× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Joe Pluta wrote on 03/01/2007 11:21:03 AM:

Not zero ways, mind you.  Operating systems are essentially still 
programs
and programs have flaws.  I'm relatively certain that someone of Leif
Svalgaard's knowledge and skill level might be able to create what would 
in
effect be a rootkit for the iSeries.  But the pool of potential black 
hats
for the iSeries is so very, very small that I don't think it's likely to
happen (unlike the Open Source Windows rootkit package that's freely
available for download on the Internet).

One could reverse this argument and say that there are also less white hat 
hackers (security researchers and the like) who work on the System i, and 
therefore if a (smart) black hat hacker were to find a hole, it would be 
more likely to go unnoticed and unpatched.

I agree that the System i has great security architecture.  I agree that 
Windows is less secure than i5/OS.  I don't think the "not enough bad 
people" argument is a useful one - why not focus on the strengths of i5/OS 
and how to leverage those strengths.

- Adam

Attention:

The information contained in this message and or attachments is 
intended only for the person or entity to which it is addressed and may contain 
confidential and/or privileged material. Any review, retransmission, 
dissemination or other use of, or taking of any action in reliance upon, this 
information by persons or entities other than the intended recipient is 
prohibited. If you received this message in error, please contact the sender 
and 
delete the material from any system and destroy any copies. Thank you for your 
time and consideration.

Attention: 

Le contenu de ce message et(ou) les fichiers ci-joints s?adressent 
exclusivement à la personne ou -entité à laquelle ils sont destinés. Ils 
peuvent 
contenir de l?information confidentielle, protégée et(ou) classifiée. Il est 
strictement interdit à toute personne ou entité autre que le(la) destinataire 
prévu(e) de ce message d?examiner, de réviser, de retransmettre ou de diffuser 
cette information, de prendre une quelconque action en fonction ou sur la base 
de celle-ci, ou d?en faire tout autre usage. Si vous avez reçu ce message par 
erreur, veuillez communiquer avec l?expéditeur(trice), supprimer ce message et 
les fichiers ci-inclus de tout système, et en détruire toutes copies, qu?elles 
soient électroniques ou imprimées. Nous vous remercions de votre entière 
collaboration. 

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.