Feeds

Borland exposé ‘irresponsible’

And as for hacking Microsoft...

  • alert
  • submit to reddit

Intelligent flash storage arrays

Borland Interbase backdoor exposed

Irresponsible, us? Absolutely, according to a letter Drew Cullen recently received from Ian Whitcombe:

I have been an avid reader of your site for a while now and have always found it informative and professional. However, I was extremely shocked when reading your article on the Borland Interbase backdoor to see how irresponsible you have been by publishing, not only the back door itself, but also the port to scan on the Internet to take advantage of it. Whereas I accept that users of Interbase should be aware of this problem, could you not have written this article with slightly less technical detail? Clearly, this information could be gleaned from hacker sites or whatever, but do you have to make it so easy?

Add this to the sensationalist and wholly irresponsible How to Hack Microsoft article recently and it appears that you are keen to stir up as much activity of this sort as possible. Is this deliberate so that you have more juicy hacking stories to report?

So come on Mr Cullen, can we have the same stories with a little less damaging detail?

Ian, I'd like to make the following points:

The Borland piece comes from SecurityFocus.com, a US site with which we have a content-swapping agreement. SecurityFocus is an anti-hacking/pro-security site, which publishes lists of bugs (such as NTBugTraq).

By all means consider How to hack Microsoft sensationalist.. the purpose of this article was to show our general readership how easily hackers can, through social engineering and other relatively simple means, get past the systems of large/sophisticated guides. It certainly wasn't a hacker's manual - although there are plenty of those around on the Net.

Finally, your suggestion that we are engineering hacker activity to write stories is taking a conspiracy theory a little too far, don't you think?

Drew

Secure remote control for conventional and virtual desktops

More from The Register

next story
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
Bible THUMP: Good Book beats Darwin to most influential tome title
Folio Society crowns fittest of surviving volumes
U wot? Silicon Roundabout set to become Silicon U-BEND
Crap-spouting London upstarts to get permanent road closure
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Getting ahead of the compliance curve
Learn about new services that make it easy to discover and manage certificates across the enterprise and how to get ahead of the compliance curve.