On Tue, 17 Apr 2007 19:38:25 +0200, Peter Köhlmann wrote:
> OK wrote:
>
>> On Tue, 17 Apr 2007 09:57:16 +0200, "Guy Fawkes"
>> <spare_the_rod@xxxxxxxxxxxxxxxxx> wrote:
>>
>>
>>>"Roy Schestowitz" <newsgroups@xxxxxxxxxxxxxxx> schreef in bericht
>>>news:11661294.IXxAsrolUb@xxxxxxxxxxxxxxxxxx
>>>> Attack code raises Windows DNS zero-day risk
>>>>
>>>> ,----[ Quote ]
>>>> | At least four exploits for the vulnerability in the Windows domain
>>>> | name system, or DNS, service were published on the Internet over the
>>>> | weekend, Symantec said in an alert Monday.
>>>> `----
>>>>
>>>> http://news.zdnet.com/2100-1009_22-6176429.html
>>>>
>>>> The attacks have gone on for over a week, based on the link below,
>>>> which I posted quite some time ago. Still no patch.
>>>>
>>>>
>>>It just goes to show that Microsoft Windows shouldn't be used for
>>>mission critical stuff.
>>
>> Blah blah blah, the same litany again.
>>
>> DNS on all platforms has its share of problems and vulnerabilities and
>> Unix/Linux implementations are no exceptions:
>>
>> http://www.google.com/search?hl=en&q=DNS+Attack
>
> OK is too stupid to recognize that this search would return all articles
> about DNS attacks, no matter if on mainframes, linux or windows (or even
> just descriptions how they work)
Nor how old they were.
> But then, OK is a wintendo luser. One of the dumber type
Very dumb. He makes an idiot look smart.
> Tell us, Oh Really Stupid One, why might MS have switched to Akamai (a
> linux shop) for providing DNS services after MS were too incompetent to
> get their own DNS system back online after a (successfull) attack
--
This message was not created on a
Windows PC, & NO M$ products were used.
The letters "F" & "U" & the word "Micro$oft"
were brought to you by GNU/Linux.
|
|