On Wed, Jul 9, 2014 at 2:23 PM, Ted Mittelstaedt <t...@ipinc.net> wrote:
>
> First of all why do people insist on hiding names of companies that
> do stuff like this?  It just makes it look like your manufacturing
> an event that doesn't exist, it destroys your credibility.
>
      You mean besides NDAs and policies that at the very least might
cause those people to be fired by their employers? If you ever went to
a defcon open presentation, they do their best not to divulge the
names of involved parties.

> Secondly, if you think that this is an example of "badness" on Windows
> security best practices you simply have not seen Windows deployed in
> 90% of production networks out there.  This is NOTHING compared to S.O.P. on
> most Windows setups.
>
> Imagine MS-DOS/LanManager network security model of 30 years ago.  Now
> imagine Windows networks today in the vast majority of production installs.
>
> NO EFFING DIFFERENCE!!!!!!!!!
>
> Ted
>
>
> PS:  Naturally there will be some Windows-kool-aid drinker who is going
> to angrily reply to this post claiming Windows is secure if people just
> followed Microsoft's directions.....
>
>
>
> On 7/9/2014 11:06 AM, David F. Skoll wrote:
>>
>> On Wed, 09 Jul 2014 05:44:34 +0200
>> Karsten Bräckelmann<guent...@rudersport.de>  wrote:
>>
>>> If you deliberately try to sneak past sensible security measures, you
>>> should not be surprised to be blocked. The attempt by an honest user
>>> to disguise any $file (he did it on purpose, so he knows there's
>>> issues with that) is in no way better than a dis-honest user
>>> disguising a file.
>>
>>
>> Since implementing this rule, I have been *shocked* to discover that a
>> large data processing company (name hidden to protect the guilty)
>> sends out information about credit-card processing in the form of
>> obfuscated Microsoft Windows executable files!!!  (They're renamed to
>> end in ".ex" instead of ".exe")  I tried running one of these files inside
>> Wine.  It's a "PGP Self Decrypting Archive" that asks for a passphrase.
>>
>> The mind boggles!  *THIS* is the state of Windows "security" best
>> practices?
>>
>> Regards,
>>
>> David.
>
>
> ---
> This email is free from viruses and malware because avast! Antivirus
> protection is active.
> http://www.avast.com
>

Reply via email to