[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Full-Disclosure] An open question for Snort and Project Honeynet



One more in the idiot bin.

Paul Schmehl (pauls@xxxxxxxxxxxx)
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu/~pauls/ 

> -----Original Message-----
> From: Matsu Kandagawa [mailto:matsu@xxxxxxxxxxxxx] 
> Sent: Wednesday, September 24, 2003 2:30 PM
> To: full-disclosure@xxxxxxxxxxxxxxxx
> Subject: Re: [Full-Disclosure] An open question for Snort and 
> Project Honeynet
> 
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> Sorry, I must have missed it: where are the answers to my 
> questions about the "off-by-one's, integer overflows, and 
> logic bugs" m1lton alluded to? Where did anyone explain away 
> why Sneeze won't work and why the idea that Sebek, Honeyd and 
> VMWare are egregiously detectable by anyone who's ever  
> worked with them is something I just pulled out of my head?

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html