PureBytes Links
Trading Reference Links
|
Both.
If there exist a security loophole to exploit, then it can be
exploited by the vendor, or it can be utilized by a malicious
(current or former) employee, OR a skilled hacker not associated
with the vendor.
External hacking requires some skill, but can be done.
Remember, anyone can subscribe for a modest fee.
Once the hacker pays the monthly fee, the hacker can test his
reverse assembly skills 24 hours a day, 7 days a week. Practice
makes perfect.
The second possibility -- disgruntled or greedy former employee
scenario -- is almost a certainty in the long run. That would be
a no-brainer.
Leslie
David Colin wrote:
>
> > Even if you go to the trouble of installing the software on a clean, stand
> > alone machine, with NO other software, you are at risk for trojan horses,
> > spy ware, code theft, monitoring, etc. There exists no known security
> > filter to deal with these issues. It cannot be solved. You just have to
> > trust the vendor and pray.
>
> Leslie- So the danger would be from the vendor (i.e. TS) rather than outside
> hackers? Please pardon my ignorance of security issues.
>
> thanks,
>
> David
--
Regards,
Leslie Walko
610-688-2442
--
"Life is a tragedy for those who feel, a comedy for those who
think"
Horace Walpole, 4th earl of Orford, in a letter dated about 1770
|