> What I have found are various offers for paid support...
> check the archives.
> And I have found clear attempts to make as difficult as
> possible for newbies
> to learn more. If that's not the usual procedure for guilds, what is?
Armando,
While there are people on the list who hav
[EMAIL PROTECTED]
> -Original Message-
> From: Brett Randall [mailto:[EMAIL PROTECTED]]
> Sent: Tuesday, December 05, 2000 4:19 AM
> To: Michael Maier
> Cc: [EMAIL PROTECTED]
> Subject: Re: Quality of this List
>
>
> On Tue, 05 Dec 2000, [EMAIL PROTECTED] wrote:
>
> > The Quality of th
>
> Al, please don't talk about stuff you don't understand.
> It's not a "product", it's free software.
>
Wrong. Talked to an attorney last night who specializes in this kind of
litigation. Person(s) X wrote code and person Y suffered a loss as a result
of using that code. It does not matter if
> * Lipscomb, Al <[EMAIL PROTECTED]> writes:
>
> >> I find it astonishing that people don't sue Microsoft for this. A
> >> whole industry thrives on Microsoft's bad code quality.
> >>
>
> > Be careful what you wish for. Once the law
>
> As long as people run Windows, there will be a virus and
> trojan problem.
>
And Unix is immune to Trojans and worms?
With attacks getting more sophisticated I can see a day when an email would
arrive and the MUA would be attacked via a buffer overflow in the header,
use a local host exp
>>
> Don't know if this is a urban legend or if it really exists, but a
> friend told me about a ZIP file called 42.ZIP (maybe because it is
> 42 KB in size) which - as I heard - is currently floating around. This
> is not a virus but a DoS attack against virus scanners.
>
> If you unzip this
> Like Felix I'm skeptical about the value of general
> anti-virii programs
> running as gatekeepers on Linux servers.
>
Check out http://www.vmyths.com
A lot of the most "deadly" attacks could have been stopped dead with simple
processes that looked for methods and not specific "signatures".
>
> I guess that depends on whether you think that im2000 is something
> likely to be achieve in that year or that century... There are a
> number of hurdles to surmount - in particular the issue of
> notification. It strikes me that notification has the same issues that
> email currently does -
>
> OK. Our MX record here was changed on Monday.
What was the old TTL? What servers have authority for your domain, miss any
secondaries (zone transfer or rsync fail)?
> Just because it's ``often'' done doesn't mean it's correct. To me, and
> possibly others, open source is used to describe software that uses a
> licence conforming to the Open Source Definition.
>
I like: "3 a: completely free from concealment : exposed to general view or
knowledge b : exposed
> I agree with the general statement, but neither qmail nor djbdns are
> open source (I don't know the definition of ``freeware'', so I'll
> leave it alone). I believe (without further justification) that a
> piece of software without general modification permissions does not
> really inspire impr
>
> He also thinks that even having a software out and used for a few
> years without incidence does not imply that it is secure. He says,
> the best way to evaluate the security of a product is to have it
> audited by security experts.
>
There is no one right answer for this. Payment for a di
12 matches
Mail list logo