HOME FORUMS MEMBERS RECENT POSTS LOG IN  
× Авторизация
Имя пользователя:
Пароль:
Нет аккаунта? Регистрация
Баннер 1   Баннер 2
НОВЫЕ ТОРГОВАЯ НОВОСТИ ЧАТ
loading...
Скрыть
Вернуться   ANTICHAT > ОФФТОП > Forum for discussion of ANTICHAT
   
Ответ
 
Опции темы Поиск в этой теме Опции просмотра

Unpatched Windows PCs own3d in less than four minutes
  #1  
Старый 16.07.2008, 00:35
Fugitif
Постоянный
Регистрация: 23.09.2007
Сообщений: 416
С нами: 9806786

Репутация: 869
По умолчанию Unpatched Windows PCs own3d in less than four minutes

Gone in 240 seconds


Цитата:
An unpatched PC is likely to last just four minutes on the internet before being attacked and compromised.

The time it takes for a PC to get itself owned varies by operating system and what activities a user engages in - but even allowing for this, putting an unpatched Windows PC directly onto the net in the hope that it downloads patches faster than it gets exploited give you "odds that you wouldn't bet on in Vegas", warns Lorna Hutcheson, a researcher at the SANS Institute's Internet Storm Centre (ISC).

The ISC maintains a survival time graph that gives an indication of how long a system might last on the internet before stumbling into the crosshairs of hackers, who routinely use automated tools to scan and commandeer vulnerable systems. Survival time, the ISC notes, has dropped markedly over the last two years, and is currently a fairly scary four minutes.

Security experts advise using a NAT (network address translation router) and personal firewall before connecting systems to the net on anything outside sacrificial systems. This best practice can create tensions between management, who want new systems up and running as quickly as possible, and security admins.

"More than once, I've dealt with a compromise of a system that was placed on the network before it was hardened," Hutcheson writes. "I got the same answer every time - 'We needed it working ASAP'. However, more time was spent playing clean up from it than if it was just done right the first time."

Thorsten Holz, of the German Honeynet Project, explains how exploits lead to system compromises. His analysis - complete with statistics and graphs - can be found here. ®
http://honeyblog.org/archives/193-Su...e-Fittest.html
From:

http://www.theregister.co.uk/2008/07...urvival_drops/
 
Ответить с цитированием
Ответ



Похожие темы
Тема Автор Раздел Ответов Последнее сообщение
Определиние Ip Dimann Болталка 18 09.06.2008 01:06
Полезные ключи реестра. Scofild Windows 6 23.04.2008 16:17
Инет на 2 компе TrypoED "Железо" 15 19.03.2008 00:42



Здесь присутствуют: 1 (пользователей: 0 , гостей: 1)
 


Быстрый переход




ANTICHAT ™ © 2001- Antichat Kft.