Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Poohbah
But if you're telling me that they can't implement a proprietary flavor of Linux across their enterprise without serious problems, then you're telling me that they cannot possibly manage a Microsoft enterprise architecture

You think maintaining a completely separate branch of Linux including grow your own security patches and feature upgrades is easier than deploying M$ and maintaining it through Windows Update etc? Ridiculous.

The point is that if the NSA keeps the source closed, then that system can't be used outside of the US government, and that means that OTHER organizations will not be able to acquire it.

Sure that's another reason for closed source, but doesn't undercut wanting to keep it secret so that it can't be exploited.

And Microsoft source code is FAR less accessible than most US government classified information.

LMAO. Ever heard of a dissasembler?

I probably know a great deal more than you actually do.

Not from the looks of your last post. I haven't seen anything correct yet.

they close every port into and out of the network, and pretty much cripple their operations until they're sure they've patched the vulnerability.

No they don't. They don't have to plug anything, if they have the very lastest patches installed. User curiosity with attachments that no A/V signatures exist for is one of the few successful methods against 100% patching of the O/S.

Assuming that Microsoft does a competent job. Big assumption.

It's not an assumption. These people (again not our organization) grew into relying on Windows Update. If it ever fails them, they will quit using it. So far, rock solid. But our security is more robust. You can't even ping our boxes without us getting a log.

Back to the thread at hand - Do you or do you not support HP helping the Chicoms build their software?

68 posted on 09/04/2003 7:45:17 PM PDT by Golden Eagle
[ Post Reply | Private Reply | To 62 | View Replies ]


To: Golden Eagle
No they don't. They don't have to plug anything, if they have the very lastest patches installed. User curiosity with attachments that no A/V signatures exist for is one of the few successful methods against 100% patching of the O/S.

I know people who were on NMCI when Blaster hit.

They got shut down for most of the day.

What were you yammering about again?

Sure that's another reason for closed source, but doesn't undercut wanting to keep it secret so that it can't be exploited.

How many Linux exploits out there? How many Windows exploits out there?

Hmm...

LMAO. Ever heard of a dissasembler?

That explains all those copies of the Windows kernel source code available for download out there...

Oh. Nevermind.

These people (again not our organization) grew into relying on Windows Update. If it ever fails them, they will quit using it.

Wait until some enterprising hacker spoofs the Windows Update server and installs his malware on every Windows box in the world.

70 posted on 09/04/2003 7:51:36 PM PDT by Poohbah (Crush your enemies, see them driven before you, and hear the lamentations of their women.)
[ Post Reply | Private Reply | To 68 | View Replies ]

To: Golden Eagle
"You think maintaining a completely separate branch of Linux including grow your own security patches and feature upgrades is easier than deploying M$ and maintaining it through Windows Update etc? Ridiculous."

You dont have a clue what you are talking about, 'grow your own patches' have you heard of up2date? no? its beacuse you probably used linux once (if even) five years ago. All my servers in the test arena update automatically several times a day and they dont even require a reboot. Best of all from another computer I can login into the RHN and chack the patch level of all my Linux servers..

112 posted on 09/05/2003 11:22:18 AM PDT by N3WBI3
[ Post Reply | Private Reply | To 68 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson