nanog mailing list archives
Re: WashingtonPost computer security stories
From: "John Underhill" <stepnwlf () magma ca>
Date: Sun, 15 Aug 2004 17:01:40 -0400
Maybe you should browse through the SANS archives, plenty of bind, sendmail, apache, nfs, etc. exploits.. http://www.sans.org/top20/ The problem with *nix, is more with misconfiguration then coding flaws, but this should not be underestimated. Given the current tendency towards global outsourcing, the people with the required skills to properly configure/maintain server systems, are often the same people who find themselves on the front lines of sweeping company layoffs, as their jobs are outsourced to inexperienced and under qualified support personnel. A large computer company I once worked for, recently laid off their UNIX frontline. They outsourced the entire department, and the outsourcing company hired people off the street to fill the positions. A colleague had told me that the interview for this job was just a meet and greet, there was no technical requirement, and no experience necessary. In fact, he had to train his replacements, and sadly, many of them did not posses even the most basic skills, let alone the ability to configure and troubleshoot terabyte sized storage systems. As for Linux for the home user, well.. it is getting better, but has a long way to go before it becomes as polished and intuitive as XP. Overall I would have to say XP serves its purpose well. It is easy to use, highly automated, and if maintained well - a stable OS. As for my detractors, I would argue that I don't feel using MS has caused me to lose my mental acuity, devalued my engineering skills, or caused me any sustained brain damage. It is just a choice, and as far as my personal pc goes, I prefer the clear facility and simplicity of XP. J. ----- Original Message ----- From: "David Lesher" <wb8foz () nrk com> To: "nanog list" <nanog () merit edu> Sent: Sunday, August 15, 2004 3:19 PM Subject: Re: WashingtonPost computer security stories
Note these appear to be WINDOWS security articles. I've not found a mention of non-windows vulnerabilities.. Hmmm... -- A host is a host from coast to coast.................wb8foz () nrk com & no one will talk to a host that's close........[v].(301) 56-LINUX Unless the host (that isn't close).........................pob 1433 is busy, hung or dead....................................20915-1433
Current thread:
- WashingtonPost computer security stories Sean Donelan (Aug 15)
- Re: WashingtonPost computer security stories Hank Nussbacher (Aug 15)
- Re: WashingtonPost computer security stories Mikael Abrahamsson (Aug 15)
- Re: WashingtonPost computer security stories Owen DeLong (Aug 15)
- Re: WashingtonPost computer security stories Deepak Jain (Aug 15)
- Re: WashingtonPost computer security stories David Lesher (Aug 15)
- Re: WashingtonPost computer security stories John Underhill (Aug 15)
- Re: WashingtonPost computer security stories Sean Donelan (Aug 15)
- Re: WashingtonPost computer security stories Mikael Abrahamsson (Aug 15)
- Re: WashingtonPost computer security stories Jerry Pasker (Aug 15)
- Re: WashingtonPost computer security stories Stephen J. Wilcox (Aug 17)
- Re: WashingtonPost computer security stories Hank Nussbacher (Aug 15)
- Re: WashingtonPost computer security stories Doug White (Aug 15)
- Re: Phishing (Was Re: WashingtonPost computer security stories) Henry Linneweh (Aug 16)
- Re: Phishing (Was Re: WashingtonPost computer security stories) Christopher L. Morrow (Aug 16)
- Re: Phishing (Was Re: WashingtonPost computer security stories) Mark Kasten (Aug 16)
- Re: Phishing (Was Re: WashingtonPost computer security stories) Alexei Roudnev (Aug 16)
- Re: Phishing (Was Re: WashingtonPost computer security stories) Sean Donelan (Aug 16)