::This all seems to be noobie stuff. There's nothing technically cool
::to see here
You mean the report or the activity?
You seem upset that they are using M$ only(target and source). They steal
data!!! From whom to steal? From a guru that spend minimum 8 hours a day in
from of *nix?
Why to
The focus on platform here is ridiculous; can someone explain how
platform of attacker or target is extremely relevant? Since when did
people fail to see that we have plenty of inter-platform tools and
services, and plenty of tools for either platform built with the
express purpose of interaction
On 21-Feb-13 04:25, Kyle Creyts wrote:
For another example of this, an acquaintance once told me about the process
of getting internationally standardized technologies approved for deployment
in China; the process that was described to me involved giving China the
standards-based spec that
Scott Weeks wrote:
Be sure to read the source:
intelreport.mandiant.com/Mandiant_APT1_Report.pdf
Anybody happen to notice that the report sounds awfully like the
scenario laid out in Tom Clancy's latest book, Threat Vector?
--
In theory, there is no difference between theory and
On Thu, Feb 21, 2013 at 01:34:13AM +, Warren Bailey wrote:
I can't help but wonder what would happen if US Corporations simply
blocked all inbound Chinese traffic. Sure it would hurt their business,
but imagine what the Chinese people would do in response.
Would it hurt their business?
On 2/21/2013 12:03 AM, Scott Weeks wrote:
I would sure be interested in hearing about hands-on operational
experiences with encryptors. Recent experiences have left me
with a sour taste in my mouth. blech!
scott
Agreed. I've generally skipped the line side and stuck with L3 side
On Thu, Feb 21, 2013 at 11:23 AM, Jack Bates jba...@brightok.net wrote:
On 2/21/2013 12:03 AM, Scott Weeks wrote:
I would sure be interested in hearing about hands-on operational
experiences with encryptors. Recent experiences have left me
with a sour taste in my mouth. blech!
scott
Not to mention, the KG units are dot government only.. For obvious reasons.
From my Android phone on T-Mobile. The first nationwide 4G network.
Original message
From: Christopher Morrow morrowc.li...@gmail.com
Date: 02/21/2013 8:37 AM (GMT-08:00)
To: Jack Bates
I can't help but wonder what would happen if US Corporations simply
blocked all inbound Chinese traffic. Sure it would hurt their
business, but imagine what the Chinese people would do in response
First thing is the Chinese government would rejoice since they don't
want their citizens on our
--- calin.chior...@secdisk.net wrote:
From: calin.chiorean calin.chior...@secdisk.net
:: This all seems to be noobie stuff. There's nothing technically cool
:: to see here
You mean the report or the activity?
The activity.
You seem upset that they are using M$ only(target and
source).
Scott Weeks wrote:
--- calin.chior...@secdisk.net wrote:
You seem upset that they are using M$ only(target and
source).
I'm not upset. I'm pointing out what Steven Bellovin said
in just a few words: This strongly suggests that it's not
their A-team...
This is a technical mailing list where
--- kyle.cre...@gmail.com wrote:
From: Kyle Creyts kyle.cre...@gmail.com
The focus on platform here is ridiculous; can someone explain how
platform of attacker or target is extremely relevant? Since when did
--
It implies their skillset. Here's
On Feb 20, 2013, at 9:07 PM, Steven Bellovin s...@cs.columbia.edu wrote:
On Feb 20, 2013, at 1:33 PM, valdis.kletni...@vt.edu wrote:
On Wed, 20 Feb 2013 15:39:42 +0900, Randy Bush said:
boys and girls, all the cyber-capable countries are cyber-culpable. you
can bet that they are all
On Thu, 14 Feb 2013 13:18:24 -0800, Owen DeLong said:
On Feb 14, 2013, at 12:58 , Karl Auer ka...@biplane.com.au wrote:
On Thu, 2013-02-14 at 08:08 -0500, Jared Mauch wrote:
I recommend keeping your network as congruent between IPv4 and IPv6 as
possible, with dual-stack.
Why?
For one
On 2/21/2013 12:17 PM, Scott Weeks wrote:
I'm not upset. I'm pointing out what Steven Bellovin said
in just a few words: This strongly suggests that it's not
their A-team...
The A-team doesn't get caught and detailed. The purpose of the other
teams is to detect easy targets, handle easy
I wanted to bring attention to the following draft proposal from
Mellanox to export traffic information from InfiniBand switches:
http://sflow.org/draft_sflow_infiniband.txt
If you are an InfiniBand user, this is a great opportunity to think
about the types of metrics that you woud want from
a friend trying to see if bird will be better than quagga for bgp
recording can not see how to get rib dumps, as opposed to just updates.
what are we missing?
randy
I'm trying to nail down some terminology for doc purposes.
The issue: most resources on the net freely describe a fully-qualified
domian name ('FQDN') as to exclude the root domain; i.e, they exclude
the trailing dot as mandated by some RFCs such as RFC 1535:
And so their bush league by itself was responsible for all the penetrations
that mandiant says they did? Which shows that they don't have to be
particularly smart, just a bit smarter than their average spear phish or
other attack's victim.
On Friday, February 22, 2013, Jack Bates wrote:
On
bird supposedly doesn't support rib dumps at this time.
Randy Bush wrote (2013/02/22 7:11):
a friend trying to see if bird will be better than quagga for bgp
recording can not see how to get rib dumps, as opposed to just updates.
what are we missing?
randy
--
On Thu, Feb 21, 2013 at 3:58 PM, Jack Bates jba...@brightok.net wrote:
The A-team doesn't get caught and detailed
no, the A-team has BA Baraccus... he pities the fool who gets caught
and detailed... the last thing BA detailed was his black van.
On Fri, 22 Feb 2013 06:11:21 +0530, Suresh Ramasubramanian said:
And so their bush league by itself was responsible for all the penetrations
that mandiant says they did? Which shows that they don't have to be
particularly smart, just a bit smarter than their average spear phish or
other
In message 20130221225540.ga99...@numachi.com, Brian Reichert writes:
I'm trying to nail down some terminology for doc purposes.
The issue: most resources on the net freely describe a fully-qualified
domian name ('FQDN') as to exclude the root domain; i.e, they exclude
the trailing dot as
On Fri, 2013-02-22 at 16:57 +1100, Mark Andrews wrote:
RFC 952 as modified by RFC 1123 describe the legal syntax of a hostname.
There is no trailing period.
No - but a trailing period is a (common?) way to indicate that the name
as given is complete, so in a lot of contexts a trailing period is
24 matches
Mail list logo