[Dshield] System compromise rates
rick at jaray.net
Tue Jan 13 17:18:31 GMT 2004
Boy I don't know.. But because of the microsoft holes and such.. Should
windows be included in your malware figures?
> -----Original Message-----
> From: list-bounces at dshield.org
> [mailto:list-bounces at dshield.org] On Behalf Of Pete Cap
> Sent: Tuesday, January 13, 2004 11:08 AM
> To: General DShield Discussion List
> Subject: [Dshield] System compromise rates
> Greetings all,
> I have been tasked with analysing historical trends in
> malware--discovery rates, longevity, pervasiveness, payload,
> etc.--and it occurs to me that a similar analysis might be
> conducted on system compromises...e.g. time and date of
> compromise, source attributes, target attributes, what was
> done, and so forth.
> Does anyone know if such data exist? If so, where?
> Chris Brenton <cbrenton at chrisbrenton.org> wrote:
> On Tue, 2004-01-13 at 09:12, David Sentelle wrote:
> > My mail (poor) program won't let me neatly comment inline, my
> > apologies.
> Ya I hope Novell does not screw up Ximian the same way. ;-)
> > You still need to be aware that those addresses ARE routable, but
> > should not be allowed inside from outside & vice-versa.
> I think this is the point that people miss. Internet routing
> will not route _to_ a private address. This does not however
> stop you from receiving traffic _from_ a private address.
Virus Scanned and Filtered by http://www.FamHost.com E-Mail System.
More information about the list