Feeds

Borland exposé ‘irresponsible’

And as for hacking Microsoft...

  • alert
  • submit to reddit

Boost IT visibility and business value

Borland Interbase backdoor exposed

Irresponsible, us? Absolutely, according to a letter Drew Cullen recently received from Ian Whitcombe:

I have been an avid reader of your site for a while now and have always found it informative and professional. However, I was extremely shocked when reading your article on the Borland Interbase backdoor to see how irresponsible you have been by publishing, not only the back door itself, but also the port to scan on the Internet to take advantage of it. Whereas I accept that users of Interbase should be aware of this problem, could you not have written this article with slightly less technical detail? Clearly, this information could be gleaned from hacker sites or whatever, but do you have to make it so easy?

Add this to the sensationalist and wholly irresponsible How to Hack Microsoft article recently and it appears that you are keen to stir up as much activity of this sort as possible. Is this deliberate so that you have more juicy hacking stories to report?

So come on Mr Cullen, can we have the same stories with a little less damaging detail?

Ian, I'd like to make the following points:

The Borland piece comes from SecurityFocus.com, a US site with which we have a content-swapping agreement. SecurityFocus is an anti-hacking/pro-security site, which publishes lists of bugs (such as NTBugTraq).

By all means consider How to hack Microsoft sensationalist.. the purpose of this article was to show our general readership how easily hackers can, through social engineering and other relatively simple means, get past the systems of large/sophisticated guides. It certainly wasn't a hacker's manual - although there are plenty of those around on the Net.

Finally, your suggestion that we are engineering hacker activity to write stories is taking a conspiracy theory a little too far, don't you think?

Drew

Secure remote control for conventional and virtual desktops

More from The Register

next story
MEN WANTED to satisfy town full of yearning BRAZILIAN HOTNESS
'Prettier, better organised, more harmonious than if men were in charge'
Cops baffled by riddle of CHICKEN who crossed ROAD
'Officers were unable to determine Chicken's intent'
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Drunkards warned: If you can't walk in a straight line, don't shop online, you fool!
Put it away boys. Cover them up ladies. Your credit cards, we mean
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
Murder accused DIDN'T ask Siri 'how to hide my roommate'
US court hears of cached browser image - not actual request
Chomp that sausage: Brits just LOVE scoffing a Full Monty
Sales of traditional brekkie foods soar as hungry folk get their mitts greasy
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.