On Fri, 28 Nov 2003, Marcel Hicking wrote:
> I'd definitely prefer to have "them" working on getting things
> up and running again and do the forensics. They should waste a
> minute too much on reports that might proove wrong finally anyway.
Minute? Every minute is cucial... So hmm.. They don
On Fri, 28 Nov 2003, Marcel Hicking wrote:
> I'd definitely prefer to have "them" working on getting things
> up and running again and do the forensics. They should waste a
> minute too much on reports that might proove wrong finally anyway.
Minute? Every minute is cucial... So hmm.. They don
--Thursday, November 27, 2003 12:56:18 -0500 Eric LeBlanc <[EMAIL PROTECTED]>:
> A least, they can stay us informed about their actions... for example:
>
> 21 sep: hacked, we moved all domain to blah, bluh, blih.
> 22 sep: investiguation started, by X, X. We think it will take X
> hours/day/month
--Thursday, November 27, 2003 12:56:18 -0500 Eric LeBlanc <[EMAIL PROTECTED]>:
> A least, they can stay us informed about their actions... for example:
>
> 21 sep: hacked, we moved all domain to blah, bluh, blih.
> 22 sep: investiguation started, by X, X. We think it will take X
> hours/day/month
Yes 'we wait for some info...
what's up the he** ???
Is this an open source project or not ???, we use it not only for apt-*** tools.
> On Thu, 27 Nov 2003, Dan Jacobson wrote:
>
> > > So, give the people some time and after the details are disclosed -
> > > learn from their experience and use
Yes 'we wait for some info...
what's up the he** ???
Is this an open source project or not ???, we use it not only for apt-*** tools.
> On Thu, 27 Nov 2003, Dan Jacobson wrote:
>
> > > So, give the people some time and after the details are disclosed -
> > > learn from their experience and use
In article <[EMAIL PROTECTED]> you wrote:
> 21 sep: hacked, we moved all domain to blah, bluh, blih.
> 22 sep: investiguation started, by X, X. We think it will take X
> hours/day/month/years
> 24 sep: We still investiguate, please be patient, we think we will
> terminate that in two hour/day/mont
In article <[EMAIL PROTECTED]> you wrote:
> 21 sep: hacked, we moved all domain to blah, bluh, blih.
> 22 sep: investiguation started, by X, X. We think it will take X
> hours/day/month/years
> 24 sep: We still investiguate, please be patient, we think we will
> terminate that in two hour/day/mont
On Thu, 27 Nov 2003, Dan Jacobson wrote:
> > So, give the people some time and after the details are disclosed -
> > learn from their experience and use it in your work.
>
> Let's examine natural disasters, e.g. a typhoon. The pros agree that
> the public must be able to get to timely reports
On Thu, 27 Nov 2003, Russell Coker wrote:
> On Thu, 27 Nov 2003 04:51, Matt Zimmerman <[EMAIL PROTECTED]> wrote:
> > Big money does not imply big security. Large corporations with lots of
> > money to spend on security are compromised all the time. Obviously, they
> > aren't as forthcoming abo
On Thu, 27 Nov 2003, Dan Jacobson wrote:
> > So, give the people some time and after the details are disclosed -
> > learn from their experience and use it in your work.
>
> Let's examine natural disasters, e.g. a typhoon. The pros agree that
> the public must be able to get to timely reports
On Thu, 27 Nov 2003, Russell Coker wrote:
> On Thu, 27 Nov 2003 04:51, Matt Zimmerman <[EMAIL PROTECTED]> wrote:
> > Big money does not imply big security. Large corporations with lots of
> > money to spend on security are compromised all the time. Obviously, they
> > aren't as forthcoming abo
> So, give the people some time and after the details are disclosed -
> learn from their experience and use it in your work.
Let's examine natural disasters, e.g. a typhoon. The pros agree that
the public must be able to get to timely reports issued from the
disaster control center, via e.g. loca
> So, give the people some time and after the details are disclosed -
> learn from their experience and use it in your work.
Let's examine natural disasters, e.g. a typhoon. The pros agree that
the public must be able to get to timely reports issued from the
disaster control center, via e.g. loca
more people that
> put their faith in open source software, the more people are going to want
> to understand how open source sites make sure that open source code is
> protected from damage.
>
> -Jim
>
>
> - Original Message -
> From: "Michael Stone"
Le 12379ième jour après Epoch,
Jim Hubbard écrivait:
> After the Linux kernel server got hacked a few weeks ago, and now
> this successful attack at Debian, my confidence is shaken.
What kind of confidence? You can trust that every system, every OS,
every program can be hacked/cracked. Nothing is
more people that
> put their faith in open source software, the more people are going to want
> to understand how open source sites make sure that open source code is
> protected from damage.
>
> -Jim
>
>
> - Original Message -
> From: "Michael Stone"
Le 12379ième jour après Epoch,
Jim Hubbard écrivait:
> After the Linux kernel server got hacked a few weeks ago, and now
> this successful attack at Debian, my confidence is shaken.
What kind of confidence? You can trust that every system, every OS,
every program can be hacked/cracked. Nothing is
hi ya
On Tue, 25 Nov 2003, Michael Stone wrote:
> On Sun, Nov 23, 2003 at 01:09:27AM -0500, Jim Hubbard wrote:
> >After the Linux kernel server got hacked a few weeks ago, and now this
> >successful attack at Debian, my confidence is shaken. I hope we'll see full
> >disclosure about exactly wha
hi ya
On Tue, 25 Nov 2003, Michael Stone wrote:
> On Sun, Nov 23, 2003 at 01:09:27AM -0500, Jim Hubbard wrote:
> >After the Linux kernel server got hacked a few weeks ago, and now this
> >successful attack at Debian, my confidence is shaken. I hope we'll see full
> >disclosure about exactly wha
On Thu, 27 Nov 2003 04:51, Matt Zimmerman <[EMAIL PROTECTED]> wrote:
> Big money does not imply big security. Large corporations with lots of
> money to spend on security are compromised all the time. Obviously, they
> aren't as forthcoming about it as Debian due to monetary concerns, but even
>
On Thu, 27 Nov 2003 04:51, Matt Zimmerman <[EMAIL PROTECTED]> wrote:
> Big money does not imply big security. Large corporations with lots of
> money to spend on security are compromised all the time. Obviously, they
> aren't as forthcoming about it as Debian due to monetary concerns, but even
>
On Tue, Nov 25, 2003 at 03:36:22PM +0100, Marcel Weber wrote:
> By the way: From my time at IBM I know that they have a huge anti hacker /
> cracker task force to defend IBM and it's costumers against attacks. It
> is some mixture between secret service and battleship galactica. It is not
> surpr
On Tue, Nov 25, 2003 at 03:36:22PM +0100, Marcel Weber wrote:
> By the way: From my time at IBM I know that they have a huge anti hacker /
> cracker task force to defend IBM and it's costumers against attacks. It
> is some mixture between secret service and battleship galactica. It is not
> surpr
oftware, the more people are going to want
to understand how open source sites make sure that open source code is
protected from damage.
-Jim
- Original Message -
From: "Michael Stone" <[EMAIL PROTECTED]>
To: "Jim Hubbard" <[EMAIL PROTECTED]>
Cc:
Sent: Tu
oftware, the more people are going to want
to understand how open source sites make sure that open source code is
protected from damage.
-Jim
- Original Message -
From: "Michael Stone" <[EMAIL PROTECTED]>
To: "Jim Hubbard" <[EMAIL PROTECTED]>
Cc: <[EMA
On Sun, Nov 23, 2003 at 01:09:27AM -0500, Jim Hubbard scribbled:
> After the Linux kernel server got hacked a few weeks ago, and now this
> successful attack at Debian, my confidence is shaken. I hope we'll see full
> disclosure about exactly what happened and what's being done to prevent it.
Shak
On Sun, Nov 23, 2003 at 01:09:27AM -0500, Jim Hubbard scribbled:
> After the Linux kernel server got hacked a few weeks ago, and now this
> successful attack at Debian, my confidence is shaken. I hope we'll see full
> disclosure about exactly what happened and what's being done to prevent it.
Shak
Jim Hubbard wrote:
After the Linux kernel server got hacked a few weeks ago, and now this
successful attack at Debian, my confidence is shaken. I hope we'll see full
disclosure about exactly what happened and what's being done to prevent it.
Well wait for the findings of the debian security t
On Tue, Nov 25, 2003 at 08:21:14AM -0600, John Goerzen wrote:
> On Sun, Nov 23, 2003 at 01:09:27AM -0500, Jim Hubbard wrote:
> > After the Linux kernel server got hacked a few weeks ago, and now this
> > successful attack at Debian, my confidence is shaken. I hope we'll see full
>
> I'm curious:
On Sun, Nov 23, 2003 at 01:09:27AM -0500, Jim Hubbard wrote:
> After the Linux kernel server got hacked a few weeks ago, and now this
> successful attack at Debian, my confidence is shaken. I hope we'll see full
I'm curious: why would this serve to shake your confidence?
-- John
On Sun, Nov 23, 2003 at 01:09:27AM -0500, Jim Hubbard wrote:
After the Linux kernel server got hacked a few weeks ago, and now this
successful attack at Debian, my confidence is shaken. I hope we'll see full
disclosure about exactly what happened and what's being done to prevent it.
We were up
After the Linux kernel server got hacked a few weeks ago, and now this
successful attack at Debian, my confidence is shaken. I hope we'll see full
disclosure about exactly what happened and what's being done to prevent it.
-Jim
Jim Hubbard wrote:
After the Linux kernel server got hacked a few weeks ago, and now this
successful attack at Debian, my confidence is shaken. I hope we'll see full
disclosure about exactly what happened and what's being done to prevent it.
Well wait for the findings of the debian security team.
On Tue, Nov 25, 2003 at 08:21:14AM -0600, John Goerzen wrote:
> On Sun, Nov 23, 2003 at 01:09:27AM -0500, Jim Hubbard wrote:
> > After the Linux kernel server got hacked a few weeks ago, and now this
> > successful attack at Debian, my confidence is shaken. I hope we'll see full
>
> I'm curious:
On Sun, Nov 23, 2003 at 01:09:27AM -0500, Jim Hubbard wrote:
> After the Linux kernel server got hacked a few weeks ago, and now this
> successful attack at Debian, my confidence is shaken. I hope we'll see full
I'm curious: why would this serve to shake your confidence?
-- John
--
To UNSUBSC
On Sun, Nov 23, 2003 at 01:09:27AM -0500, Jim Hubbard wrote:
After the Linux kernel server got hacked a few weeks ago, and now this
successful attack at Debian, my confidence is shaken. I hope we'll see full
disclosure about exactly what happened and what's being done to prevent it.
We were up-fro
After the Linux kernel server got hacked a few weeks ago, and now this
successful attack at Debian, my confidence is shaken. I hope we'll see full
disclosure about exactly what happened and what's being done to prevent it.
-Jim
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "
38 matches
Mail list logo