[nsp-sec] Solutions for the DNS vul? - Suggestion
SURFcert - Peter
p.g.m.peters at utwente.nl
Fri Jul 25 03:27:30 EDT 2008
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Barry Raveendran Greene wrote on 24-7-2008 18:29:
> Since it came up, I've push up slides here:
>
> http://www.getit.org/Mediawiki/images/4/46/SP-Security-101-Primer-1-8-3-2-Po
> ison-Module.ppt
>
> It also has some 'illustrations' of how this attack vector can be
> industrialized. So if you still have people who "don't get it," you can cut
> and paste slides.
Can this link be made public? It has much more potential to educate
people then just about the DNS problems.
- --
Peter Peters
SURFcert Officer off Duty
cert at surfnet.nl http://cert.surfnet.nl/
office-hours: +31 302 305 305 emergency (24/7): +31 622 923 564
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFIiYBielLo80lrIdIRAlXVAJ9kIblZf3cELT5fbNvV38j2h8dEmACeOToD
Y4YdWOSsxNPR2PW0YNGXyBQ=
=AL79
-----END PGP SIGNATURE-----
More information about the nsp-security
mailing list