Will Rodger writes: > Zombie Cow quoted an interesting letter to the editor which posited the > following: > > >Imagine a Chinese agent working at Microsoft. How difficult do you think > it would be to insert a little "backdoor" into a Windows .dll >file or > somewhere else? With the Government jumping into NT left and right, a Both OS kernels and applications are riddled with exploitable holes (constructive buffer overruns) -- no need to introduce them by hand. Of course having the source would help to find them -- but it's not really necessary. A team of clever hackers could penetrate any system on the market, provided it is online. Even email access can suffice. All man-made sofware will forever drag this Achilles' heel. Thorough debugging helps to reduce the amount of holes, but will never eliminate all of them.
