News

Microsoft Clarifies Problems with Test Site

If you put a public Web server running Windows 2000 beta without a firewall in front of it, they will come. They, or hackers, most certainly did. Before most had even heard that Microsoft had put a test server on the Internet to beta test the security of Windows 2000, hackers had already broken the ground rules of the test and sent millions of random packets to the server, causing major downtime.

Microsoft points out that system downtime is not synonymous with a security problem and that any firewall software would have prevented this but the Redmond giant wants to keep the beta as open as possible to put the machine through the most rigorous of uses.

Some hackers were able to cause some damage the old fashioned way, however. Microsoft reports that the site is running a guestbook application that permits users to post their comments to the site. One visitor placed a comment containing the "META Refresh HTML tag" into the text of their message. This causes Web browsers to redirect users to another Web site. Microsoft reports this was easy enough to fix, filtering out all HTML tags placed in the guestbook.

So far, the only other reasons the site's been down, according to Microsoft, have been overloads of traffic and an electrical storm that passed over the Seattle area. The site can still be accessed at www.windows2000test.com. -- Brian Ploskina

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • Microsoft Deprecating Windows To Go

    Microsoft plans to put an end to its Windows To Go product in the near future, according to a Friday support article.

  • Microsoft Releases Hyper-V Server 2019 After Long Delay

    Acknowledging that the release took "way too long," Microsoft has made Hyper-V Server 2019 available for download from the Microsoft Evaluation Center page.

  • Forklift Container

    A Better Way To Upgrade Hyper-V Storage

    It's time again for Brien to perform a major storage upgrade on his Hyper-V hosts. But this time, he's taking a new approach.

  • RAMBleed Side-Channel Attack Method Disclosed by Researchers

    Academic researchers this week published information about another side-channel attack method, called "RAMBleed," that can expose information from memory chips, including encryption key information.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.