-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
____/ Anonymous on Wednesday 19 August 2009 15:38 : \____
> http://www.nytimes.com/2009/08/18/technology/18card.html?ref=business
>
> This was back in 2006 when a zillion patches for Windows hadn't yet
> been released and the crooks were smart enough to use the vulnerability
> they found in Windows sparingly. They knew of M$'s policy to only patch
> if:
>
> 1) the vaulerability is known to hackers and exploit code exists
> 2) the vulerability is used on a large scale
> 3) millions of machines have already been compromised
> 4) the exploit has been in use for more than a year
>
> If all these 4 conditions have been met Microsoft will start digging in
> their code to find a fix. Otherwise it's ignored or swept under the rug.
>
> Windows 7, I HATE IT ALREADY!!!!
I've read about it having something to do with Windows XP-powered ATMs, but I
don't know if it's true. It can be hard to verify because "due to security
reasons" they rarely tell. I also learned from someone with first-hand
experience that Microsoft has the equivalents of a gagging order when things
go amiss (think LSE for instance).
- --
~~ Best of wishes
E Pluribus UNIX
http://Schestowitz.com | GNU is Not UNIX | PGP-Key: 0x74572E8E
http://iuron.com - proposing a non-profit search engine
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkqMKx0ACgkQU4xAY3RXLo5MZwCeOKr9lyODYYETvUH7Ijn3QS8f
7GEAn1Ea5/mY7gywZA5XL9pGWtzGgV1b
=85yx
-----END PGP SIGNATURE-----
|
|