Security Blog

The latest news and insights from Google on security and safety on the Internet

Contributing To Open Source Software Security

5 mai 2008
Share on Twitter Share on Facebook
Google

11 comentarii :

Grove Group spunea...
Acest comentariu a fost eliminat de administratorul blogului.
11 mai 2008 la 10:20
Unknown spunea...

The "request a review" option is gone from my webmaster page for metrotimes.com, and I need to remove the "This site may harm your computer" message now that the hack has been fixed. What should I do?

12 mai 2008 la 12:20
yaminiseotips.com spunea...

Hi this is danyy sorry to use this i came across your blog its very interesting your content also very nice if you like any design for your site like animated header at top of the blog i will provide you for free of cost in return i need link from your blog if interested please let me know.

Regards
Danyy
dn.danyy@gmail.com

26 iunie 2008 la 06:50
Nima spunea...
Acest comentariu a fost eliminat de administratorul blogului.
18 iulie 2008 la 12:20
Grove Group spunea...
Acest comentariu a fost eliminat de administratorul blogului.
21 iulie 2008 la 09:20
Unknown spunea...

Olha eu adoro o orkut, mas eu vou dar uma opinião importante que eu sei que os outros usuários vão gostar.Seria bom que a gente tivesse a opÇão de escolher a cor do orkut,pois é muito chato se ter uma cor padrão para uma coisa que é da gente, sabe? Espero que gostem da idéia e ponha ela em ação.Obrigado desde já...

2 august 2008 la 14:04
Anonim spunea...
Acest comentariu a fost eliminat de administratorul blogului.
30 august 2008 la 06:54
Anonim spunea...
Acest comentariu a fost eliminat de administratorul blogului.
9 septembrie 2008 la 07:55
Anonim spunea...

I' sorry to say oCERT was not helpful. In fact I'm really considering they are doing social engineering. In reviewing my open source project, Andrea Barisani was arrogant and dogmatic. oCERT claimed to have discovered a flaw, then they did such noise that every single virus witter would be aware of this flaw, then oCERT provided a patch that breaks functionality and proceeded to distribute this patch saying it was generated by project maintainer. Finally they announced an embargo and then they broken the embargo saying the info was leaked. Please, oCERT stay away of open source projects.

29 martie 2009 la 09:55
Unknown spunea...

ememe: I don't know who are you nor what you are talking about. Provide more details if you want to make an informative post instead of just trolling.

oCERT never breaks embargo, if someone else involved in the process (oCERT is not the only party) leaks and breaks an embargo then it's oCERT duty to release an advisory as the information is public anyway.

oCERT doesn't do "social engineering" but this statement comments itself to be honest. Our reputation is well established, just look at our advisories and our members to get an idea.

If by chance you are referring to our last lcms advisory then you should probably read some comments from here:

http://www.valdyas.org/fading/index.cgi/software/beware_of_friends_bearing_patches.comments

as well as the advisory itself.

Your mention of "virus witter" (I assume you mean virus writers) is similiar to lcms maintainer.....go figure.

Andrea Barisani
lcars@ocert.org

6 aprilie 2009 la 11:42
Marti Maria spunea...

A friend pointed out this blog...

No, I was not who posted that crap. This is obviously a troll using some complains I did to create a flame war. My complains were about a patch, not about Andrea. I never got personal against Andrea. Also, I think this post is highly offensive.

I would have no problems signing my comments, even if those are strong words, as you probably already know.
Don't feed the troll.
Marti Maria
www.littlecms.com

13 aprilie 2009 la 10:24

Trimiteți un comentariu

  

Etichete


  • #sharethemicincyber
  • #supplychain #security #opensource
  • android
  • android security
  • android tr
  • app security
  • big data
  • biometrics
  • blackhat
  • C++
  • chrome
  • chrome enterprise
  • chrome security
  • connected devices
  • CTF
  • diversity
  • encryption
  • federated learning
  • fuzzing
  • Gboard
  • google play
  • google play protect
  • hacking
  • interoperability
  • iot security
  • kubernetes
  • linux kernel
  • memory safety
  • Open Source
  • pha family highlights
  • pixel
  • privacy
  • private compute core
  • Rowhammer
  • rust
  • Security
  • security rewards program
  • sigstore
  • spyware
  • supply chain
  • targeted spyware
  • tensor
  • Titan M2
  • VDP
  • vulnerabilities
  • workshop


Archive


  •     2025
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2024
    • dec.
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2023
    • dec.
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2022
    • dec.
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2021
    • dec.
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2020
    • dec.
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2019
    • dec.
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2018
    • dec.
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2017
    • dec.
    • nov.
    • oct.
    • sept.
    • iul.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2016
    • dec.
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2015
    • dec.
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2014
    • dec.
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • iun.
    • apr.
    • mar.
    • feb.
    • ian.
  •     2013
    • dec.
    • nov.
    • oct.
    • aug.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2012
    • dec.
    • sept.
    • aug.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
    • ian.
  •     2011
    • dec.
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • iun.
    • mai
    • apr.
    • mar.
    • feb.
  •     2010
    • nov.
    • oct.
    • sept.
    • aug.
    • iul.
    • mai
    • apr.
    • mar.
  •     2009
    • nov.
    • oct.
    • aug.
    • iul.
    • iun.
    • mar.
  •     2008
    • dec.
    • nov.
    • oct.
    • aug.
    • iul.
    • mai
    • feb.
  •     2007
    • nov.
    • oct.
    • sept.
    • iul.
    • iun.
    • mai

Feed

Follow
Give us feedback in our Product Forums.
  • Google
  • Privacy
  • Terms