TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Geo
from: Frank Haber
date: 2005-10-21 10:58:04
subject: Re: another backupexec exploit

From: "Frank Haber" 

Y'know, Geo., this is an excellent example of when something closer to full
disclosure, but not full disclosure, works.  You make a preliminary yap
about a kind of service that not everyone runs, but is commonly run at
companies - which are by definition more attractive targets.  Immediately,
you are taken into the fold, into the priesthood.  You collect data; you
make a coherent presentation.  You communicate with the vendors, again
privately, stating that not only are backup agents a likely next target,
but that the cat is out of the bag - their agents are being discussed
publicly, with some details, and it's obviously now only a matter of time.

This is not Rich's blackmail; it's creative pressure - a nice balance.  Of
course, if you didn't get results....(g).

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.