| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: sendmail exploit |
From: "Joe Barr" On Mon, 03 Mar 2003 17:14:36 +0000, wrote: > LOL! You both are amazing. > > This is a great example of how having source available provides > absolutely no assurance that someone will have found the serious > security problems. It's not like this is the first demonstration of > this nor will it be the last. > > It is also a great example of how bugs are not fixed as quickly as > some people claim. Maybe Mike is using the same measure of time he > used to claim that Opera 7.0 security flaws that took 2-1/2 months to > fix only took 2 days. This one took 7 weeks (see > http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950). > > Rich Hey, Shupak Have you stupid bitches gotten your "glitches" at bCentral patched up yet? You asswipes can't even run a website but you want to talk about "trustworthy computing." But it's been a pretty good week for MS so far. I haven't seen any word of critical security fixes since last Thursday. But that is the regular day for pouring them out, isn't it. -- --- BBBS/NT v4.01 Flag-4* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45) SEEN-BY: 633/267 270 @PATH: 379/1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.