OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

 


 

   RE: [xml-dev] Can A Web Site Be Reliably Defended Against DoS Attacks?

[ Lists Home | Date Index | Thread Index ]
  • To: "Joe English" <jenglish@flightlab.com>,<xml-dev@lists.xml.org>
  • Subject: RE: [xml-dev] Can A Web Site Be Reliably Defended Against DoS Attacks?
  • From: "Dare Obasanjo" <dareo@microsoft.com>
  • Date: Fri, 6 Feb 2004 18:56:17 -0800
  • Thread-index: AcPtENvfNCPYULwBRe2QtQ/dJATFJwAFRjQB
  • Thread-topic: [xml-dev] Can A Web Site Be Reliably Defended Against DoS Attacks?

Too bad your solutions would have been to no avail in the case of MyDoom since it (a) didn't require the mail client running executable content and (b) didn't use an Office related exploit. Thanks for bringing up half a decade old stereotypes about viruses on Windows though. 
 
-- 
PITHY WORDS OF WISDOM
Blessed are the meek for they shall inherit the Earth, minus 40% inheritance tax. 

________________________________

From: Joe English [mailto:jenglish@flightlab.com]
Sent: Fri 2/6/2004 4:25 PM
To: xml-dev@lists.xml.org
Cc: Dare Obasanjo
Subject: Re: [xml-dev] Can A Web Site Be Reliably Defended Against DoS Attacks?




On xml-dev, Dare Obasanjo wrote:

> Short of creating a mail client and server that prevented people from receivi
> ng mail attachments, how would you solve the problem exploited by this curren
> t virus on any one of the popular operating systems existing today?

Answer: create and use a mail client that *doesn't automatically
run attachments with executable content*.

For bonus points: recognize the fact that Word, Excel, and PowerPoint
documents are executable content.

Duh!


--Joe English

  jenglish@flightlab.com






 

News | XML in Industry | Calendar | XML Registry
Marketplace | Resources | MyXML.org | Sponsors | Privacy Statement

Copyright 2001 XML.org. This site is hosted by OASIS