Hmm. Ok, I'm still on page 16, but I've found out:
1) The binary code displayed at the bottom of the pdf doesn't yield anything yet. Not even if played backwards. :-]
2) they use some typical explanations like on page 15, by someone who's had too many townhall meetings: "zombie: Automatic programs search for systems that are connected to the Internet, but are unprotected, take them over without the owner's knowledge, and use them for malicious purposes.". 3) If we gotta wait for their lead we're dead: "New vulnerabilities in systems accrue at an alarming rate. Vulnerabilities are created as new software is developed and new technologies emerge. They are identified over time and through use. At the same time, new and ever more advanced tools are developed to exploit them. Security policies, practices, and technology must adapt. "(etc, page 9) They then go on about it'll take time to at least Q4 FY03 to come up with a detailed plan to combat stuff :-]
FWIW, they mention Linux $(grep cyberstrategy-draft.txt -ie linux -c) times, tho :-]
|