elsewhere? We've had a spate of calls from users about problems today, > > several servers which were set to auto-update for various reasons have > > had varying levels of failure. It's mentally busy here for a Friday, > and > > the one thing they have in common is that all the machine rebooted for > > an update last night. > > > > Is it just us ? > > > > Olly > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ ______________________________________________________________________ This email has been scanned by the MessageLabs Email Security System. ______________________________________________________________________ ______________________________________________________________________ This electronic mail message and any attached files contain information intended for the exclusive use of the person(s) to whom it is addressed and may contain information that is proprietary, privileged, confidential and/or exempt from disclosure under applicable law. If you are not the intended recipient, you are hereby notified that any viewing, copying, disclosure or distribution of this message or its contents may be subject to legal restriction or sanction. If you have received this message in error, please notify the sender immediately by electronic mail and delete the original message and any attachments without retaining any copies. _____________________________________________________________________ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~