а чего такого? вот у меня на кафедре этим и пользуются. да и вообще все обраховательные программы на дотнет и прочие банальные щекотунчики завязаны. на меня же смотрят как на местного блаженного.
Ты не поверишь, вот буквально в 10ти метрах от меня седят товарисчи, которые все свои говяные поделки лепят под MS IIS и таких тысячи. Более того заказчиков, которые хотят именно венду и все вендовое, еще больше.
curl -I intel.com
HTTP/1.1 301 Moved Permanently
Content-Length: 144
Content-Type: text/html
Location: http://www.intel.com/
P3P: CP=«CAO DSP COR CURa ADMa DEVa TAIa PSAa PSDa OUR STP ONL UNI COM NAV INT DEM STA PRE»
X-Powered-By: ASP.NET
Date: Fri, 11 Jun 2010 13:44:30 GMT
Server: IA Web Server/1.0
curl -I nvidia.com
HTTP/1.1 301 Moved Permanently
Content-Length: 146
Content-Type: text/html
Location: http://www.nvidia.com//
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Fri, 11 Jun 2010 13:44:58 GMT
Set-Cookie: NSC_joufsobm-psjhjoxxx=ffffffffc3a0113545525d5f4f58455e445a4a423660;expires=Fri, 11-Jun-2010 13:53:26 GMT;path=/
«There's a large-scale attack underway that is targeting Web servers running Microsoft's IIS software, injecting the sites with a specific malicious script. The attack has compromised tens of thousands of sites already, experts say, and there's no clear indication of who's behind the campaign right now. The attack, which researchers first noticed earlier this week, already has affected a few high-profile sites, including those belonging to The Wall Street Journal and The Jerusalem Post. Some analyses of the IIS attack suggest that it is directed at a third-party ad management script found on these sites.»