Vulnerability Count
Jason
plug-discuss@lists.PLUG.phoenix.az.us
Sat, 25 Aug 2001 19:27:15 +0000
"John (EBo) David" wrote:
> observation. Now for which is the most secure: by what and whose
> criteria?
When was the last time you saw a new remote exploit for software
written to run on an Apple 2 or a C64?
(Yes, such things existed, just with dialup BBSes rather than TCP/IP..
)
--
jkenner @ mindspring . com__
I Support Linux: _> _ _ |_ _ _ _|
Working Together To <__(_||_)| )| `(_|(_)(_|
To Build A Better Future. | <s>