To: Bush2000
Although a hacker could consume system resources and prevent wall from executing either locally and remotely, a combination of events must occur for a hacker to be able to exploit the hole, CERT said. For example, it's difficult for remote users to control the system resources that they are attempting to exhaust in order to manipulate the system, CERT said. What's required to own most Windows boxes? Hmm, send the user an email?
To: dwollmann
What's required to own most Windows boxes? Hmm, send the user an email?
Dude, a properly locked-down Windows server is just as secure as its *nix counterpart.
14 posted on
05/02/2002 5:38:57 PM PDT by
Bush2000
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson