Vulnerability Count

Forside
Vedhæftede filer:
Indlæg som e-mail
+ (text/plain)
Slet denne besked
Besvar denne besked
Skribent: John (EBo) David
Dato:  
Emne: Vulnerability Count
Jason wrote:
>
> "John (EBo) David" wrote:
> > observation. Now for which is the most secure: by what and whose
> > criteria?
>
> When was the last time you saw a new remote exploit for software
> written to run on an Apple 2 or a C64?
>
> (Yes, such things existed, just with dialup BBSes rather than TCP/IP..
> )


cool... I wonder if anyone could adapt CR to infect giga-pets!

EBo --