They added it :)
Check the comment dated 265th of November from Stewart.
Thanks for the info.
Dave
PS : jim, please publish a translation of this news. Thanks.
Le 26 nov. 09 à 10:04, Donna Snow a écrit :
Plone IS listed here..
Am 26.11.2009 um 16:09 schrieb Norman Fournier:
think there may be more positive ways for plone to get this message across
For example?
I think we must have clear rules. The first hacker who puts his name on the
frontpage wins, if he documents how he'd done it. If we have more macs the
On 26 Nov 2009, at 15:09, Norman Fournier wrote:
Hello,
Worst case scenario. What if we are wrong?
Some smart punk hacks the plone and posts the hack or hints
somewhere. How many Macs can we afford to give away? How long can we
afford to pay lawyers to fight spurious claims in court?
A
Dries opinion on why it's important: Plus, large organizations that are
about to invest hundreds of thousands of dollars in a website project, don't
want to make the wrong technology choice. Instead, those large businesses
call Gartner, or any of the other analyst firms, to get advice on what
Plone IS listed here..
http://sixrevisions.com/web-applications/10-promising-content-management-systems/
Donna 'SnowWrite' Snow
Office Manager, Hacker Dojo
hackerdojo.com
Owner, C2E Training
illuminating your path to Open Source
c2etraining.com
On Wed, Nov 25, 2009 at 8:36 PM, Nate Aune
Worst case is really bad publicity. But then is it?
If it got hacked we'd patch it immediatly and patch most systems out
there and we'd explain how that system works in advance. Basically use
it to explain how open source increases security and speed of patches.
It would also show that we
On 27/11/2009, at 9:00 AM, Mark A Corum wrote:
Actually, it would show we are arrogant and cavalier about security -
which are about the worst things you can be in the eyes of an
enterprise customer.
People who are serious about security TEST the security of their
software in a professional,
Not sure how I feel about the overall idea, but the exploit documentation
condition *must* be expanded to specify that the exploit be documented to
the Plone security team, and only the security team. Publicizing of
methodology for an attack must be only after a patch is made available, and
the
hey everybody,
just a heads up that OSCON will be back in Portland, OR in 2010, and we
should make best efforts to have a strong Plone presence there.
we should consider exhibiting and getting a Plone Foundation booth as well.
nate
---BeginMessage---
If you cannot read the information below,