I consider IIS a portion of Windows.  Compare the number of exploits for
windows running IIS to the number that are out there for various *nix
platforms and the gap is not nearly so wide.  A bad *nix admin is far
worse than a bad windows admin.  I see almost daily releases of exploits
for BIND, SSH, Sendmail, etc that are every bit as bad as the windows
ones we've seen.  Granted very few are exploitable via port 80, but I
seem to recall a very nasty root exploit in Apache about 4-6 months ago.
No product is perfect.  Code Red and Nimda exploited things that had
been patched for over a month when they came out.  99% of the windows
admins choose to ignore security warnings and refuse to patch their
servers.  Would these same people do a good job managing a BSD or Linux
box?  Doubtful!

Chris Green

-----Original Message-----
From: Mike Burden [mailto:[EMAIL PROTECTED]] 
Sent: Friday, January 18, 2002 7:43 AM
To: [EMAIL PROTECTED]
Subject: RE: [gb-users] Not Gnatbox but security related

That would be why I told him to look for the
ROOT.EXE file.  If he has it, he's infected.
If not, he isn't.

Add up the number of security bulletins for
IIS under Windows for any period of a month
or more, and compare that to the number of
bulletins in the same period for Apache under
OpenBSD.

To their credit, MS has actually decided to
respond to security bulletins lately.  Too
bad they didn't start doing that years ago.

Didn't we cover the infected vs not infected
issue yesterday?

Mike Burden
Lynk Systems
http://www.lynk.com
(616)532-4985
[EMAIL PROTECTED]


Reply via email to