Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Hal1950
The NRC also said that plant IT staff were not aware that there was a vulnerability in SQL Server, or that there was an exploit on the loose, despite the fact that Microsoft and the CERT Coordination Center had issued advisories on both.

If my IT staff said that to me, they'd be out of jobs. SQL Slammer was a nearly 100% preventable attack through Microsoft alone. 100% preventable if you had the proper software in place as a safeguard. Being vulnerable to SQL Slammer was almost inexcuseable as admins had over 6 months to patch. MS Blaster was a different story due to the exploit being released only 4 weeks after the vulnerability was released.

6 posted on 09/05/2003 9:17:49 PM PDT by xrp
[ Post Reply | Private Reply | To 1 | View Replies ]


To: xrp
MS Blaster was a different story due to the exploit being released only 4 weeks after the vulnerability was released.

I was Blaster-proof via Windows Update long before it ever showed up.

9 posted on 09/05/2003 9:22:47 PM PDT by Poohbah (Crush your enemies, see them driven before you, and hear the lamentations of their women.)
[ Post Reply | Private Reply | To 6 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson