|
> From: Walden H. Leverich III > > I submit to the argument that: most machines are "hacked" and "taken over" > not because the hacker knew the correct string of 7613 bytes to send to a > port to get Windows to run injected code, but rather because the > administrator didn't properly secure the machine in the first place. This is a change of subject! Any computer is vulnerable to bad security administration, from OS/400 to Windows. But there are entire classes of security breaches that are largely or wholly specific to Windows and that require additional security patches just to counteract them, and the "malicious website" problem is just one of them. As to the issue of whether the administrator didn't secure the machine, Nimda and its many brethren couldn't have flourished if it took an overt act of bad administration on every one of the thousands or millions of affected machines. Instead, they were SHIPPED unsecured and vulnerable to a host of worms and viruses. And while you can easily argue that an OS/400 machine needs to be locked down the moment it is installed, it is asking a lot to expect Joe User to perform arcane and undocumented system security tasks on his home PC. Joe
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.