On Thu, 2003-07-24 at 09:22, Ben Sewell wrote: > Ok. Thanks for letting me know about the story. > > Well personally I would still do it. There is nothing dangerous on my linuz > box. The sole purpose of the linux box is to be a webserver. Eg, the only > thing they could hack is just my website so in theory there is nothing I > need. > > I need those extensions because we are using loads of databases in Access > which requiure the extentions to import the information from web forms > directly into Access. Tahts exactly what I need because I will have a major > school project which would need to use Access and the webforms. That project > also happens to be part of my final school grade so I want to do well in it. >
Whoa! IMNSHO this the wrong attitude. The danger of a box being broken into is not only the data and the possible defacing of your web site but the fact that a hijacked box can be, and often is, used to launch attacks on on other machines that are then all but untracable back to the bad guys but instead point to you. Then the rest of us have yet another hacked box to deal with. Whether it is used as a spam relay or a porn site it is available. Sort of like keeping a handgun on the front seat of my car and not locking it while parking it in front of a crack house. " Oh well, that gun was a gift anyway" A long way to stretch a point and I apologize for sounding alarmist but I wanted to make a point and could not think of a softer way to do it. Bret I feel that being part of the Net requires me to think beyond myself and try not do anything that will help the bad guys. -- redhat-list mailing list unsubscribe mailto:[EMAIL PROTECTED] https://www.redhat.com/mailman/listinfo/redhat-list