[2659] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: ActiveX security hole reported.

daemon@ATHENA.MIT.EDU (Scott Sesher)
Fri Aug 16 18:35:04 1996

From: sas@mail.pittstate.edu (Scott Sesher)
To: benc@geocel.com (Ben Camp)
Date: Fri, 16 Aug 1996 15:09:59 -0500 (CDT)
Cc: www-security@ns2.rutgers.edu
In-Reply-To: <2.2.32.19960816134409.006a50bc@lithium.geocel.com> from "Ben Camp" at Aug 16, 96 08:44:09 am
Errors-To: owner-www-security@ns2.rutgers.edu

> 
> You seem to have a slightly negative attitude.  This will of course, fix the
> problem.  Would you expect Microsoft to 'fix' DOS since viruses can be
> transmitted via DOS executables?  You can either use the tool and accept the
> possible problems, or lack the functionality and deal with it.  Seems pretty
> simple.
> 
> Ben Camp
> 
> 
Yes I would "expect Microsoft to 'fix' DOS", if they cared anything
about something other than _their_ bottom line.  Imagine how many
millions (dollars/man hours) could have been saved if they had.  I
bet we have spent more (dollars/man hours) in the last few years here,
dealing with viruses, than Bill and his boys on its initial development.

I think what people are saying here is "look there is a problem, let's
see what we can do to fix it" or at least call attention to it some
(Microsoft) can fix it, before it's on the majority of desktops.  Maybe
we can avert a second "virus" like episode.
  
					  - sas

------------------------------------------------------------------------
"The last thing I want to do is deal        | Scott Sesher,   Sys Admin
with a bunch of people who want something." | Pittsburg State University
                                            | sas@pittstate.edu
                         Major Major        | Talk Net: (316)-235-4606
------------------------------------------------------------------------

home help back first fref pref prev next nref lref last post