Free Republic
Browse · Search
Smoky Backroom
Topics · Post Article

To: N3WBI3
Someone who is a security expert should have know the orgin of the most used tools..

I call BS on that. I do project management but I don't know who was the pioneer in that field. Does that mean I don't know project management or can't be considered an expert?

I also do a lot of programming I know what/who Ada is but does that make me an expert programmer? although I don't know who created fortran.

295 posted on 01/08/2007 9:27:12 PM PST by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 287 | View Replies ]


To: for-q-clinton
I call BS on that. I do project management but I don't know who was the pioneer in that field. Does that mean I don't know project management or can't be considered an expert?

Do you know the top, most famous, currently used project management tools? Nmap is the network security equivalent.

As I told GE when giving him hints to solve my test (yes, I did help him, gave him the tools to find the truth), the author's name, "Fyodor," is so popular it actually shows #1 in Google, ahead of the famous Russian author Fyodor Dostoyevsky. Do you know what it takes to get to #1 in unpaid Google ahead of such a famous name? A Google for "network scanner" also has nmap on the third site hit, #2 if you're looking for a free one, #1 if you're looking for an open source one.

Here are some basic facts you can confirm with anyone in the field:

Simply put, if GE had been telling the truth about his qualifications, my little test would have fallen flat on its face in the beginning.

The military (which GE supposedly works for) DEFINITELY knows nmap. It's in the information assurance literature that all people in GE's supposed position should read (some of it is required reading for everyone in such a position). But is AR lying? Do you think I may be lying? Does the government really know about nmap? A picture is worth a thousand words:


Lt. Gen. Keith B. Alexander, director of the National Security Agency, and William Marshall, another NSA official, give President Bush a tour of the super-secret agency's headquarters in Fort Meade, Md. Photo Credit: By Evan Vucci -- Associated Press

You can even use nmap as a plug-in to the #1 tool on that list, Nessus, although the Nessus plug-in architecture makes that undesirable. Now Nessus suggests you run nmap and pump the results into Nessus. Of course, I can back that claim up.

Trivia: Nmap even had a scene in Matrix Reloaded, being properly used (a rarity in Hollywood computer depictions) to take advantage of an actual known SSH vulnerability.


Now you have proper context of the issue.

297 posted on 01/09/2007 7:51:55 AM PST by antiRepublicrat
[ Post Reply | Private Reply | To 295 | View Replies ]

Free Republic
Browse · Search
Smoky Backroom
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson