TIP: Click on subject to list as thread! ANSI
echo: linuxhelp
to: Geo.
from: Mike `/m`
date: 2002-12-11 17:11:30
subject: Re: Most Unsecure OS? Yep, It`s Linux

From: Mike '/m' 



Your ignorance, whether real or feigned, is becoming tiresome.  So I'll bow out.

Enjoy.

 /m


On Mon, 9 Dec 2002 20:20:18 -0500, "Geo."  wrote:

>"Mike '/m'"  wrote in message
>news:5l49vushnkvmoq7ve7shnf3ct9r54ld8bb{at}4ax.com...
>
>> Just because a feature (in this case, source code availability) is
>> present does not mean that every user has to use that feature.
>
>But your argument is like saying a cpu is better simply because it comes
>with appendix G of the manual. Have you found your computer lacking because
>you don't have appendix G?
>
>> Yup.  Many times.   As I mentioned previously, your ignorance is
>> showing.
>
>I was pretty specific in my example, do you have a message number here to
>refer me to because I sure don't remember anyone here posting source code
>snippets to help people fix problems? Or are you thinking I'm going to
>wander off to some remote corner of the net where the programmers hang out?
>I don't deny that those places exist and that source code is traded freely
>is it a support area for users?
>
>> And your point is?
>
>Source code is not required to fix most security issues.
>
>> >> > Nobody needs the source code to IIS to write an
ISAPI filter or
>> >> >to change a system variable.
>> >>
>> >> So?  What's your point here?
>> >
>> >It only matters to programmers. (source code that is)
>>
>> I don't agree, but you're so determined in your ignorance on this that
>> I'll just disagree and let it drop.
>
>Why? I really would like you to explain why you take the position that you
>do because I don't understand. Make me understand, please?
>
>> Yes, it is your strawman.
>
>Fine, consider it dropped.
>
>> Your messages do not indicate any such understanding.  Before you can
>> learn you have to acknowledge your ignorance.
>
>duh? Will that do? 
>
>> What wasn't mentioned in the articles you cite was that the clean
>> source code is tagged with a MD5 checksum.  After you download the
>> source code, you check validate the checksum.  That simple check would
>> have caught the tainted source code.
>
>Klaus mentioned doing this with the ISO downloads for Knoppix as well, but
>his reason was because some browsers don't get clean downloads when it's a
>large file. I can't remember ever having to do that with NT patches, I don't
>think I'd trust it anyway as you and I know very well how reliable signing
>code can be. :>
>
>> If it had occurred to Microsoft, I probably would have reacted in the
>> same manner I reacted when a hacker broke into the Microsoft corporate
>> network, and had full access to the MS source code.  Does Microsoft
>> *really* know that there were no changes made to the source code, as
>> they have publically stated?  At least with Open Source, there are
>> thousands of copies around the world that can server as 'offsite'
>> disaster recovery copies.
>
>I don't know what MS does or doesn't do for backup but I would hope they
>have a few archive copies laying around.. Maybe even an offsite backup if
>they ever talked to chronister . IIRC there are a few universities
>licensed for the source code to NT as well aren't there?
>
>Geo.
>

--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)
SEEN-BY: 633/267 270
@PATH: 379/1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.