[
Lists Home |
Date Index |
Thread Index
]
- To: "Joe English" <jenglish@flightlab.com>,<xml-dev@lists.xml.org>
- Subject: RE: [xml-dev] Can A Web Site Be Reliably Defended Against DoS Attacks?
- From: "Dare Obasanjo" <dareo@microsoft.com>
- Date: Fri, 6 Feb 2004 18:56:17 -0800
- Thread-index: AcPtENvfNCPYULwBRe2QtQ/dJATFJwAFRjQB
- Thread-topic: [xml-dev] Can A Web Site Be Reliably Defended Against DoS Attacks?
Too bad your solutions would have been to no avail in the case of MyDoom since it (a) didn't require the mail client running executable content and (b) didn't use an Office related exploit. Thanks for bringing up half a decade old stereotypes about viruses on Windows though.
--
PITHY WORDS OF WISDOM
Blessed are the meek for they shall inherit the Earth, minus 40% inheritance tax.
________________________________
From: Joe English [mailto:jenglish@flightlab.com]
Sent: Fri 2/6/2004 4:25 PM
To: xml-dev@lists.xml.org
Cc: Dare Obasanjo
Subject: Re: [xml-dev] Can A Web Site Be Reliably Defended Against DoS Attacks?
On xml-dev, Dare Obasanjo wrote:
> Short of creating a mail client and server that prevented people from receivi
> ng mail attachments, how would you solve the problem exploited by this curren
> t virus on any one of the popular operating systems existing today?
Answer: create and use a mail client that *doesn't automatically
run attachments with executable content*.
For bonus points: recognize the fact that Word, Excel, and PowerPoint
documents are executable content.
Duh!
--Joe English
jenglish@flightlab.com
|