From: Harvey Newstrom (mail@HarveyNewstrom.com)
Date: Fri May 23 2003 - 11:43:40 MDT
Adrian Tymes wrote,
> I will grant, those vulnerabilities exist in far more
> places than most people realize. The problem is, the
> vulnerabilities almost always turn up in trivial
> systems: *unclassified* military systems (like a
> public
> Web server), *small* ecommerce systems (that haven't
> processed more than a few $millions yet,
OK. I thought we were talking about the Internet. Yes, I agree that
classified military system tend to be a little more secure. However, I have
experience with top-secret projects for the DoD, CIA, NRO and various
branches of the military. They are not as invulnerable as you seem to
imagine.
> To counter the meme that all systems are vulnerable,
> how about this test: there is an Excel spreadsheet on
> the desktop of the Windows computer I am typing this
> email at. Try to break in and tell me what the
> spreadsheet describes before Monday, 5/26/2003,
> without
> gaining physical access to the machine. Of course I
> have a firewall and so on; the real kicker is that I
> intend to leave my computer powered down this weekend
> while I attend some real world functions.
OK, you win. I can't hack into an unspecified computer that is turned off.
But if you actually want to leave it on and give me the IP address....
-- Harvey Newstrom, CISSP, IAM, GSEC, IBMCP <www.HarveyNewstrom.com> <www.Newstaff.com>
This archive was generated by hypermail 2.1.5 : Fri May 23 2003 - 11:57:39 MDT