|
On Wed, 26 December 2001, "Booth Martin" wrote: > Nothing off-topic about it John. This raw and weeping security breech is > essentially a free entry into the AS/400 from any PC with Client Access and > a connection to the internet. Definitely. Client Access (or Windows Network Neighborhood/Netserver or NFS or any similar extension of iSeries storage or facilities to client systems) puts client systems in the same discussion space when vulnerabilities are the topic. > The theory that scares me most is the theory that MS is intentionally > destroying tcp/ip, to be replaced with tcp/ms as a more secure solution. > This is of course based upon the strange idea that MS has made all of the > key advances in computer solutions so far, so who else but MS could properly > offer a secure tcp? I loved that one even if only for the mental exercise. True or not, the possibility undeniably exists. Somewhat related, how about this: http://makeashorterlink.com/?H1302014 (...now _that's_ a cool service!) The slowly evolving concept of auto-download and auto-update has me torn both ways. It has clear potential for easing the customer experience, but the long-term corollary potential for huge network disasters is mind-boggling. Just one exploited hole could destroy a company, either the vendor or the customer. Of course, MS will have the "correct" methodology and can be trusted. Surely _they_ wouldn't let security lapse. Tom Liotta -- Tom Liotta The PowerTech Group, Inc. 19426 68th Avenue South Kent, WA 98032 Phone 253-872-7788 Fax 253-872-7904 http://www.400Security.com ___________________________________________________ The ALL NEW CS2000 from CompuServe Better! Faster! More Powerful! 250 FREE hours! Sign-on Now! http://www.compuserve.com/trycsrv/cs2000/webmail/
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.