Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Bush2000
Although a hacker could consume system resources and prevent wall from executing either locally and remotely, a combination of events must occur for a hacker to be able to exploit the hole, CERT said. For example, it's difficult for remote users to control the system resources that they are attempting to exhaust in order to manipulate the system, CERT said.

What's required to own most Windows boxes? Hmm, send the user an email?

13 posted on 05/02/2002 4:38:48 PM PDT by dwollmann
[ Post Reply | Private Reply | To 11 | View Replies ]


To: dwollmann
What's required to own most Windows boxes? Hmm, send the user an email?

Dude, a properly locked-down Windows server is just as secure as its *nix counterpart.
14 posted on 05/02/2002 5:38:57 PM PDT by Bush2000
[ Post Reply | Private Reply | To 13 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson