____/ Richard Rasker on Wednesday 26 March 2008 16:31 : \____
> What do you do if you find an exploitable flaw in your code? Well, nothing,
> of course -- at least if you're Microsoft:
>
>
http://www.channelregister.co.uk/2008/03/26/jet_database_engine_security_flaws/
>
> Apparently, Microsoft "thought it had blocked the attack vectors."
> Incompetent idiots.
>
>
> Richard Rasker
Just don't bet your next elections on Microsoft's negleigence.
,----[ Quote ]
| Problems found in an audit of Diebold tabulation records from an Ohio
| November 2006 election raise questions about whether the database got
| corrupted during the tabulation of election results...
|
| The database is built from Microsoft's Jet database engine. The
| engine, according to Microsoft, is vulnerable to corruption when a lot
| of concurrent activity is happening with the database, such as what
| occurs on an election night [and Microsoft advises againt using Jet in
| a complex environment]...
|
| The report mentions that election staff had trouble with the server
| crashing and freezing on election night....
|
| The report notes that with punch card machines election officials used
| to be able to determine definitively if all ballots had been counted
| in the results....
`----
http://blog.wired.com/27bstroke6/2007/04/diebold_vote_da.html
Regarding Microsoft's excuse, previous reports contradict this. Microsoft seems
to have just felt a little lazy. No competition = complacence.
--
~~ Best of wishes
Roy S. Schestowitz | "I blame God for making me an atheist"
http://Schestowitz.com | GNU is Not UNIX | PGP-Key: 0x74572E8E
http://iuron.com - proposing a non-profit search engine
|
|