On Tue, 28 Jan 2003 09:33:15 -0500
gabriel <[EMAIL PROTECTED]> wrote:

> On January 28, 2003 07:42 am, Robert P. J. Day wrote:
> > 1) MS software is nororiously insecure and is largely
> >   responsible for the insecurity of the current IT
> >   infrastructure, or
> 
> 
> now i'm not a fan of micros~1, but i feel that i have to check this
> statement for accuracy.  in cases like "the sql slammer" the one at
> fault is definately not the author of the software, but rather the
> halfwit who's running it unpatched.  as i understand it, micros~1 had
> released a patch for mssql months ago, and this virus is only
> attacking the boxes that have yet to be patched.
> 
> just think about what the internet would be like if there were
> millions of linux users running 3year-old versions of apache &
> mysql...  i would propose that it's not just microsoft's inability (or
> unwillingness) to get their sh*t together, but also the ineptitude of
> these "sysadmins" that insist on running this software and don't know
> (or don't care to know) how to patch it...

1) The original patching was a convoluted mess, requiring moving files,
editing the registry manually, and a whole warehouse full of other
things. Several of those items would have rendered a system unbootable
(this _IS_ MICROS~1, so rebooting in inevitable) with a small mistake.
Sorry, I don't have a link because I didn't think to save it. But it was
an AP story, I believe. A better patch, one that took an approach that
left a lot less to chance, was just released a few days ago. Right as
things thing was taking off good. While this story isn't about that, it
makes reference to the re-release, _AFTER_ things were already running
amok:

http://www.techtv.com/news/security/story/0,24195,3415704,00.html

2) The saps that couldn't code it right were also the clowns that
couldn't even use their own patches. Poor admin work? Not keeping upp
with the patching that's available? Pot, meet kettle?

http://news.com.com/2100-1001-982305.html

http://www.cnn.com/2003/TECH/biztech/01/28/microsoft.worm.ap/index.html

3) In an article (which I didn't read myself, so I can't guarantee it
even exists), CNN supposedly outlined cases where systems were patched
and showed it, they took a hit, they were cleaned, and they still showed
being patched. This was supposedly with the new one. Is it true? It has
the ring of truth that often accompanies such failures on the part of
Micro-Soft. But I have no idea if it is real or fabrication. (For that
matter, being from CNN means it could be fabricated even if they
actually wrote such an article.)

Perhaps there are times when the one that should take the brunt of the
blame is the obvious party.

-- 
/etc/passwd is full -- go away!



-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to