|
There are also multiple definitions to "getting a product out the door." If all you want, is to get it "out there," then you can close your eyes to security. Hackers are looking for another kind of door to get it out of. If you aren't aware of hacker techniques, you are blind to your vulnerabilities. If you wait for someone else to tell you what your vulnerabilities are, you're placing the trust of your system in other hands, and I'd wager management goals are not in sync with your techniques. This is why nations use surveillance techniques to watch potential enemies. Shut down those techniques (put [or some cases, keep] blinders over your eyes) and you'll soon discover the necessity of understanding your vulnerabilities. Hacking has negative connotations and a bad reputation. But believe me, if there's not a little bit of hacker in your soul, and if you don't pursue what-if games regarding security, you're fooling yourself. -- Dennis Lovelady Fayetteville, GA mail: dennis@lovelady.com URL: http://www.lovelady.com ICQ: 5734860 -- "One never repents of having spoken too little, but often of having spoken too much." - Philippe de Commynes ----- Original Message ----- From: "Leif Svalgaard" <leif@leif.org> To: <MI400@midrange.com> Sent: Thursday, June 07, 2001 12:42 PM Subject: Re: No single case of hacking... > James, > what you are forgetting is that there may be bad guys > out there that consider this activity superior to 'getting > a product of the door'. > > ----- Original Message ----- > From: <jamesl@hb.quik.com> > To: <MI400@midrange.com> > Cc: <jamesl@hb.quik.com> > Sent: Thursday, June 07, 2001 11:14 AM > Subject: Re: No single case of hacking... > > > > On Thu, 7 Jun 2001 10:15:33 -0500 "Joe Pluta" wrote: > > . . . > > > . . . any > > programmer worth his salt can access any object on > > > the machine at any time. > > > > . . . > > > > Dear Joe (et al.): > > > > Any programmer worth his salt who has had the > > time, opportunity, and > > inclination to learn techniques for doing so. As > > opposed to having other > > interests, and/or as opposed to attempting to get > > viable commercial products > > out the door. > > > > As always, please forgive the > > gratuitous carriage returns, courtesy of my ISP's > > web-mail > > interface. > > -- > > JHHL +--- | This is the MI Programmers Mailing List! | To submit a new message, send your mail to MI400@midrange.com. | To subscribe to this list send email to MI400-SUB@midrange.com. | To unsubscribe from this list send email to MI400-UNSUB@midrange.com. | Questions should be directed to the list owner/operator: dr2@cssas400.com +---
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.