Will Rodger writes:
 > Zombie Cow quoted an interesting letter to the editor which posited the
 > following:
 > 
 > >Imagine a Chinese agent working at Microsoft. How difficult do you think
 > it would be to insert a little "backdoor" into a Windows .dll >file or
 > somewhere else? With the Government jumping into NT left and right, a

Both OS kernels and applications are riddled with exploitable holes
(constructive buffer overruns) -- no need to introduce them by
hand. Of course having the source would help to find them -- but it's
not really necessary. A team of clever hackers could penetrate any
system on the market, provided it is online. Even email access can
suffice. 

All man-made sofware will forever drag this Achilles' heel. Thorough
debugging helps to reduce the amount of holes, but will never
eliminate all of them.

Reply via email to