The code itself is not opensource, but even if it was, it would not help you that much... the code without the database behind is not very useful ;)
What would you need to bypass your "security breach"? an automatic NDA agreement which wesunsolve would take? something else? You can also upload patch information without specifying the real hostname of the server and without giving information about your company... Information retention looks like security by obscurantism... anyway. Regards, Thomas On Fri, 27 Apr 2012 08:46:45 -0400 Rajiv Gunja <[email protected]> wrote: > Is this code open source? Will it be possible to share it with > community? For some of us giving out server information is also > considered security breach. Please let me know. Thanks. > -GGR > On Apr 27, 2012 3:20 AM, "Thomas Gouverneur" <[email protected]> wrote: > > > Hello dear patcher! > > > > Martin suggested me to announce this here also: WeSunSolve website > > has integrated PCA to make some patches and security (CVE) report > > for your servers! > > > > Moreover, you can setup mail report to be sent to you periodically. > > Last but not least, you can define a "Patchdiag Delay" for theses > > reports: Define a delay (one day, one week, one month, six > > months...) and patchdiag.xref selection for your report will be > > made accordingly. > > > > To have more details on that, I recommend you to read the today's > > WeSunSolve site news: http://ws2.be/19xtf3fh and also the Wiki: > > http://ws2.be/19xtf38k > > > > If you give a try, don't hesitate to give feedback or to make > > suggestion on what's eventually missing in theses reports... > > > > Thanks for your attention ;) > > Best Regards, > > > > -- > > Thomas Gouverneur > > T: +32 498 23 00 40 > > W: http://espix.net > > M: <[email protected]> > > > > -- Thomas Gouverneur _____ _ | ____|___ _ __ (_)_ __ | _| / __| '_ \| \ \/ / | |___\__ \ |_) | |> < |_____|___/ .__/|_/_/\_\ Network |_| SPRL TVA: BE683601811 T: +32 498 23 00 40 W: http://espix.net M: <[email protected]>
