|
|
User Controls
|
New User
|
Login
|
Edit/View My Profile
|
|
|
|
ActiveMac
|
Articles
|
Forums
|
Links
|
News
|
News Search
|
Reviews
|
|
|
|
News Centers
|
Windows/Microsoft
|
DVD
|
ActiveHardware
|
Xbox
|
MaINTosh
|
News Search
|
|
|
|
ANet Chats
|
The Lobby
|
Special Events Room
|
Developer's Lounge
|
XBox Chat
|
|
|
|
FAQ's
|
Windows 98/98 SE
|
Windows 2000
|
Windows Me
|
Windows "Whistler" XP
|
Windows CE
|
Internet Explorer 6
|
Internet Explorer 5
|
Xbox
|
DirectX
|
DVD's
|
|
|
|
TopTechTips
|
Registry Tips
|
Windows 95/98
|
Windows 2000
|
Internet Explorer 4
|
Internet Explorer 5
|
Windows NT Tips
|
Program Tips
|
Easter Eggs
|
Hardware
|
DVD
|
|
|
|
Latest Reviews
|
Applications
|
Microsoft Windows XP Professional
|
Norton SystemWorks 2002
|
|
Hardware
|
Intel Personal Audio Player
3000
|
Microsoft Wireless IntelliMouse
Explorer
|
|
|
|
Site News/Info
|
About This Site
|
Affiliates
|
ANet Forums
|
Contact Us
|
Default Home Page
|
Link To Us
|
Links
|
Member Pages
|
Site Search
|
Awards
|
|
|
|
Credits
©1997/2004, Active Network. All
Rights Reserved.
Layout & Design by
Designer Dream. Content
written by the Active Network team. Please click
here for full terms of
use and restrictions or read our
Privacy Statement.
|
|
|
|
|
|
|
|
Time:
03:53 EST/08:53 GMT | News Source:
VNUNet |
Posted By: Byron Hinson |
Microsoft is still investigating flaws found last month in Internet Explorer that could allow malicious hackers to access users' passwords for e-commerce and online banking sites. Israeli security consultancy GreyMagic has criticised Microsoft for its slow response to the nine vulnerabilities in Internet Explorer versions 5.5 and 6.0, eight of which were rated 'critical'.
|
|
#1 By
2062 (68.129.23.144)
at
11/8/2002 4:09:05 AM
|
I read on slashdot yesterday that mozilla has 6 serious bugs outstanding. Why the double standard?
-gosh
|
#2 By
2960 (68.100.157.191)
at
11/8/2002 7:53:48 AM
|
#4,
Hey, if you want to rule the world, you have to take the heat that comes with it.
TL
|
#3 By
1845 (12.254.162.111)
at
11/8/2002 9:51:56 AM
|
It's amazing how easy it is to issue a fix when you barely have to think about regression testing. What a blessing it is to have less than 1% market share!
|
#4 By
135 (209.180.28.6)
at
11/8/2002 10:05:47 AM
|
Has Redhat issued a patch yet for the KDE issue that came up in August? That was browser related with Konqueror.
There is definately a double-standard, but I suspect the reason why the media doesn't report on Linux problems is simply because nobody is using that platform, so it's irrelevant.
|
#5 By
135 (209.180.28.6)
at
11/8/2002 11:12:48 AM
|
bluej: How am I justifying Microsoft?
We're talking about media coverage. I'm simply pointing out that Redhat Linux's history with security is one of the more dismal in the industry, and yet we see no reporting on this.
On the one hand we could assume it's because the media assumes nobody uses Linux and therefore the news is irrelevant. The other alternative explanation is that the media is biased against Microsoft, and refuses to publish anti-Linux opinions. But that latter theory doesn't pass Occam's Razor.
|
#6 By
135 (209.180.28.6)
at
11/8/2002 2:20:08 PM
|
linuxhippie - Yes, that's what I find so odd. Redhat 7.2 and 7.3 shipped with vulnerable versions(at least according to the version stamp in their manifest), and I've yet to see a security bulletin on Redhat's website which addresses the issue.
They did release Redhat 8 which includes 3.0.3, but that also has security problems, and again there has not been a security bulletin released by Redhat to address the patched version.
http://www.kde.org/announcements/announce-3.0.4.html
Redhat's whole reputation is built upon providing the service... their Redhat Network is supposed to be there bread and butter. Here we have a situation of known issues having patches available, and Redhat is still ignoring them. So what value do they actually add as a Linux vendor?
I'm going to do some more research on this. I've been talking a lot about it, it's time to write it into an article and see if some media outlet will pick up on it.
This post was edited by sodablue on Friday, November 08, 2002 at 14:20.
|
#7 By
1845 (12.254.162.111)
at
11/8/2002 3:50:39 PM
|
I can't wait to read sodablue's Red Hat expose.
|
#8 By
135 (209.180.28.6)
at
11/8/2002 4:46:51 PM
|
bas - I'll definately do that.
|
#9 By
2459 (24.233.39.98)
at
11/8/2002 7:46:15 PM
|
"with Microsoft's $$$ billions and thousands of programmers, why does it take longer than 5 days to issue a fully working perfect patch for its millions of users?"
Maybe because like most companies, MS also has limited resources. Every programmer in the company does not work on the same thing. They are divided into product groups which are run like separate businesses. Also, it's not a matter of just testing a patch with a clean install of every Windows version they support. They must test multiple configurations. They also must first, research the issue to see where exactly the problem starts. Many times, the software or component mentioned by bug catchers in their reports is not the software that actually causes the problem (Example: The SSL/Certificate issue thought to be an IE problem that was actually a Crypto Services component problem).
Finally, MS most likely has a backlog of issues they are working on. People can't expect that just because they report a bug, that is the only bug that MS is working on. It may be weeks before work is started on that bug. The affected code may also be handled by external contractors.
|
#10 By
1845 (12.254.162.111)
at
11/9/2002 4:37:58 AM
|
bas (#20) Actually that bug was patched months ago. The fix was first provided with Windows XP SP 1.
|
|
|
|
|