On Thu, 2003-07-24 at 09:22, Ben Sewell wrote:
> Ok. Thanks for letting me know about the story.
> 
> Well personally I would still do it. There is nothing dangerous on my linuz 
> box. The sole purpose of the linux box is to be a webserver. Eg, the only 
> thing they could hack is just my website so in theory there is nothing I 
> need.
> 
> I need those extensions because we are using loads of databases in Access 
> which requiure the extentions to import the information from web forms 
> directly into Access. Tahts exactly what I need because I will have a major 
> school project which would need to use Access and the webforms. That project 
> also happens to be part of my final school grade so I want to do well in it.
> 

Whoa!

IMNSHO this the wrong attitude. The danger of a box being broken into is
not only the data and the possible defacing of your web site but the
fact that a hijacked box can be, and often is, used to launch attacks on
on other machines that are then all but untracable back to the bad guys
but instead point to you.  

Then the rest of us have yet another hacked box to deal with. Whether it
is used as a spam relay or a porn site it is available.

Sort of like keeping a handgun on the front seat of my car and not
locking it while parking it in front of a crack house.  " Oh well, that
gun was a gift anyway" 

A long way to stretch a point and I apologize for sounding alarmist but
I wanted to make a point and could not think of a softer way to do it.

Bret

I feel that being part of the Net requires me to think beyond myself and
try not do anything that will help the bad guys.   


-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]
https://www.redhat.com/mailman/listinfo/redhat-list

Reply via email to