SCOUG Logo


Next Meeting: Sat, TBD
Meeting Directions


Be a Member
Join SCOUG

Navigation:


Help with Searching

20 Most Recent Documents
Search Archives
Index by date, title, author, category.


Features:

Mr. Know-It-All
Ink
Download!










SCOUG:

Home

Email Lists

SIGs (Internet, General Interest, Programming, Network, more..)

Online Chats

Business

Past Presentations

Credits

Submissions

Contact SCOUG

Copyright SCOUG



warp expowest
Pictures from Sept. 1999

The views expressed in articles on this site are those of their authors.

warptech
SCOUG was there!


Copyright 1998-2024, Southern California OS/2 User Group. ALL RIGHTS RESERVED.

SCOUG, Warp Expo West, and Warpfest are trademarks of the Southern California OS/2 User Group. OS/2, Workplace Shell, and IBM are registered trademarks of International Business Machines Corporation. All other trademarks remain the property of their respective owners.

The Southern California OS/2 User Group
USA

SCOUG-HELP Mailing List Archives

Return to [ 04 | February | 2002 ]

<< Previous Message <<


Date: Mon, 4 Feb 2002 21:22:00 PST7
From: "Dave Watson" <xowatson@concentric.net >
Reply-To: scoug-help@scoug.com
To: Scoug <scoug-help@scoug.com >
Subject: SCOUG-Help: WEB security, Symantec

Content Type: text/plain

=====================================================
If you are responding to someone asking for help who
may not be a member of this list, be sure to use the
REPLY TO ALL feature of your email program.
=====================================================

On 4 Feb 2002 at 14:15, Ray Davison wrote:
> Does the following imply that someone running Windows does not have the
> ability of breaking into an OS/2 machine, or is this just Symantec
> unwilling to waste bandwidth on someone to whom they do not have a
> product to sell?

Sort of the latter - they probably have the ability, just not the interest.
It means the scripted set of hacks they use to probe visitors only
works against a known set of configurations. Every system has
vulnerabilities that the right set of probes can identify and attack. So
many opportunities exist in out-of-the-box Windows and so many
antisocial kids with too much spare time poking at them, the odds of
getting probed or attacked on a Windows system is fairly high. But
since most probes and attacks are scripted, hackers will probably
get a similar response from their probes as Symantec did, and
they'll move on without bothering a Warp machine further.

Somewhat related, article in the Register business section today on
a new tool called Lindows, which is apparently a Linux based
Windows clone being developed, based somewhat on Wine, which
emulates the Windows interface for running Windows apps on
Linux, sorta like Odin on Warp. Microsoft is suing based on the
name, not the technology. Interesting web site at lindows.com

=====================================================

To unsubscribe from this list, send an email message
to "steward@scoug.com". In the body of the message,
put the command "unsubscribe scoug-help".

For problems, contact the list owner at
"rollin@scoug.com".

=====================================================


<< Previous Message <<

Return to [ 04 | February | 2002 ]



The Southern California OS/2 User Group
P.O. Box 26904
Santa Ana, CA 92799-6904, USA

Copyright 2001 the Southern California OS/2 User Group. ALL RIGHTS RESERVED.

SCOUG, Warp Expo West, and Warpfest are trademarks of the Southern California OS/2 User Group. OS/2, Workplace Shell, and IBM are registered trademarks of International Business Machines Corporation. All other trademarks remain the property of their respective owners.