Overclock.net › Forums › Industry News › Software News › [CW] AntiSec leaks Symantec pcAnywhere source code after turning down $50k bribe to not release source code
New Posts  All Forums:Forum Nav:

[CW] AntiSec leaks Symantec pcAnywhere source code after turning down $50k bribe to not release source code - Page 5  

post #41 of 113
Quote:
Originally Posted by firestorm1 View Post

oh, these clowns again. rolleyes.gif

Clowns?
Don't you know these guys are professional security researchers from the white-hat community? They are here to help us all, they are loved by all companies and are frequently hired to test their systems! Don't you keep up with PoopaScoopa's post, he knows everything there is about security, exploits, and how the industry works.
Mine
(19 items)
 
  
CPUMotherboardGraphicsRAM
Intel Core i7-6700K 4.0GHz Quad-Core Asus Z170 PRO GAMING ATX LGA1151 EVGA GeForce GTX 1070 8GB SC Gaming ACX 3.0 G.Skill Ripjaws V Series 16GB (2 x 8GB) DDR4-3200 
Hard DriveHard DriveHard DriveHard Drive
PNY CS1311 480GB SSD Barracuda 500 WD 1000 WD 1000 
CoolingOSMonitorMonitor
Thermalright TRUE Spirit 140 POWER 73.6 CFM Windows 10 Acer S277HK 27" 4K Acer 23" 1080p 
MonitorKeyboardPowerCase
Acer 23" 1080p Razer Black Widow Ultimate EVGA SuperNOVA G2 550W 80+ Gold Corsair 330R Titanium Edition ATX 
Mouse
Logitech G303 Daedalus Apex 
  hide details  
Mine
(19 items)
 
  
CPUMotherboardGraphicsRAM
Intel Core i7-6700K 4.0GHz Quad-Core Asus Z170 PRO GAMING ATX LGA1151 EVGA GeForce GTX 1070 8GB SC Gaming ACX 3.0 G.Skill Ripjaws V Series 16GB (2 x 8GB) DDR4-3200 
Hard DriveHard DriveHard DriveHard Drive
PNY CS1311 480GB SSD Barracuda 500 WD 1000 WD 1000 
CoolingOSMonitorMonitor
Thermalright TRUE Spirit 140 POWER 73.6 CFM Windows 10 Acer S277HK 27" 4K Acer 23" 1080p 
MonitorKeyboardPowerCase
Acer 23" 1080p Razer Black Widow Ultimate EVGA SuperNOVA G2 550W 80+ Gold Corsair 330R Titanium Edition ATX 
Mouse
Logitech G303 Daedalus Apex 
  hide details  
post #42 of 113
Quote:
Originally Posted by PoopaScoopa View Post

Reading comprehension fail? Symantec offered to pay them. They never asked for money.... The email convos are in the first post if you're capable of reading it yourself.

Not sure who you're talking to, but I saw that the email conversations went on for allegedly "weeks" regarding the possession of the code.

How does that change the actions that AntiSec chose that contradict what their goals/ideals were? They claim they took the actions they did to convince Symantec to patch their code. Symantec eventually patched their code (all this discussion of holding the code for ransom, symantec offering to buy it, etc.). It wasn't until after Symantec released their patch and fixed the vulnerability that AntiSec released the source code anyway. What makes that okay, and if it truly was AntiSec's goal to simply get Symantec to patch their vulnerabilities, why did they shaft them and release the source code after all of that? Because AntiSec never really cared about getting Symantec to fix their software, they just wanted to wield power. If they didn't, then they wouldn't have gone through with releasing the source code after the security vulnerability was patched.
    
CPUMotherboardGraphicsRAM
i5-2500K Biostar TP67B+ XFX HD5750 1GB 2x4GB DDR3 Corsair 1600 
Hard DriveOSMonitorPower
60GB OCZ SSD, 2x160GB HDD RAID0, 500GB+500GB+1.5TB Windows 7 Ultimate 64-bit Samsung SyncMaster 930B Antec SmartPower 450w 
Case
Antec 900 
  hide details  
    
CPUMotherboardGraphicsRAM
i5-2500K Biostar TP67B+ XFX HD5750 1GB 2x4GB DDR3 Corsair 1600 
Hard DriveOSMonitorPower
60GB OCZ SSD, 2x160GB HDD RAID0, 500GB+500GB+1.5TB Windows 7 Ultimate 64-bit Samsung SyncMaster 930B Antec SmartPower 450w 
Case
Antec 900 
  hide details  
post #43 of 113
Quote:
Originally Posted by geoxile View Post

Ugh. First, learn English properly. Second, learn how the government works. Right now the only threat to freedom on the net is ICE which does its share of good work bringing down fraud rings. Bills like SOPA and PIPA are just for show. You think they're some sort of freedom fighters but they're exactly like organized criminals, all flocking under leadership to commit crimes. Hell, even the way you speak of them makes it sound like they're a threatening organization: "be ashamed to even dare to speak against them"? That doesn't make a lot of sense but phrases like "dare to speak against them" convey the danger they pose to everyone. The people that created liberty and freedom? I doubt you even know what you're talking about. Your grasp of English is paltry as is your grasp of principles like liberty and freedom.

Why is it that when a dissenting view arises people on the other side choose to make fun of someone for something totally unrelated? That also happens a lot on playgrounds. I'd imagine that english is his/her second language and if thats the case they have a pretty good grasp of it. How many languages do you speak fluently, friend? I always read all this crap about OCN maintaining a degree of professionalism. For instance a thread I read recently about not cussing because it isn't professional... How professional is that dribble? Every day I see more OCN members showing just how 'professional' this site truly is. Don't get me wrong, I love OCN but things like this drive me nuts.
Blue Steel
(8 items)
 
  
CPUMotherboardGraphicsRAM
AMD Phenom II x 4 960t ASUS M5A88-V EVO EVGA GTX 760 Crucial Ballistix 12gb 
CoolingOSPowerAudio
Hyper TX3 Windows 7 Corsair CX500 Sound Blaster Live! 24-bit External 
  hide details  
Blue Steel
(8 items)
 
  
CPUMotherboardGraphicsRAM
AMD Phenom II x 4 960t ASUS M5A88-V EVO EVGA GTX 760 Crucial Ballistix 12gb 
CoolingOSPowerAudio
Hyper TX3 Windows 7 Corsair CX500 Sound Blaster Live! 24-bit External 
  hide details  
post #44 of 113
Thread Starter 
Quote:
Originally Posted by Zinxe View Post

No, you obviously have no idea how the industry works. These companies don't rely on people like Antisec to exploit their system, especially without supervision and piles of contracts.
[IMG]http://meme]

If their intent was to be malicious, they never would of notified the vendor of the vulnerability and certainly wouldn't of made it public. They'd be actively exploiting it for profit among themselves. I realize this is too difficult for you understand but this is how the industry works. Most companies don't invest enough money into developing applications designed around security. It's easier to push the product out now and hope no one finds any vulnerabilities. Companies regularly pay compensation for disclosing this information to them. Google pays good money to security researchers who find exploits in their code.
post #45 of 113
Good job freaking out about source code from 2006. rolleyes.gif

Any reasonable Admin would not be running software from 5 years ago unless this was some sort of legacy system running software which couldn't handle an updated version. Even then the public was notified before the source code was leaked. You could either disable PC Anywhere or download an updated copy for free.

There are proper channels for reporting bugs. Saying he we've captured portions of your source code and will be posting it to the interwebs is not one of them.
Hercules
(14 items)
 
Orion
(9 items)
 
 
CPUMotherboardGraphicsRAM
Intel 980x @ 4.6Ghz ASUS Rampage III Extreme 3-Way SLI EVGA Geforce GTX 780 Ti Superclocked ... 12 GB PC16000 Corsair Dominator GT 
Hard DriveOptical DriveCoolingOS
120GB OCZ Vertex 3, 2x600GB WD Raptor, 1.5TB WD... Sony Optiarc CD/DVD Burner Custom Loop w/ EK CPU and Mobo Blocks Windows 7 Ultimate 64-Bit 
MonitorPowerCaseMouse
2x Dell U2711 SilverStone ST1500 Corsair 800D Logitech G9x 
CPUMotherboardGraphicsRAM
Intel 2700k @ 4.8Ghz ASUS Maximus IV Extreme-Z 2-Way SLI EVGA GTX 580 SC 1.5GB 8GB Dominator GT Series DDR3-2000 
Hard DriveCoolingOSPower
120GB OCZ Vertex 3, 2x600GB WD Raptor Corsair H100 Windows 7 Professional Corsair AX1200 
Case
NZXT Switch 810 
  hide details  
Hercules
(14 items)
 
Orion
(9 items)
 
 
CPUMotherboardGraphicsRAM
Intel 980x @ 4.6Ghz ASUS Rampage III Extreme 3-Way SLI EVGA Geforce GTX 780 Ti Superclocked ... 12 GB PC16000 Corsair Dominator GT 
Hard DriveOptical DriveCoolingOS
120GB OCZ Vertex 3, 2x600GB WD Raptor, 1.5TB WD... Sony Optiarc CD/DVD Burner Custom Loop w/ EK CPU and Mobo Blocks Windows 7 Ultimate 64-Bit 
MonitorPowerCaseMouse
2x Dell U2711 SilverStone ST1500 Corsair 800D Logitech G9x 
CPUMotherboardGraphicsRAM
Intel 2700k @ 4.8Ghz ASUS Maximus IV Extreme-Z 2-Way SLI EVGA GTX 580 SC 1.5GB 8GB Dominator GT Series DDR3-2000 
Hard DriveCoolingOSPower
120GB OCZ Vertex 3, 2x600GB WD Raptor Corsair H100 Windows 7 Professional Corsair AX1200 
Case
NZXT Switch 810 
  hide details  
post #46 of 113
Quote:
Originally Posted by mothrpe View Post

They weren't trying to help users, they were simply extorting money from symantec.

Can you read? They were not extorting money from Symantec... They obviously didn't take the money and of course would've never done that in the first place. Why do you think they asked them to donate money to charity instead? They aren't stupid, they know the easiest way to catch them is via extortion or another form of money trail. That would be ignorant, which is why they didn't do it. Symantec OFFERED the 50k for them not to release it.
Omega
(17 items)
 
The Beast
(15 items)
 
 
CPUMotherboardGraphicsRAM
Intel i7 3930k C2 @ 4.9 Ghz ASUS Rampage IV Formula Quad SLI GTX TITAN 32GB DDR3 2133 Ripjaws Z CAS9 
Hard DriveHard DriveHard DriveHard Drive
256GB x2 Crucial M4 SSD RAID0 Samsung 840 500GB SSD Internal 1TB x 2 External USB 3.0 1.5TB + 2TB + 1TB + 3TB 
Optical DriveCoolingOSMonitor
LG Bluray Burner Triple thick EK 360 Rad with D5 Vario & Raystor... Windows 7 Ultimate x64 Catleap 27" 2560x1440 LED LCD 
KeyboardPowerCaseMouse
Razer Lycosa Coolermaster Silent Pro Gold 1200W Rosewill Thor v2 Logitech G500 
Audio
Logitech 5.1 Surround + Arctic 5.1 Surround Hea... 
CPUMotherboardGraphicsRAM
Intel Core i5 2500k @4.7ghz Asus P8P67 WS Revolution XFX 7970 Black Edition x3 Tri-Fire 8GB DDR3 Gskill 9-9-9-24 
Hard DriveOptical DriveCoolingOS
2TB External+128GB M4 SSD+64GB SSD+250GB WD External DVD Multi H212+ HSF Windows 7 Ultimate 64bit 
MonitorKeyboardPowerCase
Acer GD235HZ 120hz 3d 24" Logitech K120 Corsair TX850 + Thermaltake 850W Antec 900 
MouseAudio
Logitech G500 Logitech 5.1 Surround 
  hide details  
Omega
(17 items)
 
The Beast
(15 items)
 
 
CPUMotherboardGraphicsRAM
Intel i7 3930k C2 @ 4.9 Ghz ASUS Rampage IV Formula Quad SLI GTX TITAN 32GB DDR3 2133 Ripjaws Z CAS9 
Hard DriveHard DriveHard DriveHard Drive
256GB x2 Crucial M4 SSD RAID0 Samsung 840 500GB SSD Internal 1TB x 2 External USB 3.0 1.5TB + 2TB + 1TB + 3TB 
Optical DriveCoolingOSMonitor
LG Bluray Burner Triple thick EK 360 Rad with D5 Vario & Raystor... Windows 7 Ultimate x64 Catleap 27" 2560x1440 LED LCD 
KeyboardPowerCaseMouse
Razer Lycosa Coolermaster Silent Pro Gold 1200W Rosewill Thor v2 Logitech G500 
Audio
Logitech 5.1 Surround + Arctic 5.1 Surround Hea... 
CPUMotherboardGraphicsRAM
Intel Core i5 2500k @4.7ghz Asus P8P67 WS Revolution XFX 7970 Black Edition x3 Tri-Fire 8GB DDR3 Gskill 9-9-9-24 
Hard DriveOptical DriveCoolingOS
2TB External+128GB M4 SSD+64GB SSD+250GB WD External DVD Multi H212+ HSF Windows 7 Ultimate 64bit 
MonitorKeyboardPowerCase
Acer GD235HZ 120hz 3d 24" Logitech K120 Corsair TX850 + Thermaltake 850W Antec 900 
MouseAudio
Logitech G500 Logitech 5.1 Surround 
  hide details  
post #47 of 113
Man I haven't used pcanywhere in like a decade lol.
The 3930
(26 items)
 
Junior's 3930
(22 items)
 
DATA/HTPC
(20 items)
 
  hide details  
The 3930
(26 items)
 
Junior's 3930
(22 items)
 
DATA/HTPC
(20 items)
 
  hide details  
post #48 of 113
Quote:
Originally Posted by PoopaScoopa View Post

If their intent was to be malicious, they never would of notified the vendor of the vulnerability and certainly wouldn't of made it public. They'd be actively exploiting it for profit among themselves. I realize this is too difficult for you understand but this is how the industry works. Most companies don't invest enough money into developing applications designed around security. It's easier to push the product out now and hope no one finds any vulnerabilities. Companies regularly pay compensation for disclosing this information to them. Google pays good money to security researchers who find exploits in their code.

If their intent was to not be malicious, they wouldn't have released the code after a patch was released by Symantec. The actions were malicious, with no reason behind them.
    
CPUMotherboardGraphicsRAM
i5-2500K Biostar TP67B+ XFX HD5750 1GB 2x4GB DDR3 Corsair 1600 
Hard DriveOSMonitorPower
60GB OCZ SSD, 2x160GB HDD RAID0, 500GB+500GB+1.5TB Windows 7 Ultimate 64-bit Samsung SyncMaster 930B Antec SmartPower 450w 
Case
Antec 900 
  hide details  
    
CPUMotherboardGraphicsRAM
i5-2500K Biostar TP67B+ XFX HD5750 1GB 2x4GB DDR3 Corsair 1600 
Hard DriveOSMonitorPower
60GB OCZ SSD, 2x160GB HDD RAID0, 500GB+500GB+1.5TB Windows 7 Ultimate 64-bit Samsung SyncMaster 930B Antec SmartPower 450w 
Case
Antec 900 
  hide details  
post #49 of 113
Quote:
Originally Posted by trumpet-205 View Post

Do a better job next time on your products Symantec? Loosing source code is not funny. I wonder if any other company is downloading Symantec's source code right now?

I cant see any other security software company touching it with even a ten foot pole.....
post #50 of 113
Thread Starter 
Quote:
Originally Posted by guyladouche View Post

If their intent was to not be malicious, they wouldn't have released the code after a patch was released by Symantec. The actions were malicious, with no reason behind them.

What part of "this is how the industry works" do you not get? The goal is to always make it public. Usually, only after they've given the vendor enough time to patch it, which they did here. Sometimes the vendors will ignore the warning and it will eventually get released publicly to force them to address it. I'm sorry you don't understand how the industry works but it's been like this because it works.
New Posts  All Forums:Forum Nav:
  Return Home
  Back to Forum: Software News
This thread is locked  
Overclock.net › Forums › Industry News › Software News › [CW] AntiSec leaks Symantec pcAnywhere source code after turning down $50k bribe to not release source code