::: They don't have 20 brains, they have a country full

It was just an example :-) to point out the scale of  developers vs operators.

Calin

---- On Wed, 20 Feb 2013 09:39:24 +0100 Warren 
Bailey<wbai...@satelliteintelligencegroup.com> wrote ---- 

 >   They don't have 20 brains, they have a country full. I was in Beijing last 
 > year, it was eye opening  to the see the state of affairs there. 
 >  
 >  
 >  
 >  
 >   From my Android phone on T-Mobile. The first nationwide 4G network.
 >  
 >  
 >  
 >  
 >  -------- Original message --------
 >  From: "calin.chiorean" <calin.chior...@secdisk.net> 
 >  Date: 02/20/2013 12:36 AM (GMT-08:00) 
 >  To: Warren Bailey <wbai...@satelliteintelligencegroup.com> 
 >  Cc: sur...@mauigateway.com,nanog@nanog.org 
 >  Subject: Re: NYT covers China cyberthreat 
 >  
 >  
 >  
 >   IMO, if we stick to the document and they are organized in military style, 
 > then a person who collect information, should focus only on that particular 
 > phase. That person is an operator, he or she should not be keep busy 
 > remembering long  CLI commands. The scope is to deliver ASAP.
 >  
 >  No matter how much I like CLI and to put my fingers into text mode, I have 
 > to admit that point and click in windows is an easier and faster method to 
 > achieve the task I did mention. As Warren mention, if you have 20 "brains" 
 > it's easy to put those people port  a tool from *nix to other platform and 
 > have the other 500 operators run it in windows. It's just a matter of good 
 > sense and "business" effectiveness :)
 >  
 >  Maybe I misinterpret information, but this is how I see things.
 >  
 >  Cheers,
 >  Calin  
 >  
 >  
 >  ---- On Wed, 20 Feb 2013 09:24:10 +0100 Warren 
 > Bailey<wbai...@satelliteintelligencegroup.com> wrote ---- 
 >  
 >   > They are when you have a college full of programmers. 
 >   >  
 >   >  
 >   > From my Android phone on T-Mobile. The first nationwide 4G network. 
 >   >  
 >   >  
 >   >  
 >   > -------- Original message -------- 
 >   > From: Scott Weeks <sur...@mauigateway.com> 
 >   > Date: 02/20/2013 12:23 AM (GMT-08:00) 
 >   > To: nanog@nanog.org 
 >   > Subject: Re: NYT covers China cyberthreat 
 >   >  
 >   >  
 >   >  
 >   > --- calin.chior...@secdisk.net wrote: 
 >   > From: "calin.chiorean" <calin.chior...@secdisk.net> 
 >   >  
 >   > <snipped> 
 >   > :: when all tools are available for windows os, you just have to compile 
 > them. 
 >   > <sniped out the rest> 
 >   > ------------------------------------------------- 
 >   >  
 >   >  
 >   > They're not all available for m$. 
 >   >  
 >   > scott 
 >   >  
 >   >  
 >   >  
 >   >  
 >   >  
 >   >  
 >   > ---- On Wed, 20 Feb 2013 09:02:35 +0100 Scott Weeks  wrote ---- 
 >   > >Be sure to read the source: 
 >   > > 
 >   > >intelreport.mandiant.com/Mandiant_APT1_Report.pdf 
 >   > > 
 >   > >I'm only part way through, but I find it hard to believe that 
 >   > >only micro$loth computers are used as the attack OS. Maybe I 
 >   > >haven't gotten far enough through report to find the part 
 >   > >where they use the *nix boxes? 
 >   >  
 >   >  
 >   >  
 >   > 
 >  
 >  
 >  
 >   
 > 


Reply via email to