Big Brother Awards
quintessenz search  /  subscribe  /  upload  /  contact  
/q/depesche *
/kampaigns
/topiqs
/doquments
/contaqt
/about
/handheld
/subscribe
RSS-Feed Depeschen RSS
Hosted by NESSUS
<<   ^   >>
Date: 1999-01-11

Security: HERT kontrolliert CERT


-.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-

Weil man einer Agentur für Compusicherheit im Internet, die
im Dunstkreis der US-Geheimdienste entstanden ist
[Computer Emergency Response Team -CERT], nicht blind
verttrauen sollte, bedarf es einer Kontrollinstanz. Die nennt
sich HERT: Hacker Emergency Response Team.

post/scrypt: Wer hat da "Ausgewogenheit" gesagt?

-.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
January 10th 1999, 09:12 EST
HERT stands for Hacker Emergency Response Team and is
an international non-profit organization based in France.

Exactly like CERT, our US counterpart, our first goal is to
provide accurate information about computer security
vulnerabilities, provide incident response services to sites
that have been the victims of attacks, publish security alerts
and find new vulnerabilities. Our next goal is to represent
concerned computer users and organizations as an advocacy
league.

Why HERT is a better alternative to CERT?

National Computer Security Center, a sub-branch of the
National Security Agency initiated the creation of the
Computer Emergency Response Team and was funded by
the Defense Advanced Research Agency (DARPA).

A majority of people think CERT is doing a brilliant job, but
when you examine CERT more closely, one could believe
CERT is a bit corrupted.

Just take a look at the CERT statistics, since 1995, for 1027
vulnerabilities reported, they have published only 55
advisories bulletins. Is this a joke, did they count duplicate
vulnerability reports? Was there 1000 cert initiated vendor
advisories?

>From an organization directed by US Military Intelligence,
you must assume the worst especially when they brag about
their Information Superiority.

We decided to create HERT, when system administrators of
highly sensitive US networks informed us that they were
supplied with official vendor patches months before public
announcement were made by vendors, CERT or full-
disclosure mailing lists like Bugtraq.

Source
http://linuxtoday.com/stories/2196.html

relayed by
jericho@dimensional.com

-.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-

- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
edited by
published on: 1999-01-11
comments to office@quintessenz.at
subscribe Newsletter
- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
<<   ^   >>
Druck mich

BigBrotherAwards


Eintritt zur Gala
sichern ...



25. Oktober 2023
#BBA23
Big Brother Awards Austria
 CURRENTLY RUNNING
q/Talk 1.Juli: The Danger of Software Users Don't Control
Dr.h.c. Richard Stallman live in Wien, dem Begründer der GPL und des Free-Software-Movements
 
 !WATCH OUT!
bits4free 14.Juli 2011: OpenStreetMap Erfinder Steve Coast live in Wien
Wie OpenStreetMaps die Welt abbildet und was ein erfolgreiches Crowdsourcing Projekt ausmacht.