| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: another backupexec exploit |
From: "Frank Haber" Y'know, Geo., this is an excellent example of when something closer to full disclosure, but not full disclosure, works. You make a preliminary yap about a kind of service that not everyone runs, but is commonly run at companies - which are by definition more attractive targets. Immediately, you are taken into the fold, into the priesthood. You collect data; you make a coherent presentation. You communicate with the vendors, again privately, stating that not only are backup agents a likely next target, but that the cat is out of the bag - their agents are being discussed publicly, with some details, and it's obviously now only a matter of time. This is not Rich's blackmail; it's creative pressure - a nice balance. Of course, if you didn't get results....(g). --- BBBS/NT v4.01 Flag-5* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45) SEEN-BY: 633/267 270 5030/786 @PATH: 379/45 1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.