SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Pastimes : Computer Learning

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: E.J. Neitz Jr who wrote (35752)8/16/2003 4:48:44 PM
From: mr.mark   of 110653
 
somebody is lying and we don't know who. i know who i believe. who do you believe....

********************************

"I know of numerous companies -- more than 10 -- with thousands of computers among them that have run into this problem," Cooper said. (Russ Cooper is moderator of a mailing list with 30,000 subscribers that tracks Microsoft's software weaknesses)

<snip>

Cooper said he notified Microsoft (MSFT: news, chart, profile) of the potential vulnerability days ago, and by late Wednesday Microsoft had changed its Blater/Lovesan patching process.

********************************

Stephen Toulouse, a security program manager at Microsoft, said "tens of millions" of computers have successfully patched their software without incident.

"We put a team of people on this and could not reproduce the problem," Toulouse said. "We've made no change to the Windows Update site, and we are not aware of any of the problems that Cooper is talking about.

<snip>

He said Microsoft checked every installation of Blaster/Lovesan patch to make sure it was working successfully.
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext