13-08-2003, 20:58
|
#150
|
|
Inactive
Join Date: Jul 2003
Location: South Manchester
Posts: 74
|
Quote:
Originally posted by hawkmoon
No - I just no longer want to argue with a person who questions others abilities and insults them (as you are trying to do again here) to try and prove they are right.
|
Actually if I wanted to insult you I'd be going for the throat, like your website. At the moment I just want to make sure you dont have the last word.
Quote:
|
If you do a little research you will see that there are pretty far ranging exploits on pretty much all OS's and many different open and closed source software products.
|
I know this, I have told you I know this and given you reasons to why Linux is more secure, which you have ignored to continue repeating the above like a mantra.
Quote:
|
One pretty serious vulnerability was with SSH and an exploit that would allow a 3rd party to run code with the same privileges as the ssh process.
|
There are two exploits still for this, neither are publically known and work is being done to resolve them, and you do not have to have a ssh server running on a linux or unix box, nor a telnet or web or ftp. NONE are enabled by default.
Quote:
|
How about one that affected the Sun RPC XDL library that could lead to the running of arbitrary code.
|
Could and Might play a large part in your vocab dont they.
Quote:
|
I suggest you take a look at somewhere like the CVE or CERT a little more often.
|
I do, difference is that I understand them and the threat that they pose to my machines. As I said to deadkenny, $100,000 prize if you can break the firewall that we use.
Quote:
|
Now this is the last I am saying on this as everyone on this thread is getting bored with this, as am I.
|
You've already said this once.
|
|
|