purplehaz said:
I agree. But...the only real people to blame is the virus creator
themselves. Ignorance on computer security is very common. "Holes" in
windows are common and are going to happen(with any os). The scumbags
who write the viruses are the prob. Just because you can exploit
something or someone does not mean you should. If these scums were
dead, we wouldn't need patches and av programs.
BLASTER seems to me to be a social statement. Deliberately showing
itself with bad code, and doing no serious permanent damage. I can
understand the why in this case but don't agree with it being unleashed,
and not everybody writing exploits is doing it for nefarious reasons,
but there will always be scumbags, and when caught should be prosecuted
to the full extent of the law, plus monetary damages!
And this particular buffer overrun has been in Windows since NT4, and
was also released with Windows Server 2003, so MS's 'Trustworthy
Computing' was of absolutely no help! Combined this with the recent bad
critical update, MS and especially it's minions here should be a lot
more understanding that neophyte End Users have been caught up in this
RPC/Blaster flood! I know I've been waiting at least a couple of weeks
after a patched is released before I even attempt to test it out on the
computers I take care of at work.
--
Peace!
Kurt
Self-anointed Moderator
microscum.pubic.windowsexp.gonorrhea
http://microscum.kurttrail.com
"Trustworthy Computing" is only another example of an Oxymoron!
"Produkt-Aktivierung macht frei!"