"Tom Liston" is a senior analyst for the Washington, D.C.-based network security consulting firm, InGuardians, Inc.

He is the author of the first tarpit (networking)/network tarpit, the open source LaBrea. He was a finalist for eWeek and PC Magazine’s "Innovations In Infrastructure" (i3) award in 2002 for LaBrea. He is one of the handlers at the SANS Institute’s Internet Storm Center, where he deals with developing security issues and authors a series of articles under the title “Follow the Bouncing Malware.”

Liston is also, with Ed Skoudis, co-author of the second edition of the network security book Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses.

More Tom Liston on Wikipedia.

The Microsoft WMF vulnerability is bad. It is very, very bad. This is a bad situation that will only get worse.

Competitors are growing, not very much, at low single digits in this last quarter. But we'd like to see them (Open Text) keep up to that growth rate. Key to the growth is leveraging the partners.

We've received many e-mails from people saying that no one in a corporate environment will find using an unofficial patch acceptable.

The only thing it does is patch that single function.

You cannot wait for the official MS patch, you cannot block this one at the border, and you cannot leave your systems unprotected.

We have very carefully scrutinized this patch. It does only what is advertised, it is reversible, and, in our opinion, it is both safe and effective.

After every large-scale tragedy — 9/11, the tsunami — people start scamming these fundraisers. We're just being proactive.