At 07:32 PM 4/5/00 -0400, you wrote: > Finally, if you follow your >scanning example to its logical extreme, then denial of service attacks are >just fine; they don't take advantage of any target vulnerabilities. That is not true. DOS does take advantage of a target vulnerability. The vulnerability isn't on the attacked computer, but in http itself. Other transfer protocols don't have this problem. Supposedly, there is one available with basically the same capabilities as http but that doesn't make sites vulnerable to DOS attacks. It is more private also, but the industry as a whole would have to shift to it and I don't see that happening any time soon. ------------------------------------------------------------------------------ Archives: http://www.eGroups.com/list/cf-talk To Unsubscribe visit http://www.houseoffusion.com/index.cfm?sidebar=lists&body=lists/cf_talk or send a message to [EMAIL PROTECTED] with 'unsubscribe' in the body.
- Re: Security holes revisited ... Fred Sanders
- Re: Security holes revisited -- reward offered Jennifer
- RE: Security holes revisited -- reward off... Steve Pierce
- RE: Security holes revisited -- reward... Steve Bernard
- RE: Security holes revisited -- reward offered dougn
- Re: Security holes revisited -- reward offered John N Westerlund
- RE: Security holes revisited -- reward offered Tim Lieberman
- RE: Security holes revisited Steve Bernard
- RE: Security holes revisited Dave Watts
- RE: Security holes revisited Jennifer
- RE: Security holes revisited Steve Bernard
- RE: Security holes revisited Steve Bernard
- RE: Security holes revisited Dave Watts
- RE: Security holes revisited Steve Bernard
- RE: Security holes revisited -- reward offered Dave Watts
- Re: Security holes revisited -- reward offered Calvin Ward
- RE: Security holes revisited -- reward offered Craig M. Rosenblum
- RE: Security holes revisited -- reward offered Mack, Chris R
- Re: Security holes revisited -- reward offered Seth Petry-Johnson

