HP3000-L Archives

March 1995, Week 5

HP3000-L@RAVEN.UTC.EDU

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Chris Michael <[log in to unmask]>
Reply To:
Chris Michael <[log in to unmask]>
Date:
Tue, 28 Mar 1995 19:07:01 GMT
Content-Type:
text/plain
Parts/Attachments:
text/plain (18 lines)
For what it's worth, coming from a University (read mostly Unix) environment,
I'm very familiar with trying to keep open systems safe.  The debates over how
much information to give out have been going on for *years* in the various
internet security newsgroups.  No resolution, yet.  :-)
 
I'm as curious as the next person, but I think HP did pretty well.  They let
us know that you had to be logged on to the system to get exploit the holes
and the provided a fix.
 
More information would probably be counter-productive.
 
I'd also have to say that, given the large number of system managers, anything
you tell them as a group might as well be published in the NY Times.  :-)
 
Chris
--
christopher michael, george s. may international, 708-825-8806 x 395

ATOM RSS1 RSS2