-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Lawrence Glasser <[email protected]> wrote:
>
> Unfortunately, not everyone is as diligent as you in patching. I'd imagine
> that you check for patches FAR more frequently than the average user.
>


Of course, that is not a flaw in Outlook Express, that is a flaw in the
user.

> And, as one poster said, the patches are frequently applied AFTER the attack.
>


Again, if they are available, it is a flaw in the user. Many exploits
are found all the time in other mailers and news apps, and they are not
limitted to Windows. Windows is a popular target because VB script is
easy for those junior script kiddies to learn and hack apart somebody
elses work. Where as exploiting a buffer overrun in a C/C++ app typical
of most UNIX based mailers/readers is a much more problematic thing to
do.

This says nothing about the quality [or lack of quality] of a given
software product or of Outlook Express in particular. It says
everything about the user and it says something about the hackers choice
of programs they attack.

- --

Thomas T. Veldhouse
Key Fingerprint: 2DB9 813F F510 82C2 E1AE 34D0 D69D 1EDC D5EC AED1

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (FreeBSD)

iD8DBQFAooiY1p0e3NXsrtERAj2uAKCUZiXSPYM/xVe+Q13Oz2rI2dO+sgCeJfKT
a9mCQZN8T45XSzC3xzgCb5E=
=tkKo
-----END PGP SIGNATURE-----



See More: Morons posting broken hyperlinks