Full Disclosure mailing list archives
Re: Sidewinder G2
From: Valdis.Kletnieks () vt edu
Date: Tue, 18 Nov 2003 14:50:13 -0500
On Tue, 18 Nov 2003 12:26:36 EST, David Maynor said:
I think that may be a bad example as that talks about crypto challenges as oppsoed to operational security products. There is a big diffrence in cryptanalysis and bug hunting in firewalls.
"Testing can prove the presence of flaws, but not their absence" -- Dijkstra. The same exact logic of why a crypto challenge doesn't prove anything applies to a firewall challenge as well.
Attachment:
_bin
Description:
Current thread:
- RE: Sidewinder G2, (continued)
- RE: Sidewinder G2 Schmehl, Paul L (Nov 18)
- RE: Sidewinder G2 Ron DuFresne (Nov 20)
- RE: Sidewinder G2 Perrymon, Josh L. (Nov 18)
- Re: Sidewinder G2 Valdis . Kletnieks (Nov 18)
- RE: Sidewinder G2 Patrick Doyle (Nov 18)
- Re: Sidewinder G2 Michael Gale (Nov 18)
- RE: Sidewinder G2 Kruse, Steve (Nov 18)
- RE: Sidewinder G2 Brent J. Nordquist (Nov 18)
- Re: Sidewinder G2 David Maynor (Nov 18)
- Re: Sidewinder G2 Brent J. Nordquist (Nov 18)
- Re: Sidewinder G2 Valdis . Kletnieks (Nov 18)
- Re: Sidewinder G2 David Maynor (Nov 18)
- RE: Sidewinder G2 Brent J. Nordquist (Nov 18)
- RE: Sidewinder G2 Ron DuFresne (Nov 20)
- RE: Sidewinder G2 Mike Fratto (Nov 20)
- RE: Sidewinder G2 Ron DuFresne (Nov 25)
- RE: Sidewinder G2 Schmehl, Paul L (Nov 18)
- Re: Sidewinder G2 Valdis . Kletnieks (Nov 18)
- Re: Sidewinder G2 Michael Gale (Nov 18)