Vulnerability Count

Forside
Vedhæftede filer:
Indlæg som e-mail
+ (text/plain)
Slet denne besked
Besvar denne besked
Skribent: Jason
Dato:  
Emne: Vulnerability Count
"John (EBo) David" wrote:
> observation. Now for which is the most secure: by what and whose
> criteria?


When was the last time you saw a new remote exploit for software
written to run on an Apple 2 or a C64?

(Yes, such things existed, just with dialup BBSes rather than TCP/IP..
)

-- 
jkenner @ mindspring . com__
I Support Linux:           _> _  _ |_  _  _     _|
Working Together To       <__(_||_)| )| `(_|(_)(_|
To Build A Better Future.       |                   <s>