tag:blogger.com,1999:blog-13756280.post8970641294083975034..comments2024-02-08T03:44:23.780-08:00Comments on Jeremiah Grossman: Why aren’t more website hacked?Jeremiah Grossmanhttp://www.blogger.com/profile/05017778127841311186noreply@blogger.comBlogger12125tag:blogger.com,1999:blog-13756280.post-77687551535729825772007-08-26T11:53:00.000-07:002007-08-26T11:53:00.000-07:00Interesting:http://www.gnucitizen.org/blog/i-dont-...Interesting:<BR/>http://www.gnucitizen.org/blog/i-dont-think-that-you-understand-firefox3-vulnerable-by-design<BR/><BR/>(didn't bother to find a "good" entry to comment on.. ;P)Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-13756280.post-34516412938817476992007-08-21T06:43:00.000-07:002007-08-21T06:43:00.000-07:00@MustLive: The more that is documented, the more c...@MustLive: The more that is documented, the more chance we have to learn from it. Nice work.Jeremiah Grossmanhttps://www.blogger.com/profile/05017778127841311186noreply@blogger.comtag:blogger.com,1999:blog-13756280.post-87458754943705845472007-08-20T18:34:00.000-07:002007-08-20T18:34:00.000-07:00Nice article, Jeremiah.Yes, the public isn’t aware...Nice article, Jeremiah.<BR/><BR/>Yes, the public isn’t aware of every website hack and media doesn’t advertise every incident. And to change this situation I work on my own Hackers Activity Summary. I'm looking for all information about sites hacks in Uanet and writing my summaries. World needs to know its heroes ;-).<BR/><BR/>I wrote next summaries already:<BR/><BR/>Hackers activity in Uanet in 2006<BR/>http://websecurity.com.ua/474/<BR/>Totals of hackers activity in Uanet in 2006<BR/>http://websecurity.com.ua/613/<BR/>Hackers activity in Uanet in 1st half year 2007<BR/>http://websecurity.com.ua/1244/Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-13756280.post-89384424940187993922007-08-20T11:09:00.000-07:002007-08-20T11:09:00.000-07:00happens every once in a while, but more and more.happens every once in a while, but more and more.Jeremiah Grossmanhttps://www.blogger.com/profile/05017778127841311186noreply@blogger.comtag:blogger.com,1999:blog-13756280.post-51947489770540715722007-08-20T11:07:00.000-07:002007-08-20T11:07:00.000-07:00No problem. It was a good article. I'm suprised th...No problem. It was a good article. I'm suprised that clients don't ask this question more often.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-13756280.post-3672788165771246372007-08-20T08:06:00.000-07:002007-08-20T08:06:00.000-07:00Thorin, thanks! I think all this blogging has real...Thorin, thanks! I think all this blogging has really helped my writing. FAR fewer typos have been showing up.Jeremiah Grossmanhttps://www.blogger.com/profile/05017778127841311186noreply@blogger.comtag:blogger.com,1999:blog-13756280.post-57055265783427858702007-08-20T05:37:00.000-07:002007-08-20T05:37:00.000-07:00"hourly or and why isn’t MySpace and Facebook"Look..."hourly or and why isn’t MySpace and Facebook"<BR/><BR/>Looks like a little typo in there. Unless you meant "and/or". But, really if you meant "and/or" you should just say "or" since in an "or" both is an acceptable answer.<BR/><BR/>@ amanfrommars ... I'm curious what's the distrinction between "hack" and "crack"Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-13756280.post-82061943406913515952007-08-19T21:48:00.000-07:002007-08-19T21:48:00.000-07:00Cool to get a mention. Thanks. I don't really pro...Cool to get a mention. Thanks. I don't really profess to doing much more than ranting...keeps me sane in this industry. And if I only have one person interested in my rants, well that's a pretty poor percentage. Nice article JG.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-13756280.post-23578169056842775982007-08-18T14:11:00.000-07:002007-08-18T14:11:00.000-07:00Jordan, general theme mainly. From last one disclo...Jordan, general theme mainly. From last one disclosure to the 90% of web applications suck. Not sure how but sorry if felt spammed.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-13756280.post-23617067441837396042007-08-18T07:48:00.000-07:002007-08-18T07:48:00.000-07:00@AnonymousUmm, which entry/entries were you referr...@Anonymous<BR/><BR/>Umm, which entry/entries were you referring to specifically? I'm not going to go read the entire blog to find out, and the first few posts were neither directly relevant, nor particularly mind-blowing.<BR/><BR/>Not trying to knock on Senior Drazic here, but if you're going to spam a link, at least have some direct relevance.Jordanhttps://www.blogger.com/profile/08341608982649448622noreply@blogger.comtag:blogger.com,1999:blog-13756280.post-64503328533144732942007-08-18T07:31:00.000-07:002007-08-18T07:31:00.000-07:00If you can hack code, you can crack code and if yo...If you can hack code, you can crack code and if you can crack code you can write code and if you can write code the Computer world is yours to shape.....which is what the Masters are doing whilst you deal with the "bad guys" ...the flies around the beast.amanfromMarshttps://www.blogger.com/profile/05742510938925905392noreply@blogger.comtag:blogger.com,1999:blog-13756280.post-32422243585341624492007-08-18T05:37:00.000-07:002007-08-18T05:37:00.000-07:00DD from SA covers this better than anyone in his b...DD from SA covers this better than anyone in his blog: http://beastorbuddha.com/category/web-application-security/Anonymousnoreply@blogger.com