Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]
Groups > rocksolid.shared.security > #86
| Path | csiph.com!weretis.net!feeder6.news.weretis.net!i2pn.org!rocksolid2!.POSTED.127.139.135.22!not-for-mail |
|---|---|
| From | Anonymous <poster@anon.com> |
| Newsgroups | rocksolid.shared.security |
| Subject | Re: Open season on Outlook servers |
| Date | Thu, 11 Mar 2021 08:59:46 -0800 |
| Organization | def2 |
| Message-ID | <opsec.791.ecebv@anon.com> (permalink) |
| References | <opsec.789.1s3a85@anon.com> |
| Content-Type | text/plain; charset=UTF-8 |
| Injection-Info | novabbs.org; posting-account="def2"; posting-host="127.139.135.22"; logging-data="24560"; mail-complaints-to="usenet@novabbs.org" |
| Xref | csiph.com rocksolid.shared.security:86 |
Show key headers only | View raw
>>c6c3e461941c65ca58 >I doubt a microsoft product will ever be safe. I agree, and not because the coders at MS are necessarily bad. It really seems to be a question of attitude more than a question of skill. The link goes to an article where they describe how to assess of an exchange server was attacked or not. You guessed it, it boils down to: check for this and that string and for this and that behavior. As if you could trust any such installation ever again... https://www.microsoft.com/security/blog/2020/06/24/defending-exchange-servers-under-attack/ -- Posted on def2
Back to rocksolid.shared.security | Previous | Next — Previous in thread | Find similar
Open season on Outlook servers Anonymous <poster@anon.com> - 2021-03-06 01:57 -0800 Re: Open season on Outlook servers Anonymous@novabbs.i2p (Anonymous) - 2021-03-06 12:14 +0000 Re: Open season on Outlook servers Anonymous <poster@anon.com> - 2021-03-11 08:59 -0800
csiph-web