Home
My Favorite Quotes
Hits 1 to 21 of 21
 Thomas Kristensen - “I think Steve has got some good points on why comparing vulnerability numbers is difficult.”
 Thomas Kristensen - “Because of all the barriers, it just seems like virus writers won't bother unless they see Macs as some kind of new frontier. Even then, few won't want to put in that kind of time and effort.”
 Tom Kristensen - “I'm pleased to be part of the headlines today.”
 Tom Kristensen - “Today you can say Audi brought out a car that isn't a test car, but close to it. This engine was only white paper a few months ago.”
 Thomas Kristensen - “Why bother writing a virus for Linux and Mac when you can get so many other users by writing one for Windows This is especially true because, for a virus to become serious, it has to find other vulnerable systems, and with Macs, that would be a very limited spread.”
 Thomas Kristensen - “Apple has done much better at dealing with issues in the past couple years than it did before.”
 Tom Kristensen - “I know how many people have been working very hard for this and I would like to thank all of them. Crossing the finish line was a historic moment for the diesel technology.”
 Thomas Kristensen - “It certainly is a serious threat, but given the amount of information available from Cisco you would think there would only be an extremely limited number of vulnerable systems. Most people should have patches in place before there are any exploits.”
 Hans Kristensen - “The sort of operational implementation of the Global Strike is CONCEPT PLAN (CONPLAN) 8022. That's the one that is the actual plan that the Navy and the Air Force translate into strike package for their submarines and bombers.”
 Thomas Kristensen - “I don't think many software vendors would be willing to run the risk of deliberately placing a back door in their software. The benefits compared to the huge risk of disclosure simply aren't worth it.”
 Thomas Kristensen - “While the bug in itself could look like a back door, I find it highly unlikely that it actually is a deliberately placed back door.”
 Thomas Kristensen - “We don't have an 'extremely critical' ranking very often. We use the rating sparingly so people will know when the danger is very serious.”
 Hans Kristensen - “If we did end up in a crisis where things were really tense, this decision about what is coming at you could be essential.”
 Tom Kristensen - “Audi had the courage to put such a young car into a race at an early stage. It paid off. I know how many people have been working very hard for this and I would like to thank all of them.”
 Tom Kristensen - “Today Audi had the courage to bring out this car. It is a young project, and the engine was built from a scratch of white paper not too many months ago. I'm pleased to be around for this.”
 Hans Kristensen - “It's a package (of nuclear and conventional weapons). The implication of this obviously is that nuclear weapons are being brought down from a special category of being a last resort, or sort of the ultimate weapon, to being just another tool in the toolbox.”
 Thomas Kristensen - “Since printers are connected to the network, they can be vulnerable. Attackers might use a printer connection to get to other parts of a system, and sometimes it's very easy to get into a company that way.”
 Thomas Kristensen - “Vendors can take months to create patches, and sometimes users grumble about that. But the alternative is to have patches that can be circumvented or aren't appropriate for the vulnerability. It's a difficult balance.”
 Thomas Kristensen - “Vendors can take months to create patches, and sometimes users grumble about that, ... But the alternative is to have patches that can be circumvented or aren't appropriate for the vulnerability. It's a difficult balance.”
 Thomas Kristensen - “This is big problem because a very large number of corporations use Lotus Notes. When users receive an e-mail with an attachment, all they have to do is click on the attachment to read it, and their systems are vulnerable to a remote attack.”
 Thomas Kristensen - “Three of the vulnerabilities can launch malicious code that allows an attacker to snoop on users. The other vulnerability is a DOS attack that will only work in a few cases and crash the media player when it tries to open a file.”