| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: sendmail exploit |
From: "John Beamish"
Actually ... I got an AutoUpdate notice (or whatever they are called)
yesterday. Can't remember what it was for, though.
"Joe Barr" wrote in message
news:3e63fe66$1{at}w3.nls.net...
> On Mon, 03 Mar 2003 17:14:36 +0000, wrote:
>
> > LOL! You both are amazing.
> >
> > This is a great example of how having source available provides
> > absolutely no assurance that someone will have found the serious
> > security problems. It's not like this is the first demonstration of
> > this nor will it be the last.
> >
> > It is also a great example of how bugs are not fixed as quickly as
> > some people claim. Maybe Mike is using the same measure of time he
> > used to claim that Opera 7.0 security flaws that took 2-1/2 months to
> > fix only took 2 days. This one took 7 weeks (see
> > http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950).
> >
> > Rich
>
> Hey, Shupak
>
> Have you stupid bitches gotten your "glitches" at bCentral
patched up yet?
>
> You asswipes can't even run a website but you want to talk about
"trustworthy
> computing."
>
> But it's been a pretty good week for MS so far. I haven't seen any word
of
> critical security fixes since last Thursday. But that is the regular day
> for pouring them out, isn't it.
>
>
>
>
>
> --
>
--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)SEEN-BY: 633/267 270 @PATH: 379/1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.