On Fri, 19 Aug 2005, Nick FitzGerald wrote:
[EMAIL PROTECTED] to Ron DuFresne:
Perhaps it does realte considering the above and considering that the unix
world learned many of the evils of RCP services over ten years ago that
seem to hit the M$ realm every few months, repeatedly...
[EMAIL PROTECTED] wrote:
On Wed, 17 Aug 2005, Ron DuFresne wrote:
Perhaps it does realte considering the above and considering that the unix
world learned many of the evils of RCP services over ten years ago that
seem to hit the M$ realm every few months, repeatedly...
We used to call
On Wed, 17 Aug 2005, Ron DuFresne wrote:
Perhaps it does realte considering the above and considering that the unix
world learned many of the evils of RCP services over ten years ago that
seem to hit the M$ realm every few months, repeatedly...
We used to call them rsploits when it was
[EMAIL PROTECTED] to Ron DuFresne:
Perhaps it does realte considering the above and considering that the unix
world learned many of the evils of RCP services over ten years ago that
seem to hit the M$ realm every few months, repeatedly...
We used to call them rsploits when it was common
This issue effects XP and W2K3 systems as well. I don't see the
argument of W2K being on the back burner as having any relation to
this thread.
Regardless of a LOT of Windows 2000 out there..., these companies
weren't bitten the same day the initial exploit was released. 6 days
is plenty of
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Micheal
Espinola Jr
Regardless of a LOT of Windows 2000 out there..., these companies
weren't bitten the same day the initial exploit was released. 6 days
is plenty of time to have tested compatibility and to
From my perspective, developing a patch and applying a patch are two
different life cycles. I'm no developer, but I know what it takes to
properly test and roll-out patches within my (current and previous)
organization(s).
I don't pretend to believe that all patches are the same, but this PnP
[SNIP]
Greg Smith, the county's assessor, recorder and clerk, said As long
as we're up (today), we'll be fine Greg Smith is a thinking much too
lightly of the situation. Their systems just got hit with an exploit
that allows for remote code execution and elevation of privilege.