Alan Paller

Alan Paller
appear plain
Most of them, ... appear to be just plain thieves.
systems terrible widespread
It would have been terrible (without the widespread patching). That got a lot of systems fixed.
ahead angry bad careless consider corporate critical far frustrated improving investment large list managers microsoft normally operating persuading products repeatedly security shown situation software succeeded system tools
Most large organizations have a big investment in Symantec tools and wouldn't normally consider switching. This year, however, Symantec's products have repeatedly shown up on the list of the software with critical new security vulnerabilities. Many corporate IT managers are angry and frustrated that their security vendor is as careless as the operating system vendors in writing bad code. And Microsoft has succeeded in persuading many of them that they are far ahead of other software vendors in improving the situation for new products.
delay excuse
Microsoft's delay is inexcusable. There's no excuse other than incompetence and negligence.
behind care dangerous health regular security
Fundamentally, it's an organization that is behind in making security part of its regular operations. It's very dangerous for health care data.
attachment banning early legitimate limits list major news picture radical reporters rule start
If an early infectee had an e-mail list with reporters at all the major news services, that would start the cascade. News organizations do not have radical e-mail attachment limits (like a rule banning all picture attachments) because they get legitimate pictures.
computers control course pay tapping
Of course it's the government. Governments will pay anything for control of other governments' computers. All governments will pay anything. It's so much better than tapping a phone.
bind data huge internet percentage reason says skip unix vulnerable
Data I have says that 20% of the Internet is vulnerable to this, and that's a huge, huge percentage of the BIND servers, ... no reason why it won't skip to other Unix versions.
addition call collateral creates inside mean traffic
It's something we call collateral damage, but I don't mean that lightly. This thing creates traffic inside a subnet, creates traffic in addition to what comes in from the outside.
bunch paid
It wasn't just a bunch of paid consultants.
attention choose far parts pay pick systems
Systems integrators pick and choose the parts of the FAR they pay attention to,
figured infected looking people second seeing wave
There is a wave of people looking for infected machines. We are getting into the second wave of infections. We haven't figured what they are doing. But we are seeing a very big wave of scanning.
automated bad deliver enormous five forcing guys past progress start
We have made enormous progress over the past five years by forcing the vendors to deliver automated patching. Now the bad guys are saying: 'You did that, now we're going after the applications.' Now we have to start all over again.
attacks defended
American corporations are being riddled by (computer) attacks ? they are being defended very badly.