|
If you don't have a firewall blocking all but port web traffic to a web server, you should be taken out back and shot. If you are browsing the web from a server you should be taken out back and shot. If you are running outlook on a server, you should be taken out back and shot. If you haven't followed best-practices for locking down IIS and running (and re-running) baseline security analysis you should be taken out back and shot!And if you're using a Windows server when you could be using an iSeries/i5 server, you should be taken out back and shot!
John Brandt Sr. wrote: Of course, the software my company has designed and developed allows a user FROM an iSeries system to take control of a Windblows machine running MSSQL server. I guess I write viruses for a living. Gosh, I can even reboot a Windblows machine FROM an iSeries command line. I don't even have to install anything on the remote machine. Pretty tricky, but it works.When my son was getting his MCSE, the teacher said something about how secure their server was, and a student in the class said "I could reboot it right now". The teacher smiled a smirk and said "Not this one!". They had it locked down, of course, all the things you're supposed to do. In ten seconds the student had rebooted the server from his PC workstation.
- Alan
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.