View Single Post
Old 13-08-2003, 20:58   #150
BenH
Inactive
 
Join Date: Jul 2003
Location: South Manchester
Posts: 74
BenH is an unknown quantity at this point
Quote:
Originally posted by hawkmoon
No - I just no longer want to argue with a person who questions others abilities and insults them (as you are trying to do again here) to try and prove they are right.


Actually if I wanted to insult you I'd be going for the throat, like your website. At the moment I just want to make sure you dont have the last word.

Quote:
If you do a little research you will see that there are pretty far ranging exploits on pretty much all OS's and many different open and closed source software products.
I know this, I have told you I know this and given you reasons to why Linux is more secure, which you have ignored to continue repeating the above like a mantra.

Quote:
One pretty serious vulnerability was with SSH and an exploit that would allow a 3rd party to run code with the same privileges as the ssh process.
There are two exploits still for this, neither are publically known and work is being done to resolve them, and you do not have to have a ssh server running on a linux or unix box, nor a telnet or web or ftp. NONE are enabled by default.


Quote:
How about one that affected the Sun RPC XDL library that could lead to the running of arbitrary code.
Could and Might play a large part in your vocab dont they.

Quote:
I suggest you take a look at somewhere like the CVE or CERT a little more often.
I do, difference is that I understand them and the threat that they pose to my machines. As I said to deadkenny, $100,000 prize if you can break the firewall that we use.


Quote:
Now this is the last I am saying on this as everyone on this thread is getting bored with this, as am I.
You've already said this once.
BenH is offline   Reply With Quote