Soldato
- Joined
- 14 Jun 2004
- Posts
- 6,413
Spam & Ham
WMF Vulnerability is an Intentional Backdoor?
Steve Gibson alleges that the WMF vulnerability in Windows was neither a bug, nor a feature designed without security in mind, but was actually an intentionally placed backdoor. In a more detailed explanation, Gibson explains that the way SetAbortProc works in metafiles does not bear even the slightest resemblance to the way it works when used by a program while printing. Based on the information presented, it really does look like an intentional backdoor." There's a transcript available of the 'Security Now!' podcast where Gibson discusses this.
http://www.grc.com/sn/SN-022.htm - transcript
http://www.grc.com/x/news.exe?cmd=article&group=grc.news.feedback&item=60006
http://www.grc.com/sn/SN-022.htm
Behind the Scenes at Hotmail
ACM Queue interviews Hotmail engineer Phil Smoot on how they manage more than 10,000 servers spread around the globe. Between them, they process billions of emails per day and are overseen by hundreds of administrators. To do that they have returned to the command line. From the article: 'Our operations group never wants to rely on any sort of user interface. Everything has to be scriptable and run from some sort of command line'. The overriding philosophy seems to be KISS. Also: tape backups are out and spam levels have stabilized.
http://www.acmqueue.com/modules.php?name=Content&pa=showpage&pid=353&page=1
http://it.slashdot.org/article.pl?sid=06/01/12/227212&tid=111
Also have a look at this thread : http://forums.overclockers.co.uk/showthread.php?p=6289913#post6289913
WMF Vulnerability is an Intentional Backdoor?
Steve Gibson alleges that the WMF vulnerability in Windows was neither a bug, nor a feature designed without security in mind, but was actually an intentionally placed backdoor. In a more detailed explanation, Gibson explains that the way SetAbortProc works in metafiles does not bear even the slightest resemblance to the way it works when used by a program while printing. Based on the information presented, it really does look like an intentional backdoor." There's a transcript available of the 'Security Now!' podcast where Gibson discusses this.
http://www.grc.com/sn/SN-022.htm - transcript
http://www.grc.com/x/news.exe?cmd=article&group=grc.news.feedback&item=60006
http://www.grc.com/sn/SN-022.htm
Behind the Scenes at Hotmail
ACM Queue interviews Hotmail engineer Phil Smoot on how they manage more than 10,000 servers spread around the globe. Between them, they process billions of emails per day and are overseen by hundreds of administrators. To do that they have returned to the command line. From the article: 'Our operations group never wants to rely on any sort of user interface. Everything has to be scriptable and run from some sort of command line'. The overriding philosophy seems to be KISS. Also: tape backups are out and spam levels have stabilized.
http://www.acmqueue.com/modules.php?name=Content&pa=showpage&pid=353&page=1
http://it.slashdot.org/article.pl?sid=06/01/12/227212&tid=111
Also have a look at this thread : http://forums.overclockers.co.uk/showthread.php?p=6289913#post6289913
Last edited: