Re: [foxboro] Open vs. proprietary technologies, was: Foxboro I/A OPC

  • From: "Sieling, Marcel" <Marcel.Sieling@xxxxxxxxxxxxxxxx>
  • To: "'foxboro@xxxxxxxxxxxxx'" <foxboro@xxxxxxxxxxxxx>
  • Date: Sun, 12 Mar 2006 08:20:23 -0500

Andreas,

you wrote:
> The number of attacks depend on the interest of people of doing that.

That's true and it's not contradicting to what I said. If knowledge is low
and numbers of installations is low as a consequence interest for attackers
is low because their exploits can only be used on a small number of systems
and not "everywhere". To come back to our topic: It's not very attractive
for hackers to try to attack FoxView/FoxDraw. But it is attractive to
develop exploits for the MS Internet Explorer.

Best regards -

Marcel Sieling
Senior Application Consultant

Invensys Systems GmbH
Emanuel-Leutze-Str. 11
40547 Duesseldorf
Germany
T: +49-211-5966-302
F: +49-163-99-5966302 
M: +49-163-5966302
Skype:  marcel.sieling
mailto:marcel.sieling@xxxxxxxxxxxxxxxx
http://www.foxboro-deutschland.de


> -----Original Message-----
> From: foxboro-bounce@xxxxxxxxxxxxx 
> [mailto:foxboro-bounce@xxxxxxxxxxxxx] On Behalf Of Weiss, Andreas
> Sent: Friday, March 10, 2006 12:48 PM
> To: foxboro@xxxxxxxxxxxxx
> Subject: Re: [foxboro] Open vs. proprietary technologies, 
> was: Foxboro I/A OPC
> 
> 
> > All connectivity has always pro's=20
> > and con's which
> > need to be carefully weighted against each other. Proprietary=20  
> >technologies  may have some disadvantages to customers like e.g. 
> >single=20  source for supply,
> > but it's by the nature of the thing more unlikely that there=20
> > exploits for
> > bugs existing and the risk of being compromised by an attack=20
> > is much lower,
> > if not near zero.
> >=20
> 
> Hi Marcel,
> 
> your arguments seems to be right but there are not.
> 
> The number of attacks depend not only to the knowledge about 
> the system. Otherwise would it mean that Linux systems has to 
> be the number one of hacked systems because their source code 
> is free available. Windows systems are on top of the list of 
> hacked systems and their source code is not public free 
> available. OK the windows API is free available.
> 
> The number of attacks depend on the interest of people of doing that.
> 
> Why do people attacking other machines or systems?
> - money
> - "honor" driven by a competition between hackers
> - frustrated employes
> - ...
> 
> Andreas=20
>  
>  
> ______________________________________________________________
> _________
> This mailing list is neither sponsored nor endorsed by 
> Invensys Process Systems (formerly The Foxboro Company). Use 
> the info you obtain here at your own risks. Read 
> http://www.thecassandraproject.org/disclaimer.html
>  
> foxboro 
> mailing list:             //www.freelists.org/list/foxboro
> to subscribe:         
> mailto:foxboro-request@xxxxxxxxxxxxx?subject=join
> to 
> unsubscribe:      mailto:foxboro-request@xxxxxxxxxxxxx?subject=leave
>  
> 

 
 
_______________________________________________________________________
This mailing list is neither sponsored nor endorsed by Invensys Process
Systems (formerly The Foxboro Company). Use the info you obtain here at
your own risks. Read http://www.thecassandraproject.org/disclaimer.html
 
foxboro mailing list:             //www.freelists.org/list/foxboro
to subscribe:         mailto:foxboro-request@xxxxxxxxxxxxx?subject=join
to unsubscribe:      mailto:foxboro-request@xxxxxxxxxxxxx?subject=leave
 

Other related posts: