Re: RussRe: Call to arms - INFORMATION ANARCHY

From: Scott Gifford (sgifford@SUSPECTCLASS.COM)
Date: 11/03/01

Message-ID:  <>
Date:         Fri, 2 Nov 2001 19:50:04 -0500
From: Scott Gifford <sgifford@SUSPECTCLASS.COM>
Subject:      Re: RussRe: Call to arms - INFORMATION ANARCHY

"Piotr Flakowski@SMTP" <piotr.flakowski@PHILIPS.COM> writes:

> First, the vulnerability is in NO WAY like a gun for everyone. Why?
> Because gun can be used to protect ...HOW can you use the
> vulnerability to PROTECT anything/anybody???

Knowledge of the details of a vulnerability helps you guard against
it. When you first find out about buffer overflows in IIS, you can
teach your firewall/proxy to protect you from it. When you first find
out about Javascript-based exploits, you can disable Javascript in
your browser. The list goes on; the majority of security exploits
that come out do have workarounds if you know the details.


Delivery co-sponsored by Trend Micro, Inc.
Earn 5% rebate on licenses purchased for Trend Micro ScanMail for
Microsoft Exchange 2000 between October 1 and November 16. ScanMail
ensures 100% scanning of inbound and outbound traffic and provides
remote software management. For program details or to download your
30-day FREE evaluation copy: