Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]


Groups > rocksolid.shared.security > #86

Re: Open season on Outlook servers

Path csiph.com!weretis.net!feeder6.news.weretis.net!i2pn.org!rocksolid2!.POSTED.127.139.135.22!not-for-mail
From Anonymous <poster@anon.com>
Newsgroups rocksolid.shared.security
Subject Re: Open season on Outlook servers
Date Thu, 11 Mar 2021 08:59:46 -0800
Organization def2
Message-ID <opsec.791.ecebv@anon.com> (permalink)
References <opsec.789.1s3a85@anon.com>
Content-Type text/plain; charset=UTF-8
Injection-Info novabbs.org; posting-account="def2"; posting-host="127.139.135.22"; logging-data="24560"; mail-complaints-to="usenet@novabbs.org"
Xref csiph.com rocksolid.shared.security:86

Show key headers only | View raw


>>c6c3e461941c65ca58
>I doubt a microsoft product will ever be safe.

I agree, and not because the coders at MS are necessarily bad. It really seems to be a question of attitude more than a question of skill. The link goes to an article where they describe how to assess of an exchange server was attacked or not. You guessed it, it boils down to: check for this and that string and for this and that behavior. As if you could trust any such installation ever again...

https://www.microsoft.com/security/blog/2020/06/24/defending-exchange-servers-under-attack/

-- 
Posted on def2

Back to rocksolid.shared.security | Previous | NextPrevious in thread | Find similar


Thread

Open season on Outlook servers Anonymous <poster@anon.com> - 2021-03-06 01:57 -0800
  Re: Open season on Outlook servers Anonymous@novabbs.i2p (Anonymous) - 2021-03-06 12:14 +0000
  Re: Open season on Outlook servers Anonymous <poster@anon.com> - 2021-03-11 08:59 -0800

csiph-web