2005/12/07 : Andrew Cencini, Kevin Yu, Tony Chan write upon the different choices of vulnerability disclosures.
"When a software vulnerability is discovered by a third party, the complex question of who, what...Read more
1998/08/04 : Matt Richtel writes in the NY Times about Back Orifice.
Members of the hacker group "Cult of the Dead Cow," released the program "Back Orifice" 'to encourage Microsoft Corp. to pay closer attention to computer security issues.'
This artifact is part of the ...Read more
1994/12/01 : Christopher Klaus describes a proof of Bugtraq efficiency.
This artifact is part of the Bugtraq Bundle. Read more
2000/09/15 : Schneier published his monthly newsletter and explains here his opinion on full disclosure debate.
"What’s interesting is that everybody wants the same thing; they’re just disagreeing about the best way to get there.
When a security vulnerability exists in a...Read more
2000 : The authors explain their view pro full disclosure and its aim of educating people. They add their opinion on the bad sides of full disclosure.
"The only rational solution is to make the script kiddies responsible for their actions, as we do with all criminals...Read more
2000/10 : Interview with Elias Levy (Bugtraq). He explains his opinion on full disclosure.
"Corporations only purpose is to generate money. Software vendors will only "take security seriously" when their customers do. Until then they have no incentive to...Read more
1997 : L0pht, "a group of sophisticated hackers has stepped up the assault on the security of Microsoft's Windows NT operating system."
The group began then negotiating with Microsoft and other companies. They agreed to notice them a month before the...Read more
2001/10/02 : Jay Lyman writes into the NewsFactor Network about full disclosure debate.
Read more