On Wed, Nov 12, 2003 at 09:38:46PM -0800, Ken Barber wrote:
Lazy sysadmins? I beg to differ.
How about overworked sysadmins? I was once in charge of a 'Doze
network and there was no way I could keep current with the
patches. Before one patch project was complete, there were two
more
On Thursday 13 November 2003 03:08 am, Cory Petkovsek wrote:
: On Wed, Nov 12, 2003 at 09:38:46PM -0800, Ken Barber wrote:
: Lazy sysadmins? I beg to differ.
:
: How about overworked sysadmins? I was once in charge of a 'Doze
: network and there was no way I could keep current with the
:
On Thu, Nov 13, 2003 at 10:09:54AM -0500, Linux Rocks! wrote:
From the Real world experience files, I did my work co-op in a govt office.
There were 170 workstations (at that time) running NT4, and we needed to
update to SP4, IE, mcafee, and a few smaller apps. The bulk of the time was
for
On Thursday 13 November 2003 01:37 pm, Cory Petkovsek wrote:
: On Thu, Nov 13, 2003 at 10:09:54AM -0500, Linux Rocks! wrote:
: From the Real world experience files, I did my work co-op in a govt
: office.
:
SNIPP
: With 170 linux workstations, it wouldn't even take a whole day to write
: a
Cory Petkovsek wrote:
With 170 linux workstations, it wouldn't even take a whole day to write
a script.
Upgrading a herd of homogeneous workstations is easier than upgrading
a herd of heterogeneous servers. Keeping track of which hosts require
which versions of which software (especially as
to avoid the noid:
http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS03-048.asp
brief from page:
snip
Microsoft Security Bulletin MS03-048
Cumulative Security Update for Internet Explorer (824145)
Issued: November 11, 2003
Version: 1.0
Summary
Who Should Read
Darren Hayes wrote:
FYI, beginning this month, MS changed to announcing/releasing critical
update security patches only on the second Tuesday of each month.
Does this mean the Bad Guys will be rolling out their new exploits on
the second Wednesday of each month, to be sure their attacks will
So we hope although I'm pretty certain there has almost *always*
been some outstanding, known exploits on M$ products which they
continually deny, put off, delay, etc. Anyone got handy links to back
me up?
Ben
On Wed, 12 Nov 2003 09:47:06 -0800 (PST)
jgw [EMAIL PROTECTED] wrote:
|
On Wed, Nov 12, 2003 at 09:47:06AM -0800, jgw wrote:
FYI, beginning this month, MS changed to announcing/releasing critical
update security patches only on the second Tuesday of each month.
If this is true, this plan isn't going to last long. Any hack victim would
have a heyday in court if
On Wed, Nov 12, 2003 at 10:42:53AM -0800, Ben Barrett wrote:
So we hope although I'm pretty certain there has almost *always*
been some outstanding, known exploits on M$ products which they
continually deny, put off, delay, etc. Anyone got handy links to back
me up?
Ben
How about
In response to jgw, Ben wrote:
So we hope although I'm pretty certain there has
almost *always*
been some outstanding, known exploits on M$ products
which they
continually deny, put off, delay, etc. Anyone got
handy links to back
me up?
Ben
Ben/all,
pivx.com used to publish a popular
On Wednesday 12 November 2003 12:47 pm, jgw wrote:
: FYI, beginning this month, MS changed to announcing/releasing critical
: update security patches only on the second Tuesday of each month.
:
: If this is true, this plan isn't going to last long. Any hack victim
would
: have a heyday in
On Wednesday 12 November 2003 17:20, jgw wrote:
The patch for that vulnerability was issued nearly a month
before Blaster. I believe Blaster first showed up around August
11th. The patch in question, MS03-026, came out in mid-July...
the 16th?
The worm was relatively successful not because
13 matches
Mail list logo