At 07:32 PM 4/5/00 -0400, you wrote:
>  Finally, if you follow your
>scanning example to its logical extreme, then denial of service attacks are
>just fine; they don't take advantage of any target vulnerabilities.

That is not true. DOS does take advantage of a target vulnerability. The 
vulnerability isn't on the attacked computer, but in http itself. Other 
transfer protocols don't have this problem. Supposedly, there is one 
available with basically the same capabilities as http but that doesn't 
make sites vulnerable to DOS attacks. It is more private also, but the 
industry as a whole would have to shift to it and I don't see that 
happening any time soon.
------------------------------------------------------------------------------
Archives: http://www.eGroups.com/list/cf-talk
To Unsubscribe visit 
http://www.houseoffusion.com/index.cfm?sidebar=lists&body=lists/cf_talk or send a 
message to [EMAIL PROTECTED] with 'unsubscribe' in the body.

Reply via email to