On Mon, 9 Oct 2006, Gary McGraw wrote:

> The most interesting thing from an sc-l perspective about this column is
> that it emphasizes a client need we're often forced to address---the
> need for a demo exploit.  Sometimes those on the receiving end of a
> software security vulnerability don't believe that findings are real.
> An often-repeated excuse for doing nothing is "well, that's just a
> theoretical attack and it's too academic to matter."  I can't tell you
> how many times I've heard that refrain.

In 1998 we put a slogan on the L0pht.com web page.

   "That vulnerability is theoretical." -Microsoft

   L0pht - making the theoretical practical since 1992.

Microsoft doesn't say that line any more.  I guess a few worms can change
your tune.  It seems that you need to get bitten a few times before you
automatically put on the bug spray before heading down to the swamp.

-Chris
_______________________________________________
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php

Reply via email to