soulseek
It's set to groove
RacerX said:Lets face it, if someone has physical access, there is no end to what they can do.
not with file vault !! yes ur data maybe be erased. destroyed. but not stolen
RacerX said:Lets face it, if someone has physical access, there is no end to what they can do.
Krevinek said:How long was a patch available to fix the vulnerability before the worm hit?
1-3 months on average.
Those are some LAZY admins...
Krevinek said:I would say that MacOS X is as vulnerable as Windows .
It is a good thing that hackers (the type who sneak in to your home when you aren't looking) don't have access to Mac OS X install CDs.
bobw said:Use Open Firmware password protection.
RacerX said:And that protects you from a hammer how?
RacerX said:Well, considering that Microsoft patches are known to break systems, there are many times where the fix is as bad (or worse) than the problem. And keeping up with Microsoft patches and updates makes the work load for supporting Windows two-to-three times that of any other platform.
RacerX said:And if you've read any of the license agreements with the latest patches, you would be questioning if it was a good idea to be installing them. Less we forget, the ports left open were done for a reason... Microsoft wanting a way into everyone's system that people didn't know about.
soulseek said:and u would be wrong !!!Krevnik said:I would say that MacOS X is as vulnerable as Windows .
to start with. once u FIrst buy a mac and a windows machine.. the mac has less wholes ... and is setup in such away make it safer once on the web!
Krevnik said:I would say that MacOS X is as vulnerable as Windows if: 1) You don't keep up with security patches, and 2) You use vulnerable services.
Krevinek said:While the work-load is more, it doesn't make it impossible.
Hmm, I can think of plenty of apps/etc that help prevent access to those ports... and ironically, the major exploits that reach news sources are in the IIS server suite and other servers, not MS' spyware 'feature'
RacerX said:I was talking about the Server/Enterprise space (servers and workstations) when talking about the hole left by Microsoft. I don't remember hearing about those ports until early 2003... they were there since at least 1996 (the release of NT 4.0) if not before.
Something tells me that the ports being open wasn't widely known as it took about 7 years before they were exploited. And I also don't think they were known about until 2003 as Microsoft issued a patch to close those ports only a month before the exploit was actively used.
fryke said:I'm also currently trying Windows XP SP2 (RC1) on one of my machines without any security software besides what's in the package. And I must say that Microsoft _is_ paying attention here. I'm not sure how soon we'll see exploits for old/new vulnerabilities that'll work on SP2, but at least they're now doing something actively (i.e. close everything by default and urge the user to pay attention to security issues). My machine's behind a NAT-only firewall (i.e. a router), so it's a bit safer than the average Joe's direct broadband connection, but still: It seems quite okay.