Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Re: Web sites compromised by IIS attack
From: "Willem Koenings" <isec () europe com>
Date: Tue, 06 Jul 2004 10:10:30 -0500


It also is not a list for the benefit exclusively of people who are 
fortunate enough to have simple security problems. The security issues 
surrounding the question "how do I keep my home computer safe from 
attack?" are trivial compared to those surrounding the question "how do 
I keep the 200,000 computing devices worldwide within my organization 
from being owned and then attacking each other?"

Anyone with a truly complex security problem knows that it is hopeless 
to ever really control many computers in the presence of many people. 
You have no choice in a complex situation but to let things happen that 
you think are beneficial to you (the vendor installing patches, in this 
discussion) and find a way, after the fact, or periodically, to confirm 
that the end result was in fact beneficial to you. 

Jason, i have to disagree with you. Security is not a technology,
security is a way of thinking (regards goes here to Schneier). And
when you start thinking in right way, then there is no difference
whatsoever whether the subject is home computer or large production

And i have seen, in reality, uncounted time, in respected companies,
that after vendor specialist comes and installs updates/patches, system is
screwed. Yes, you have contracts, but company's image and face in
front of customers is everything. So at least here, in security list,
it is wrong to propagate the way that just sit and wait and let the
vendor came and fix all.


- even the best hackers will tell you that the game is a mental one.
Sign-up for Ads Free at Mail.com

Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]