× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.


  • Subject: How to hack into a .... ?
  • From: jpcarr@xxxxxxxxxxxx
  • Date: Sat, 21 Jul 2001 18:17:13 -0400


John (talyor)

You are right so far as JP ,  However,   The new pricing model(below
somewhere)
may change Corp mind set( its down below somewhere)

I think Lief said something about "Until users get their credit card
stolen...."
I thought it was hilarious that one hacker who was recently sentenced,
Sent
Bill Gates a case of Viagra  using Bill's own credit card number he stole.

Now do you think Bill G.  Related the fact that his credit card was stolen
with the swiss cheese NT security?

Nah,   You are probably right,    Consumers aren't that smart.

"How you hack into Microsoft: a step by step guide"
http://www.theregister.co.uk/content/1/14344.html

"Anti-Hacking Insurance Higher For NT Users"
http://www.theregister.co.uk/content/8/18324.html


Now on a lighter note;  :-)

"Now that Microsoft Corp. has finally unveiled its first security software
product, the company hopes to improve its mediocre track record in security
technology.  "
http://www.techweb.com/wire/story/TWB20010330S0007

------------
We might see MS shooting themselves in the foot with Pricing
Look at the responses from "Dyed in the Wool"  MS people on this one.
Go to the site and read the feedback.

Is There Anything Good about Microsoft's NewSubscription Model?
http://www.idg.net/ic_638430_1794_9-10000.html

We are NOT upgrading theentire enterprise by 10/1, and
we are NOT paying full price whent the timecomes to move off of Off97/2000.
Other options do exist, even if they will beless attractive than "OFFICE
2003".  MSH Windows Networks Mgr
-----------------------

QUOTE OF THE DAY:

"Wake up, open-source community. The battle is not for the
desk-top; it is not for the server; it is not for the
operating system; it is not for the development environment;
it is not about the GNU General Public License (GPL) vs.
Microsoft's business model. The battle is primarily about who
will control user-authentication services."

-- The Open Source columnist Nicholas Petreley issues a
rallying call.

http://iwsun4.infoworld.com/articles/op/xml/01/06/18/010618oppetreley.xml?0622frpm




+---
| This is the Midrange System Mailing List!
| To submit a new message, send your mail to MIDRANGE-L@midrange.com.
| To subscribe to this list send email to MIDRANGE-L-SUB@midrange.com.
| To unsubscribe from this list send email to MIDRANGE-L-UNSUB@midrange.com.
| Questions should be directed to the list owner/operator: david@midrange.com
+---

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.