|
> From: Walden H. Leverich > > Just to be clear. The bug exists -- and has been duplicated -- from an > interactive session. I'm saying that I don't see why it wouldn't exists > too in batch. A. I've never seen said bug. B. There is no real parallel for SysReq2 on a batch job. > >"if a user visits a malicious website" > > OK, perhaps I didn't make my point clear. We're speaking of servers > here, not clients. I'm speaking of bugs that can infect a machine on an > Inbound request to port 80 (443 for SSL). But once one machine on your network is infected, aren't all of them exposed? If you have read/write rights on a network drive, you've potentially infected everyone who has read rights on that same drive (if you're a payload worm). And if a worm gets into a workstation, is it likely that your server is completely firewalled from your INTERNAL machines? I don't think so. So, one mistyped URL means infection to your whole network. Joe
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.