Free Republic
Browse · Search
Smoky Backroom
Topics · Post Article

Skip to comments.

Political hackers deface Novell SUSE sites
Security Focus ^ | October 3, 2005 | John Leyden

Posted on 10/03/2005 4:01:39 PM PDT by Golden Eagle

Three Novell OpenSUSE community web site were defaced on Sunday by politically motivated hackers. Defacement archive Zone-H reports that a group called IHS Iran Hackers Sabotage broke into OpenSUSE.org, wiki.novell.com and forge.novell.com to post a message stating that it was Iran's right to develop nuclear power. All three sites were defaced in the same way.

(Excerpt) Read more at securityfocus.com ...


TOPICS:
KEYWORDS: brassbuzzard; bustedbeagle; bustedtobackroom; chittychittychatchat; cluelessbeagle; cluelessbird; hahahahahaha; iran; linux; mmmmmturkey; oldensmeagol; opensource; redmondshill; redmondwhore; security; tinturkey; wasteoftime; windowsshill
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 181-187 next last
To: Golden Eagle

Just because they are from Iran, who says we can't punish them? ;)

(maniacal laughter)


41 posted on 10/03/2005 5:09:26 PM PDT by Killborn (God bless the rescuers, God bless the Commander in Chief, and God bless America.)
[ Post Reply | Private Reply | To 25 | View Replies]

To: Golden Eagle

Well its a trade off. Some information there is no benefit to releasing it for scrutiny. But when it comes to computer security public scrutiny is generally accepted as good. All the popular encryption algorithms are open source. They are considered more secure because more people can scrutinise them.


42 posted on 10/03/2005 5:10:24 PM PDT by bobdsmith
[ Post Reply | Private Reply | To 39 | View Replies]

To: bobdsmith
All the popular encryption algorithms are open source.

They've all pretty much been cracked now, haven't they? Keeping one's encryption key private is the key element of encryption anyway.

43 posted on 10/03/2005 5:12:48 PM PDT by Golden Eagle
[ Post Reply | Private Reply | To 42 | View Replies]

To: Killborn
Just because they are from Iran, who says we can't punish them? ;) (maniacal laughter)

LOL, we dang well should, if we can catch them.

44 posted on 10/03/2005 5:14:15 PM PDT by Golden Eagle
[ Post Reply | Private Reply | To 41 | View Replies]

To: Golden Eagle

Which have been cracked? If I had sensitive data I wouldn't feel comfortable security it with an algorithm that wasn't open to public scrutiny.


45 posted on 10/03/2005 5:16:49 PM PDT by bobdsmith
[ Post Reply | Private Reply | To 43 | View Replies]

To: Golden Eagle

Paging Sam Fisher...


46 posted on 10/03/2005 5:19:06 PM PDT by Killborn (God bless the rescuers, God bless the Commander in Chief, and God bless America.)
[ Post Reply | Private Reply | To 44 | View Replies]

To: N3WBI3; for-q-clinton

You can't even spell your supposed source right, LOL. Here's the definitive source, clearly says Linux.

http://www.zone-h.org/en/defacements/mirror/id=2917402


47 posted on 10/03/2005 5:20:20 PM PDT by Golden Eagle
[ Post Reply | Private Reply | To 40 | View Replies]

To: bobdsmith

Which haven't been cracked?

http://search.yahoo.com/search?p=encryption+cracked&fr=FP-tab-web-t&toggle=1&cop=&ei=UTF-8

Besides, as I said, keeping your key obscure is the lynchpin of encryption security. Without obscurity of the key, there effectively is no encryption.


48 posted on 10/03/2005 5:23:21 PM PDT by Golden Eagle
[ Post Reply | Private Reply | To 45 | View Replies]

To: Golden Eagle

A private key is data. I am talking about algorithms.


49 posted on 10/03/2005 5:26:04 PM PDT by bobdsmith
[ Post Reply | Private Reply | To 48 | View Replies]

To: Golden Eagle; N3WBI3
You can't even spell your supposed source right, LOL. Here's the definitive source, clearly says Linux.

http://www.zone-h.org/en/defacements/mirror/id=2917402

N3WBI3...do you care to withdraw any previous posts based on this information? Or will you continue to refute the obvious as you often do?

50 posted on 10/03/2005 5:26:29 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 47 | View Replies]

To: Golden Eagle
Ah but the sacrifice of being here makes it all worth it when I get soundbites like:

"Obviously, your team of open source fanatics is planning some attack aimed at discrediting me with attacks on my character. What else could it be, since you can't discredit these links."

Your so far off the deep end on these threads I get almost as much entertainment from watching you as I do the people who see it and try linux..

Keep up the shilling, you're the best ally I have...
51 posted on 10/03/2005 5:28:06 PM PDT by N3WBI3 (If SCO wants to go fishing they should buy a permit and find a lake like the rest of us..)
[ Post Reply | Private Reply | To 37 | View Replies]

To: bobdsmith
I am talking about algorithms.

I know. But they are completely useless in providing security without the obscurity of the key. Weren't you trying to claim obscurity isn't important for security? I seem to recall you were.

52 posted on 10/03/2005 5:28:11 PM PDT by Golden Eagle
[ Post Reply | Private Reply | To 49 | View Replies]

To: N3WBI3

Let me give you some friendly advice...if I were you I'd quickly admit you were mistaken (as usual [/LOL]) and drop the whole netware angle.

Then I'd go back and respond to previous posts appropriately.

Of course you can do what you want even though by choosing to ignore the obvious will only make you look silly; however, that hasn't stopped you before.


53 posted on 10/03/2005 5:29:31 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 50 | View Replies]

To: Golden Eagle

and the point of subjecting encryption algorithms to public scrutiny is to find out if they are secure. The point is not that releasing them to public scrutiny will somehow prevent them being cracked.


54 posted on 10/03/2005 5:29:37 PM PDT by bobdsmith
[ Post Reply | Private Reply | To 48 | View Replies]

To: Golden Eagle

The phrase "security through obscurity is no security at all" refers to algorithms


55 posted on 10/03/2005 5:31:39 PM PDT by bobdsmith
[ Post Reply | Private Reply | To 52 | View Replies]

To: for-q-clinton
yup, I do I went by netcraft and they were wrong. Are you saying that closed source operating systems cant be hacked because nobody can see the source?

BTW have you ever seen me say Linux cant be hacked? heck on this thread alone I admitted there are bugs that I see..

56 posted on 10/03/2005 5:32:42 PM PDT by N3WBI3 (If SCO wants to go fishing they should buy a permit and find a lake like the rest of us..)
[ Post Reply | Private Reply | To 50 | View Replies]

To: N3WBI3

Shilling? ROFL, going to finally admit it was Linux?


57 posted on 10/03/2005 5:33:33 PM PDT by Golden Eagle
[ Post Reply | Private Reply | To 51 | View Replies]

To: bobdsmith; Golden Eagle

I almost jumped in on the wrong side of this thing...I was thinking GE was saying algorithms are best to be hidden from public view. Which isn't always the case.

But now I see this started with bobdsmith saying something to the affect that security through obscurity isn't security at all.

But like most simple sayings it has it's weaknesses. And yes you still must keep the private key obscure. I think GE pulled a fast one on both of us as I wasn't thinking about security with a wide enough umbrella to realize that the saying isn't 100% true.

Good point GE.


58 posted on 10/03/2005 5:33:57 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 54 | View Replies]

To: Golden Eagle
Sure, I went by netcraft and they were wrong... point?

My first responce was that this was poor administration as it is for pretty much any server getting hacked.

59 posted on 10/03/2005 5:35:03 PM PDT by N3WBI3 (If SCO wants to go fishing they should buy a permit and find a lake like the rest of us..)
[ Post Reply | Private Reply | To 57 | View Replies]

To: sigSEGV

It's possible that it's Open Enterprise Server, which are Novell NetWare services that can run either on top of the Novell NetWare OS or Suse Enterprise Linux 9.

Novell has also been using Apache as their web server since NetWare 6.0, running natively on the NetWare OS.

Mark


60 posted on 10/03/2005 5:35:31 PM PDT by MarkL (I didn't get to where I am today by worrying about what I'd feel like tomorrow!)
[ Post Reply | Private Reply | To 7 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 181-187 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Smoky Backroom
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson