I don't even understand how hard it could be to fix that. FFS, even souce code of that application is lying on the Internet open for everyone. When you know how stuff works, you know what you can do to prevent it from working.
It's good when the server is in Ubuntu and it is possible to prevent it from working through the OS itself, but for win users.. I don't know. We are working on that at the moment, but developers should think of other people who are not as experienced in such things as we are.
Cheers.
I don't even understand how hard it could be to fix that. FFS, even souce code of that application is lying on the Internet open for everyone. When you know how stuff works, you know what you can do to prevent it from working.
It's good when the server is in Ubuntu and it is possible to prevent it from working through the OS itself, but for win users.. I don't know. We are working on that at the moment, but developers should think of other people who are not as experienced in such things as we are.
Cheers.
What the hell are you talking about? Where do you see the source code of the LFS server? If the source code for LFS server would have been available we wouldn't be running LFS servers on Linux hosts through wine, because I'm sure someone would port it natively to *nix already.
And bringing down the LFS server in a way described above is not affected by the OS running it. It's a bug in the LFS server, not the OS.
TCP/IP related attacks are a problem with TCP/IP stack, not with a particular OS, because TCP/IP stack is a standard used on all devices connected to the interwebz, no matter the hardware or the OS that it is running(ok, there are some variations), and TCP/IP stack is known for this vulnerability, so we won't even go there. But like said, the above bug is caused by nothing else than the LFS dedicated server it self.
Clearly "source code" refers to the malicious application, and the point was that since the method is freely available, the fix should be easy to figure out. Also, API =/= implementation in OS.
Clearly "source code" refers to the malicious application, and the point was that since the method is freely available, the fix should be easy to figure out. Also, API =/= implementation in OS.
Yeah. I re-read it now when I'm home and I must apologize to the OP.
And I never mention "API" :P