Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: justlurking
You claimed this exploit wasn't easy to exploit.

I claimed it was very hard to get any significant advantage from this exploit, which is why I got tired of your lectures on proper virus creation which while demonstrating your expertise, you never successfully ever showed it to be of any particular significance in an attack. Therefore, hardly a "devestating" exploit as the author and you seem to have been implying.

As for the rest of your post, sorry, I don't need any advice from the NY Times on computer security, LOL.

133 posted on 01/29/2004 8:22:30 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 129 | View Replies ]


To: Golden Eagle
Therefore, hardly a "devestating" exploit as the author and you seem to have been implying.

Let's see how long it will be before there is a worm "in the wild" that exploits this security hole, and what kind of effect it has.

As for the rest of your post, sorry, I don't need any advice from the NY Times on computer security, LOL.

There's very little advice in the article, other than the standard "install a firewall". I cited it because I hoped it would help with your difficulty in understanding how "zombied" PC's are widespread, and can be used for all kinds of mischief -- including acting as a server to spread more email worms.

134 posted on 01/29/2004 8:45:41 PM PST by justlurking
[ Post Reply | Private Reply | To 133 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson