- From: Kingsley Idehen <kidehen@openlinksw.com>
- Date: Sun, 26 Apr 2009 15:47:47 -0400
- To: Hugh Glaser <hg@ecs.soton.ac.uk>
- CC: Peter Krantz <peter.krantz@gmail.com>, Bijan Parsia <bparsia@cs.manchester.ac.uk>, foaf-dev Friend of a <foaf-dev@lists.foaf-project.org>, "foaf-protocols@lists.foaf-project.org" <foaf-protocols@lists.foaf-project.org>, Semantic Web <semantic-web@w3.org>, "paola.dimaio@gmail.com" <paola.dimaio@gmail.com>
Hugh Glaser wrote: > Yes, when Dan has recovered from the more urgent tasks he has, it would be good to have his reflections on what happened. > > I think the primary question I would like to know the answer to is: > "Was there anything special about it being a "Semweb" site that created a vulnerability." > Was it an equivalent of an SQL injection for SPARQL, or maybe it was through a SPARQL endpoint, or something else RDF? > > Or maybe it was "just" a standard hack, and we shouldn't get ourselves over-concerned about the RDFness. > > My sympathy, of course. > > Hugh > Hugh, You beat me to it :-) I would very much like the specifics of what happened once the dust settles. More to gain than lose long term. Kingsley > On 26/04/2009 18:38, "Peter Krantz" <peter.krantz@gmail.com> wrote: > > Hijacking this thread back to the original topic: > > How can we help? Two important areas to start working with: > > 1. How to get your servers back online in a clean uninfected state and, > > 2. how do we provide security recommendations for people who publish > semweb data online? > > Anyone who is willing to help out? > > Regards, > > Peter Krantz > > > _______________________________________________ > foaf-protocols mailing list > foaf-protocols@lists.foaf-project.org > http://lists.foaf-project.org/mailman/listinfo/foaf-protocols > > -- Regards, Kingsley Idehen Weblog: http://www.openlinksw.com/blog/~kidehen President & CEO OpenLink Software Web: http://www.openlinksw.com
Received on Sunday, 26 April 2009 19:48:53 UTC