On Wed, 26 December 2001, "Booth Martin" wrote:

> Nothing off-topic about it John.  This raw and weeping security breech is
> essentially a free entry into the AS/400 from any PC with Client Access and
> a connection to the internet.

Definitely. Client Access (or Windows Network Neighborhood/Netserver or NFS or 
any similar extension of iSeries storage or facilities to client systems) puts 
client systems in the same discussion space when vulnerabilities are the topic.

> The theory that scares me most is the theory that MS is intentionally
> destroying tcp/ip, to be replaced with tcp/ms as a more secure solution.
> This is of course based upon the strange idea that MS has made all of the
> key advances in computer solutions so far, so who else but MS could properly
> offer a secure tcp?

I loved that one even if only for the mental exercise. True or not, the 
possibility undeniably exists. Somewhat related, how about this:


(...now _that's_ a cool service!)

The slowly evolving concept of auto-download and auto-update has me torn both 
ways. It has clear potential for easing the customer experience, but the 
long-term corollary potential for huge network disasters is mind-boggling. Just 
one exploited hole could destroy a company, either the vendor or the customer. 
Of course, MS will have the "correct" methodology and can be trusted. Surely 
_they_ wouldn't let security lapse.

Tom Liotta

Tom Liotta
The PowerTech Group, Inc.
19426 68th Avenue South
Kent, WA 98032
Phone  253-872-7788
Fax  253-872-7904

The ALL NEW CS2000 from CompuServe
 Better!  Faster! More Powerful!
 250 FREE hours! Sign-on Now!

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2022 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.