tag:blogger.com,1999:blog-4088979.post81476440555293752..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Microsoft's Anemone ProjectRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger4125tag:blogger.com,1999:blog-4088979.post-65894452737404178442007-10-01T13:30:00.000-04:002007-10-01T13:30:00.000-04:00jj,I think I found it here:http://www.usenix.org/e...jj,<BR/><BR/>I think I found it here:<BR/><BR/>http://www.usenix.org/events/usenix06/tech/full_papers/cooke/cooke_html/index.htmlRichard Bejtlichhttps://www.blogger.com/profile/13512184196416665417noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-54062551083590901732007-10-01T11:20:00.000-04:002007-10-01T11:20:00.000-04:00What led you to this paper? It doesn't look like ...What led you to this paper? It doesn't look like the team from Microsoft has done anything with this in a couple of years. The most recent information points to infocon2005 with nothing since then. Does it look like anyone is doing active work on this project?<BR/><BR/>Thanks,Joseph Jenkinshttps://www.blogger.com/profile/00584477544721804864noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-38817764265669690892007-09-29T10:10:00.000-04:002007-09-29T10:10:00.000-04:00Sounds like something easily implemented by custom...Sounds like something easily implemented by customizing ossec; wouldn't be too difficult. Sorry...nothing 'groundbreaking' in this article. Microsoft cloning again...Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-33453626554936156392007-09-29T00:57:00.000-04:002007-09-29T00:57:00.000-04:00Very interesting indeed. Although I worry about th...Very interesting indeed. Although I worry about that fat chunk of data sitting on an unsecured client PC. As an attacker I'd want to peruse that network traffic for sensitive info.Joehttps://www.blogger.com/profile/14998755598722686389noreply@blogger.com