On Fri, 5 Oct 2007, Timothy Clemans wrote:

> Until there is a solid exploit for the Sage notebook I don't think
> this is a big deal.


This is the worst software practice to EVER come out of Redmond.  You should 
know better than that.  With that attitude, you don't get started on a fix 
until an exploit has been *discovered* in the wild -- that discovery happens 6 
months to a year after release.  Then, it'll be another month before a fix is 
published, and another year to two before the install base (security n00bs like 
me) get around to upgrading to the secure edition.

By that time, you've cross-infected your entire internal network, and you've 
assisted spammers and botnets in the infection of hundreds or thousands of 
other boxen.  Read the articles I posted.  NONE of the linux admins new that 
they'd been pwned, months after the fact.  That's *scary*.


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"sage-devel" group.
To post to this group, send email to sage-devel@googlegroups.com
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at 
http://groups.google.com/group/sage-devel?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to