Je hebt een klacht over de onderstaande posting:
http://www.openssl.org/news/secadv_hack.txt "Our investigation found that the attack was made through insecure passwords at the hosting provider, leading to control of the hypervisor management console, which then was used to manipulate our virtual server." En VMware suggereert in zijn verklaring dat de betreffende management console vCenter Server is: "In the event that Virtual Center is directly Internet facing VMware recommends customers remain current with patches and updates and that they follow the best practices in the vSphere Security Hardening guides" Welke ISP gaat zijn vCenter Server nou aan het Internet hangen?!?
Beschrijf je klacht (Optioneel):