| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: ZoneAlarm upgrade 6.0.631.003 - arghh!!! |
From: "Geo"
If it's a known issue, it takes all of 4 minutes to google up the exploit
code and tons of information about it.
Geo.
"Randall Parker"
wrote in message news:42f82de4$1{at}w3.nls.net...
> Well, security thru obscurity really is an advantage against a large array
of attacks.
>
> Suppose OS/2 has some buffer overflow in its TCP/IP stack. The odds of an
attacker
> noticing that you have OS/2 in your firewall and then also having a tool
to exploit
> this seem remote.
>
> Mike N. wrote:
> > Well, although I wouldn't have a problem with my financial
institutions
> > using OS/2 Warp for niche use where it is well isolated and protected, I
> > would be very uncomfortable if they relied on "OS/2's hardened
features".
> > This is certainly a myth and the TCP stack undoubtably contains some
> > ancient vulnerabilities since it was BSD derived. Just because it isn't
a
> > popular target doesn't mean it isn't vulnerable. I'll bet at least
one
> > Russian hacker still possesses a 0-day attack against OS/2.
> >
--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 270 5030/786 @PATH: 379/45 1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.