What is the proper server setup to prevent this?

> On Mar 14, 2017, at 7:08 AM, Louis Smith <dr.louis.sm...@gmail.com> wrote:
> 
> Sad, but what should have been the story is how rapidly the fixes were made
> available, and how a properly setup server would not be vulnerable
> 
> Louis
> 
> 
>> On Tue, Mar 14, 2017 at 8:09 AM, Rene Gielen <rgie...@apache.org> wrote:
>> 
>> More of that...
>> http://www.reuters.com/article/us-canada-cyber-idUSKBN16K2BC
>> 
>>> Am 09.03.17 um 16:04 schrieb Lukasz Lenart:
>>> 2017-03-09 15:45 GMT+01:00 Dave Newton <davelnew...@gmail.com>:
>>>> https://arstechnica.com/security/2017/03/critical-
>> vulnerability-under-massive-attack-imperils-high-impact-sites
>>> 
>>> Yeah... this is a sad news, even if we tried our best to keep this
>>> confidential ...
>>> 
>>> 
>>> Regards
>>> 
>> 
>> --
>> René Gielen
>> http://twitter.com/rgielen
>> 
>> ---------------------------------------------------------------------
>> To unsubscribe, e-mail: dev-unsubscr...@struts.apache.org
>> For additional commands, e-mail: dev-h...@struts.apache.org
>> 
>> 

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@struts.apache.org
For additional commands, e-mail: dev-h...@struts.apache.org

Reply via email to