Michael MacIsaac wrote:
But, with various security holes in Apache, particularly around CGI
Don't any holes get patched on a regular basis? If I am up to date on all
of my patches, I would not expect there to be a known hole in Apache CGIs.
We do tout the open source model as having superior security, largely
because of peer review, no?
Some here prefer to batch their updates, much as Microsoft generally
releases patches one each month.
Blindly installing the latest updates as they become available has its
own hazards, some here prefer not to follow this path. Some here like to
do their own testing; "who knows what the latest patch does to _our_
software?", they wonder.
What about PHP, and the numerous addons such as phpBB (which has had
some problems of its own) and all these?
http://freshmeat.net/search/?q=%22bulletin+board%22§ion=projects&Go.x=0&Go.y=0
What about your own code, is that all safe and secure?
This, while it doesn't provide me entry to the subject site, does
illustrate that big and important sites can have problems, and I know of
a bank that did the same thing:
http://www.realestate.com.au/cgi-bin/rsearch?a=redirect&o=WP_image&to=http%3A%2F%2fus.ibm.com/
--
Cheers
John
-- spambait
[EMAIL PROTECTED] [EMAIL PROTECTED]
Tourist pics http://portgeographe.environmentaldisasters.cds.merseine.nu/
Please do not reply off-list
----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390