Announcement
Collapse
No announcement yet.
Microsoft failed use its own patches :-P
Collapse
X
-
Don't you just love it very funny.
-
The disclosure comes less than a week after Microsoft Chairman Bill Gates marked progress on the company's "Trustworthy Computing" initiative. That effort, announced a year ago, made security a top priority at the Redmond, Wash.-based company. Microsoft put thousands of its developers through security training to emphasize writing secure code, and hired a chief security officer.
Comment
-
Been fixing SQL SLammer all morning. IT's good to know the dolts at M$ haven't fixed themselves yet. I bet they wrote the virus to force people to upgrade to SQL SP3.
Jammrock“Inside every sane person there’s a madman struggling to get outâ€
–The Light Fantastic, Terry Pratchett
Comment
-
Nah, it's just the general idea behind buffer overflow exploits: Give more info than the software expects, and stick something nasty in the overflow. If the software is really poorly writen it can be tricked into running the code that overflowed.
Here's a link that describes the Slammer exploit.Last edited by Jon P. Inghram; 28 January 2003, 10:42.
Comment
Comment