SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Apple Inc.
AAPL 270.98-0.3%3:59 PM EST

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Alomex who wrote (31772)1/11/2002 1:02:04 PM
From: spitsong  Read Replies (1) of 213177
 
Alomex, Alomex, Alomex

From past history, M$ only stumbles at the beginning of a product cycle, and once they reach their stride they are a steamroller. Their big screwup with NT was called OS/2.

OS/2 was an IBM product. It had nothing to do with Windows NT, except that it was introduced to be a competitor to it.

By the way, bad press about the many serious security holes constantly being discovered in Windows XP is increasing, not decreasing. One example, this from Intel-owned c|net, of all places:

In the past two months, for example, more than half a dozen security problems have been found with the latest version of Internet Explorer. The most recent: Almost three weeks ago, a 31-year-old Austin, Texas-based security researcher revealed a bug in IE 6. The bug could let an attacker send an HTML e-mail, which in turn could steal cookies, allow access to files, or direct the victim to a false Web site that, to the average person, would be almost indistinguishable from the real thing.

The researcher, who asked to be identified by his online handle, ThePull, said an attacker who could fool a victim into clicking a simple Web link in e-mail could make off with the victim's digital keys to, say, any online account that has its log-in information saved as a cookie.

Microsoft has refused to comment on the latest IE issue, and no patch had been issued as of Thursday evening. That has many security pros, including Maiffret, irked.

"Right now, there is a known vulnerability and there is no way to turn it off," he said. "To leave everyone wide open is like Ford Motor knowing that their car's tires are bad and not saying anything."


c|net: Microsoft's security push lacks oomph
news.cnet.com
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext