Good morning Hacker,
Your mission, should you decide to accept it is to save the CyberSpace.
As mentioned in the U.S. INTERNATIONAL STRATEGY FOR CYBERSPACE[1]
document, we need interoperable and secure technical standards,
determined by technical experts.
Requirements: ~15 minutes of your time, a headset and the Boléro
The Rand Strategy Assessment Center provides you the following
computerised model:
Software Vulnerability Mitigation Automation,
(an incomplete Conceptual Map)
https://corevidence.com/research/vulnerability_interoperability_ivil_v1.jpg
some links extracted:
[1]
http://www.whitehouse.gov/blog/2011/05/16/launching-us-international-strategy-cyberspace
IVIL-XML
http://www.cupfighter.net/index.php/2010/10/ivil-an-xml-schema-to-exchange-vulnerability-information/
ThreadFixhttp://code.google.com/p/threadfix/
We will provide you soon IVIL v1.0, so be ready for action!
i = x2ivil + ivil2x
where i is interoperability and x a software (vulnerability
scanner,... + waf, virtual patching system, ...)
Examples:
openvas2ivil
nessus2ivil
qualys2ivil
nikto2ivil
ivil2mod_security
ivil2snort
As always, should you or any of your I.M. Force be caught or killed, the
Secretary will disavow any knowledge of your actions.
This tape will always stay here.
--
Jerome Athias - NETpeas
VP, Director of Software Engineer
Palo Alto - Paris - Casablanca
www.netpeas.com
-
Stay updated on Security: www.vulnerabilitydatabase.com
The computer security is an art form. It's the ultimate martial art.
smime.p7s
Description: Signature cryptographique S/MIME
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/