[LINK] Microsoft Shores Up Windows Server Against Attacks March31,
dassa at dhs.org
Fri Apr 1 22:45:52 EST 2005
|> -----Original Message-----
|> From: link-bounces at anumail0.anu.edu.au
|> [mailto:link-bounces at anumail0.anu.edu.au] On Behalf Of Michael Still
|> Sent: Friday, April 01, 2005 10:34 PM
|> To: Antony Barry
|> Cc: Link list
|> Subject: Re: [LINK] Microsoft Shores Up Windows Server
|> Against Attacks March31, 20
|> Antony Barry wrote:
|> > The following text is abstracted from
|> > http://www.informationweek.com/story/showArticle.jhtml?
|> > articleID=160400036
|> > The new Windows server service pack, available on CD-ROM, as a
|> > download from Microsoft's Web site, or through Windows' automatic
|> > update feature, was designed to make systems less prone to attack
|> > while they're being set up on networks, says Jeff Price, a senior
|> > director of product management at Microsoft.
|> > Chief among the updates are the ability for Windows
|> servers equipped
|> > with Service Pack 1 to turn on their firewalls as soon as they're
|> > deployed, and to block inbound Internet traffic until Windows
|> > downloads Microsoft's latest security patches.
|> What state is iptables in during the install process for a
|> new Linux machine? I'd be surprised if it's turned on, given
|> that would require explicit throbbing in the installers.
That would be less of a problem than finding out just what is allowed during
the intalled and figuring out how to spoof the allowed connections. The
risk has to be figured and the least exposure implemented. No matter what
Os or application is involved.
Darryl (Dassa) Lynch
More information about the Link