tag:blogger.com,1999:blog-5235419263414453422.post3172177045153868118..comments2024-02-23T01:30:06.101-08:00Comments on Early Warning: Known Software VulnerabilitiesStuart Stanifordhttp://www.blogger.com/profile/07182839827506265860noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-5235419263414453422.post-80503247428177038762013-05-20T10:55:38.444-07:002013-05-20T10:55:38.444-07:00Totaly out of context. Sorry.
Alternative energy ...Totaly out of context. Sorry.<br /><br />Alternative energy breakthrough!<br />Independent report confirms excess energy!<br />http://arxiv.org/abs/1305.3913<br /><br />This has the potential to change (or ruin) the world.Cellehttps://www.blogger.com/profile/00983313218702890947noreply@blogger.comtag:blogger.com,1999:blog-5235419263414453422.post-78552431966166736632013-05-17T08:16:08.436-07:002013-05-17T08:16:08.436-07:00One of the smaller software communities I particip...One of the smaller software communities I participate in has just this year begun using this service when we discover potentially exploitable bugs.<br /><br />My sense of this database is that it understates the magnitude of the problem: software is not really the thing that's exploitable, it's the computer system that is: the *running* code.<br /><br />This database manages vulnerabilities against software, but my guess would be that most significant exploits come in the form of poorly configured and poorly managed computers.<br /><br />The sort of problem captured by this data is necessary but not sufficient to successfully penetrate a computer system.Anonymousnoreply@blogger.com