Good morning Hacker, Your mission, should you decide to accept it is to save the CyberSpace. As mentioned in the U.S. "INTERNATIONAL STRATEGY FOR CYBERSPACE"[1] document, we need "interoperable and secure technical standards, determined by technical experts". Requirements: ~15 minutes of your time, a headset and the Boléro The Rand Strategy Assessment Center provides you the following computerised model: "Software Vulnerability Mitigation Automation", (an incomplete Conceptual Map) https://corevidence.com/research/vulnerability_interoperability_ivil_v1.jpg some links extracted: [1] http://www.whitehouse.gov/blog/2011/05/16/launching-us-international-strategy-cyberspace IVIL-XML http://www.cupfighter.net/index.php/2010/10/ivil-an-xml-schema-to-exchange-vulnerability-information/ ThreadFix http://code.google.com/p/threadfix/ We will provide you soon IVIL v1.0, so be ready for action! i = x2ivil + ivil2x where "i" is interoperability and "x" a software (vulnerability scanner,... + waf, virtual patching system, ...) Examples: openvas2ivil nessus2ivil qualys2ivil nikto2ivil ivil2mod_security ivil2snort As always, should you or any of your I.M. Force be caught or killed, the Secretary will disavow any knowledge of your actions. This tape will always stay here. -- Jerome Athias - NETpeas VP, Director of Software Engineer Palo Alto - Paris - Casablanca www.netpeas.com --------------------------------------------- Stay updated on Security: www.vulnerabilitydatabase.com "The computer security is an art form. It's the ultimate martial art."
Attachment:
smime.p7s
Description: Signature cryptographique S/MIME
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/