Vulnerability Count

Jason plug-discuss@lists.PLUG.phoenix.az.us
Sat, 25 Aug 2001 19:27:15 +0000


"John (EBo) David" wrote:
> observation.  Now for which is the most secure:  by what and whose
> criteria?

When was the last time you saw a new remote exploit for software
written to run on an Apple 2 or a C64?

(Yes, such things existed, just with dialup BBSes rather than TCP/IP..
)

-- 
jkenner @ mindspring . com__
I Support Linux:           _> _  _ |_  _  _     _|
Working Together To       <__(_||_)| )| `(_|(_)(_|
To Build A Better Future.       |                   <s>