Cc: WISPA General List wireless@wispa.org, a...@afmug.com
Sent: Monday, May 14, 2012 12:29:46 AM
Subject: Re: [WISPA] [AFMUG] MK DOS Attack vulnerability
On Mon, 2012-05-14 at 01:12 -0400, Josh Luthman wrote:
http://gregsowell.com/?p=3773
Yeah. Greg said the same thing I did. :-) FWIW, port
On Tue, 2012-05-15 at 20:23 -0500, Mike Hammett wrote:
Are you one of those guys that think a system is only secure if it's never
created in the first place? ;-)
Are you kidding? lol. I think a system is only secure when the user
INTENTIONALLY makes it so. I do, however, believe in REAL
On Thu, 2012-05-10 at 17:43 +, Gino Villarini wrote:
http://www.133tsec.com/2012/04/30/0day-ddos-mikrotik-server-side-ddos-attack/
And with a proper input firewall, this means what? Not a thing.
Vulnerabilities, such as this one, are not an issue if you stop the
attack before it can
http://gregsowell.com/?p=3773
Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy, OH 45373
On Mon, May 14, 2012 at 12:48 AM, Butch Evans but...@butchevans.com wrote:
On Thu, 2012-05-10 at 17:43 +, Gino Villarini wrote:
On Mon, 2012-05-14 at 01:12 -0400, Josh Luthman wrote:
http://gregsowell.com/?p=3773
Yeah. Greg said the same thing I did. :-) FWIW, port knocking and
changing the port is NOT a good security mechanism, though both would
likely thwart the bulk of the attacks on this vulnerability.
--