Erm .net fix?
The link for statistics is leading to the .net fix mentioned in another article.
Compromised computers at Oracle UK are listed among the 10 worst offenders on the net for launching attacks on servers which run SSH (secure shell) server software. Oracle said it is investigating the reported problem, which it is yet to either confirm or refute. A box (or group of boxes behind a proxy) at Oracle UK is among …
Oracle's networks have long been a significant source of spam, apparently injected from compromised machines. I've reported it on numerous occasions to their postmaster and their abuse desk but never even had a reply. I am not in the least bit surprised to find out these pwn3d internal Oracle machines are now part of a botnet. Be a blood good thing if they do clean them up at long last.
the servers involved are running Oracle databases and hence have to be held down at some ancient patch level which Oracle has blessed as being able to run their database program?
(Don't laugh, there are many "enterprise" software packages which will only run on certain, ancient patch levels of OSs and which break if anything's upgraded.)
For some years we've had drivel and utter lies from Oracle about the resilience of their products. Remember the "Can't Break it" campaign? What absolute toss. Perhaps we'll see some real effort from this bunch of clowns to get their act together. I doubt it though.
Never mind. Perhaps one day the world will wake up and fall in love with DB2........
Biting the hand that feeds IT © 1998–2019