× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.


  • Subject: Re: No single case of hacking...
  • From: "Dennis Lovelady" <dennis@xxxxxxxxxxxx>
  • Date: Thu, 7 Jun 2001 14:03:09 -0400

There are also multiple definitions to "getting a product out the door."  If
all you want, is to get it "out there," then you can close your eyes to
security.

Hackers are looking for another kind of door to get it out of.

If you aren't aware of hacker techniques, you are blind to your
vulnerabilities.  If you wait for someone else to tell you what your
vulnerabilities are, you're placing the trust of your system in other hands,
and I'd wager management goals are not in sync with your techniques.

This is why nations use surveillance techniques to watch potential enemies.
Shut down those techniques (put [or some cases, keep] blinders over your
eyes) and you'll soon discover the necessity of understanding your
vulnerabilities.

Hacking has negative connotations and a bad reputation.   But believe me, if
there's not a little bit of hacker in your soul, and if you don't pursue
what-if games regarding security, you're fooling yourself.

--
Dennis Lovelady             Fayetteville, GA
mail: dennis@lovelady.com
URL:  http://www.lovelady.com
ICQ:  5734860
--
"One never repents of having spoken too little, but often of having spoken
too much."
        - Philippe de Commynes


----- Original Message -----
From: "Leif Svalgaard" <leif@leif.org>
To: <MI400@midrange.com>
Sent: Thursday, June 07, 2001 12:42 PM
Subject: Re: No single case of hacking...


> James,
> what you are forgetting is that there may be bad guys
> out there that consider this activity superior to 'getting
> a product of the door'.
>
> ----- Original Message -----
> From: <jamesl@hb.quik.com>
> To: <MI400@midrange.com>
> Cc: <jamesl@hb.quik.com>
> Sent: Thursday, June 07, 2001 11:14 AM
> Subject: Re: No single case of hacking...
>
>
> > On Thu, 7 Jun 2001 10:15:33 -0500 "Joe Pluta" wrote:
> > . . .
> > > . . . any
> > programmer worth his salt can access any object on
> > > the machine at any time.
> >
> > . . .
> >
> > Dear Joe (et al.):
> >
> > Any programmer worth his salt who has had the
> > time, opportunity, and
> > inclination to learn techniques for doing so. As
> > opposed to having other
> > interests, and/or as opposed to attempting to get
> > viable commercial products
> > out the door.
> >
> > As always, please forgive the
> > gratuitous carriage returns, courtesy of my ISP's
> > web-mail
> > interface.
> > --
> > JHHL



+---
| This is the MI Programmers Mailing List!
| To submit a new message, send your mail to MI400@midrange.com.
| To subscribe to this list send email to MI400-SUB@midrange.com.
| To unsubscribe from this list send email to MI400-UNSUB@midrange.com.
| Questions should be directed to the list owner/operator: dr2@cssas400.com
+---

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.