.
-Original Message-
From: Pukhraj Singh [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 28, 2006 7:37 AM
To: avivra
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED];
full-disclosure@lists.grok.org.uk; bugtraq@securityfocus.com
Subject: Re: [Full-disclosure] VML Exploit vs. AV/IPS/IDS signatures
And you tell me how many of these variants you will actually find in
the wild. Won't be a significant number I bet.
Cheers!
Pukhraj
On 9/27/06, avivra <[EMAIL PROTECTED]> wrote:
Hi,
> i.e. I can't afford to buy "specialized" security tools/devices for
> "speclialized" attacks unless my company
Hi Aviv/Pukhraj & others:
As a security professional and researchers, our aim is to provide
more in-depth information on intrusion (security) aspects, for
example, some virus out-break, new windows vulnerability etc. Aviv is
right by saying that signatures should match the vulnerability, not
t