Doing a search on Counterpane, I found this article written last summer on SANS by 
Bruce Schneier of Counterpane.

http://www.zdnet.com/zdnn/stories/comment/0,5859,2609398,00.html

Bruce Schneier wrote:

On July 17, the SANS (System Administration, Networking, and Security) Institute 
promulgated an e-mail warning people of the "most dangerous flaw found in Windows 
workstations." I can't really figure this e-mail out; it seems to be primarily a grab 
for press coverage. 
Some of it is suspiciously vague: "We developed this exploit further and realized that 
this is one of the most serious exploits of Windows workstations in the last several 
years" "Developed"? How? No one says. 
Some of it brags: "Microsoft asked us not to release the details until they had a 
fix." "Release the details"? But the original Bugtraq posting was pretty explanatory, 
and SANS has not released anything new. 
...SANS issued another e-mail on July 21st, with more dire warnings: "Please fix this 
before you go home today. And if you have gone home, go back to the office and fix 
it." In my opinion, this warning blew the threat completely out of proportion and was 
irresponsible to send. ...

It appears Bruce does not think very highly of SANS.  Is SANS lacking the credibility 
or as dubious as Bruce makes them sound?  I heard SANS has a decent security 
conference.  Is there better alternatives or recommendations?

In the article, Bruce recommends against SANS rewarding writing a virus that 
auto-fixes a vulnerability. I agree with Bruce in that the cure might be worse than 
the actual vulnerability, but has anyone tried this?  Did they do it because of the 
SANS reward?

Kathy
- Kathy

---======-----
--=========---
-============-
--=========---
---=======----
--------------



Free web-based email 
Performance Testing of your web site
Only at: http://www.perfstat.com
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to