Vulnerability Count

John (EBo) David plug-discuss@lists.PLUG.phoenix.az.us
Sat, 25 Aug 2001 12:24:00 -0700


Jason wrote:
> 
> "John (EBo) David" wrote:
> > observation.  Now for which is the most secure:  by what and whose
> > criteria?
> 
> When was the last time you saw a new remote exploit for software
> written to run on an Apple 2 or a C64?
> 
> (Yes, such things existed, just with dialup BBSes rather than TCP/IP..
> )

cool...  I wonder if anyone could adapt CR to infect giga-pets!

  EBo --