SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : How high will Microsoft fly?
MSFT 483.69+1.1%Dec 11 3:59 PM EST

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: ProDeath who wrote (44522)5/8/2000 3:24:00 PM
From: JC Jaros   of 74651
 
Re: BASIC Security model - 10 years ago I was involved in the development of a DOS BBS/Net program. We used QuickBasic in some part because of it's string handling abilities. We also availed the source code for the BBS to SysOps to modify. It was known to us that there was one or two absolute show stopping exploitable security holes in QuickBasic that could only be somewhat patched in the BBS. Microsoft would not, or could not patch it. --- Looking back at that, it's not only remarkable that the bugs were not more widely exploited, but remarkable as well that Microsoft still has the same security model this many years later with the VisualBasic product. --- Old dog - old tricks. -JCJ
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext