Vulnerability Count

Top Page
Attachments:
Message as email
+ (text/plain)
Delete this message
Reply to this message
Author: Jason
Date:  
Subject: Vulnerability Count
"John (EBo) David" wrote:
> observation. Now for which is the most secure: by what and whose
> criteria?


When was the last time you saw a new remote exploit for software
written to run on an Apple 2 or a C64?

(Yes, such things existed, just with dialup BBSes rather than TCP/IP..
)

-- 
jkenner @ mindspring . com__
I Support Linux:           _> _  _ |_  _  _     _|
Working Together To       <__(_||_)| )| `(_|(_)(_|
To Build A Better Future.       |                   <s>