I consider IIS a portion of Windows. Compare the number of exploits for windows running IIS to the number that are out there for various *nix platforms and the gap is not nearly so wide. A bad *nix admin is far worse than a bad windows admin. I see almost daily releases of exploits for BIND, SSH, Sendmail, etc that are every bit as bad as the windows ones we've seen. Granted very few are exploitable via port 80, but I seem to recall a very nasty root exploit in Apache about 4-6 months ago. No product is perfect. Code Red and Nimda exploited things that had been patched for over a month when they came out. 99% of the windows admins choose to ignore security warnings and refuse to patch their servers. Would these same people do a good job managing a BSD or Linux box? Doubtful!
Chris Green -----Original Message----- From: Mike Burden [mailto:[EMAIL PROTECTED]] Sent: Friday, January 18, 2002 7:43 AM To: [EMAIL PROTECTED] Subject: RE: [gb-users] Not Gnatbox but security related That would be why I told him to look for the ROOT.EXE file. If he has it, he's infected. If not, he isn't. Add up the number of security bulletins for IIS under Windows for any period of a month or more, and compare that to the number of bulletins in the same period for Apache under OpenBSD. To their credit, MS has actually decided to respond to security bulletins lately. Too bad they didn't start doing that years ago. Didn't we cover the infected vs not infected issue yesterday? Mike Burden Lynk Systems http://www.lynk.com (616)532-4985 [EMAIL PROTECTED]
