Originally posted by: bolomite
went to windows update, and found four patches waiting for me, all posted within the last few days :|
Oh come on, you know damn well that no-one knew about that RPC hole on the outside, and probably not on the inside for more than 7 years. On top of that, the patch was out before an exploit was out.Originally posted by: glugglug
Windows vulnerability timeline:
t0: vulnerability found
t0 + a few hours maybe: vulnerability discussed on securityfocus and/or other places
t0 + maybe 1 week: exploit made which uses vulnerability
t0 + several months, or in the case of netbios/RPC holes, 12-13 years: MS releases security bulletin about existence of hole (call this time t1)
t1 + a month or so: M$ admits exploits for said hole already exist (call this t2)
t2 + a week or so: patch available
same goes for portage.Originally posted by: BingBongWongFooey
Different from what? Debian makes it dead simple (easier than windows update - AND you don't have to worry about them breaking your machine). I'm not sure about Apple but I can't imagine it's difficult.Originally posted by: Ameesh
the difference is MS does something about providing an easy to use mechanisim to distrubite security patches.
Originally posted by: LordMorpheus
Download Gentoo Linux. You can update the computer eevry night while you sleep. Does your kernel have pre-emptive capabilities (i don't know exactly what it does, but it sounds precognitive! (heh, just kidding))
Almost every modern OS has pre-emption. Otherwise, you wouldn't be able to multi-task.
![]()
Originally posted by: ViRGE
Oh come on, you know damn well that no-one knew about that RPC hole on the outside, and probably not on the inside for more than 7 years. On top of that, the patch was out before an exploit was out.Originally posted by: glugglug
Windows vulnerability timeline:
t0: vulnerability found
t0 + a few hours maybe: vulnerability discussed on securityfocus and/or other places
t0 + maybe 1 week: exploit made which uses vulnerability
t0 + several months, or in the case of netbios/RPC holes, 12-13 years: MS releases security bulletin about existence of hole (call this time t1)
t1 + a month or so: M$ admits exploits for said hole already exist (call this t2)
t2 + a week or so: patch available
Originally posted by: Gibson486
They wouldn't have to install so many updates if it wasn't so insecure in the first place.
ah haIf you feel that way, use a different OS.![]()
Originally posted by: Huz
Originally posted by: Supahfreak
What the hell is ActiveX??? Everytime I try to update I get this. help...
FreAk![]()
Try this
-or-
You may want to try the repair options from the "Add/Remove" applet in control panel.
I've seen this before but it's been a while and I can't remember what I did to fix it. Seems to me it wasn't what that Q article made reference to, but maybe you'll get lucky.![]()
Originally posted by: glugglug
Ah this set of updates is wonderful. After installing them on my work machine I had the joy of having to re-install the network drivers.