This is the second part of our interview with two UK hackers dryice and frixion who were implicated in testimony during a recent trial over a denial of service attack on one of the largest ports in the US. Here they . . .
This is the second part of our interview with two UK hackers dryice and frixion who were implicated in testimony during a recent trial over a denial of service attack on one of the largest ports in the US. Here they reveal how businesses are still leaving themselves woefully exposed to even the most inexperienced script kiddies.

frixion, who now holds down a steady and respectable job in public sector IT, said that the sheer volume of patches that need applying in order to close the vulnerabilities that are exposed in equally worrying volumes are a headache for administrators.

"Take your standard Windows install for example, you need to apply dozens of patches as soon as you install it to make it even half secure. I've just taken a look at the content directory on our Microsoft Software Update Services server here at work and there are over 600Mb of security updates, some critical. Granted they're not all pertinent to a particular system, but it gives you a good idea," he wrote in an email.

The link for this article located at silicon.ciom is no longer available.