On Mon, 8 May 2000, David Heath wrote:
> The problem is not everyone running the same software, the problem is:
That's part of the problem - it makes it easy to know that the exploit
will propagate - like the sendmail worm.
> 1) No security model in the most common os!
It has security, however it comes with a very loose setting out of the
box, and most people don't know to change it. If you change your security
setting to "Internet Explorer's Restricted Sites" setting then you'd be
immune.
> 2) Unnecessary and dangerous scripting capability being added to
> everything these days. Scripting is fine for the user, but mail, web
> clients, etc, should not accept scripts from the outside world.
Agreed - well, they can accept it, but it should run like on a JVM - it
only has access to the resources of the JVM, not the host OS.
--
To unsubscribe: mail ">majordomo@ale.org with "unsubscribe ale" in message body.