Aviram,
keep thinking like that and I pity the organization u work for.
first, windows security ain;t worth the quantum space it was written on.
second, what security hole r u talking about? the one in internet explorer? one of 
2^infinity?
third, the hookup I suggested is not a script, and thus more secure! this goes to 
show, u don't know
what I was talking about.
and last, I never suggested not using windows since many apps are written for windows 
and its variable we have to work with (even me). but understanding the problem is the 
first step to avoid it.
and as for 
" installation you can create a Windows machine with no open ports; lets see
> you 'hack into' that.", easily. exploit one of the gazillion holes in explorer, 
>spoof ips on ur network, sniff non-encrypted or low encrypted windows passwords, send 
>u a greeting card with sub7 in it, so there u r.
Now am I not serious?

if u want to discuss it further, please contact me personally and stop making 
assumptions.

* - * - *
Tzahi Fadida
[EMAIL PROTECTED]
Fax (+1 Outside the US) 240-597-3213
* - * - * - * - * - *


> -----Original Message-----
> From: Aviram Jenik [mailto:[EMAIL PROTECTED]]
> Sent: Tuesday, February 19, 2002 5:47 PM
> To: [EMAIL PROTECTED]; Tzafrir Cohen
> Cc: 'linux-il'
> Subject: Re: [was: sendmail relay problem]
> 
> 
> Tzahi wrote:
> 
> > well, no argument about possible security holes. but there are 
> many other
> > ways to exploit ur clients on windows, so i don't consider it a big of a
> > deal. if u want them to be secure, tell them to stop using 
> windows. there
> > isn't a windows on the planet that can't be hacked in.
> 
> Tzahi, please don't write this stuff - it doesn't make you sounds very
> serious. First:
> > there
> > isn't a windows on the planet that can't be hacked in.
> 
> There are. Plenty of them. In fact, give me a Windows desktop installation
> and I will configure it to be perfectly secure (at least as secure as any
> Linux desktop installation). In particular, by minor tweaking to 
> the default
> installation you can create a Windows machine with no open ports; lets see
> you 'hack into' that.
> 
> Second,
> > well, no argument about possible security holes. but there are 
> many other
> > ways to exploit ur clients on windows, so i don't consider it a big of a
> > deal.
> 
> A professional burglar can unlock your car door and disable your alarm in
> less than 60 seconds. Do you leave your car door open at night? I 
> assume you
> don't.
> Therefore, leaving a huge security hole in your network just because you
> already have other holes is not a valid point when it comes to security
> logic. In fact, it doesn't make sense in ANY kind of logic (except lazy
> people's logic).
> 
> - Aviram
> 


================================================================To unsubscribe, send 
mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]

Reply via email to