<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Exploiting Undercover Vulnerabilities</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;p=36" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com/?p=36</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Wed, 21 Aug 2013 23:28:51 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>By: Anton Chuvakin</title>
		<link>http://spiresecurity.com/?p=36&#038;cpage=1#comment-33</link>
		<dc:creator>Anton Chuvakin</dc:creator>
		<pubDate>Mon, 13 Jul 2009 19:32:57 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=36#comment-33</guid>
		<description><![CDATA[BTW, Perfect &quot;Pete-read&quot;:

&lt;a href=&quot;http://romeo.copyandpaste.info/txt/ats-policy.txt&quot; rel=&quot;nofollow&quot;&gt;http://romeo.copyandpaste.info/txt/ats-policy.txt&lt;/a&gt;

&quot;... After the five days have passed, we must conclude that the vendor has issued
some sort of hotfix or a patch to fix the security problem and now the HACKER
sends the bug information, the exploit to the COMMUNITY and possible a
patch too.

Now has security been increased? Do you really think that most of COMMUNITY.
ie: the people that read BUGTRAQ want to patch their servers? No! It is
script kiddies that are waiting for the latest warez, as soon as HACKER
releases this new bug to the COMMUNITY thousands of script kiddies with
little or no skill will start breaking into hundreds of thousands
of boxes and if this bug were genuine, they would! And belive me lots of
boxes would get destroyed.

Now, I ask.. is this a good thing you are doing by posting to the COMMUNITY
all logic says NO!&quot;
]]></description>
		<content:encoded><![CDATA[<p>BTW, Perfect &#8220;Pete-read&#8221;:</p>
<p><a href="http://romeo.copyandpaste.info/txt/ats-policy.txt" rel="nofollow">http://romeo.copyandpaste.info/txt/ats-policy.txt</a></p>
<p>&#8220;&#8230; After the five days have passed, we must conclude that the vendor has issued<br />
some sort of hotfix or a patch to fix the security problem and now the HACKER<br />
sends the bug information, the exploit to the COMMUNITY and possible a<br />
patch too.</p>
<p>Now has security been increased? Do you really think that most of COMMUNITY.<br />
ie: the people that read BUGTRAQ want to patch their servers? No! It is<br />
script kiddies that are waiting for the latest warez, as soon as HACKER<br />
releases this new bug to the COMMUNITY thousands of script kiddies with<br />
little or no skill will start breaking into hundreds of thousands<br />
of boxes and if this bug were genuine, they would! And belive me lots of<br />
boxes would get destroyed.</p>
<p>Now, I ask.. is this a good thing you are doing by posting to the COMMUNITY<br />
all logic says NO!&#8221;</p>
]]></content:encoded>
	</item>
</channel>
</rss>
