If you are unsure of what Anon has done in the past do some research on the HBGary breach by anon, and the Stratfor breach. Both are security companies that work closely with groups like the FBI etc.<div><br></div><div>--Damian<br>
<br><div class="gmail_quote">On Wed, Jul 25, 2012 at 9:29 AM, Christopher Cowling <span dir="ltr"><<a href="mailto:chris@faktortel.com.au" target="_blank">chris@faktortel.com.au</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
I agree, with the success rate of lulzsec and the fact that they have broken into so many websites / services / servers and so forth they are quite formidable. I think anyone would be questioning their own security if it was tried by these gentlemen. I have yet too see a news article entitled "Company or Govt successfully avoids lulzsec attack due too astounding security procedures" and honestly I don't expect too see it.<div>
<br></div><div>Chris.</div><div>FaktorTel.<br><div><br><div class="gmail_quote"><div class="im">On Wed, Jul 25, 2012 at 10:59 AM, Christopher Pollock <span dir="ltr"><<a href="mailto:chris@ionetworks.com.au" target="_blank">chris@ionetworks.com.au</a>></span> wrote:<br>
</div><div><div class="h5"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">While the temptation to derisively refer to the legion as script kiddies, that really only applies to the LOIC. I would be hesitant to get any of my critical infrastructure in the crosshairs of Lulzsec. Any idiot with enough tails can generate DDOS traffic, but with their success rate of bringing paedophiles / animal abusers to justice and penetrating targets .. I have more faith in their abilities than a lot of US Govt law enforcement.<div>
<br></div><div>Brad really summed it up IMO.<br><div><br></div><div>Cheers,<div>--<br>Christopher Pollock,<br>io Networks Pty Ltd.<div>e. <a href="mailto:chris@ionetworks.com.au" target="_blank">chris@ionetworks.com.au</a><br>
p. <a href="tel:1300%201%202%204%208%2016" value="+611300124816" target="_blank">1300 1 2 4 8 16</a></div><div>d. <a href="tel:07%203188%207588" value="+61731887588" target="_blank">07 3188 7588</a></div><div>m. <a href="tel:0410%20747%20765" value="+61410747765" target="_blank">0410 747 765</a></div>
<div>skype: christopherpollock</div><div><a href="http://twitter.com/chrisionetworks" target="_blank">twitter.com/chrisionetworks</a></div><div>
<div>
<a href="http://www.ionetworks.com.au" target="_blank">http://www.ionetworks.com.au</a><br>In-house, Outsourced.</div></div><br>
<br><br><div class="gmail_quote">On Tue, Jul 24, 2012 at 7:39 PM, thelionroars <span dir="ltr"><<a href="mailto:thelionroars1337@gmail.com" target="_blank">thelionroars1337@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
More circle jerking from Script Kiddies Inc.<br><br><div class="gmail_quote"><div><div>On 24 July 2012 18:41, PRK <span dir="ltr"><<a href="mailto:ausnog@digitaljunkie.net" target="_blank">ausnog@digitaljunkie.net</a>></span> wrote:<br>
</div></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div><u></u>
<div>
<p><a href="http://www.gizmodo.com.au/2012/07/anonymous-threatens-to-expose-data-from-an-australian-isp/" target="_blank">http://www.gizmodo.com.au/2012/07/anonymous-threatens-to-expose-data-from-an-australian-isp/</a></p>
<p>"The group also made threats against an unnamed local ISP, saying that if the National Security Inquiry continued it would leak data to show how unsecured the information of citizens would be if it had to be retained at a service provider level."</p>
<span><font color="#888888">
<p> </p>
<p>prk.</p>
<div> </div>
</font></span></div>
<br></div></div>_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net" target="_blank">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
<br></blockquote></div><br>
<br>_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net" target="_blank">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
<br></blockquote></div><br></div></div></div>
<br>_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net" target="_blank">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
<br></blockquote></div></div></div><br></div></div>
<br>_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
<br></blockquote></div><br></div>