× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



> From: Walden H. Leverich
> 
> Just to be clear. The bug exists -- and has been duplicated -- from an
> interactive session. I'm saying that I don't see why it wouldn't
exists
> too in batch.

A. I've never seen said bug.
B. There is no real parallel for SysReq2 on a batch job.


> >"if a user visits a malicious website"
> 
> OK, perhaps I didn't make my point clear. We're speaking of servers
> here, not clients. I'm speaking of bugs that can infect a machine on
an
> Inbound request to port 80 (443 for SSL).

But once one machine on your network is infected, aren't all of them
exposed?  If you have read/write rights on a network drive, you've
potentially infected everyone who has read rights on that same drive (if
you're a payload worm).  And if a worm gets into a workstation, is it
likely that your server is completely firewalled from your INTERNAL
machines?  I don't think so.

So, one mistyped URL means infection to your whole network.
 
Joe


As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.