Posted on 09/05/2012 12:51:34 PM PDT by ShadowAce
:(){ :|:& };:is NOT recommended to be run as root in a bash shell. ;)
/johnny
bwahhahahhaaa
yeah right, nothing is 100% unless its turned off
Sometimes reading FR is slacking off and sometimes it is a productive use of time. This time it is the latter.
Thanks.
I think a large part if it is the technical abilities of the typical user of windows vs linux. The test will be how Mac fairs in the next few years because I’ve not met many windows users who can change looking seriously at windows 2012.
But you knew that, right?
bump
ping
Yup not even virus writers support IX..... ;)
Yup not even virus writers support IX..... ;)
Yes, that was my point. You’re right the author doesn’t overstate the strength of Linux but many people do. In all fairness its not usually linux that gets hacked, but the installed software.
We just had a client who had one of their linux web server hacked (Ubuntu) through installed software. It appeared to be a completely scripted hack but opened up some serious issues. Intruder installed a phishing site on their server and leveraged access to the DB server through Mysql. The DB server gave them complete access to the corporate network.
It's an attitude and a process.
3. Because the penguin does not have near as long an enemies list as Bill Gates does
“yeah right, nothing is 100% unless its turned off”
No guarantees on that, either. Ever heard of a ‘Wake-on-LAN-ping’?
Open source is much over-rated when it comes to protection from exploits.
In fact, in many cases it makes exploits easier.
There are any number of open source projects in wide use that are frequent targets of hacks.
Yup. Security is never “just install this OS and all your probelms are solved.”
It’s an attitude and a process.
________
I ran a super secure computer system for over 20 years and it is still in service even though hardware support is now very difficult to come by. Why is it still in service? It has a 100% record of never being hacked and has never failed for any mission it was assigned to. Mind you it came close a couple of times but still managed to carry through to the end.
It also has ZERO connection to the outside world. No internet access whatsoever. Today that really is the only way a computer system will be hacker-proof.
driftdiver: yeah right, nothing is 100% unless its turned off
MeganC: No guarantees on that, either. Ever heard of a Wake-on-LAN-ping?
I was once a sysadmin. In that past life I said “turned off along with ALL wires disconnected. A sledge hammer also helps improve security, but the bosses wouldn’t let me.
Turn Vlad The Impaler loose on the writers of malicious code.
Until the penalties for doing this trash catch up with their consequences thing will stay the same.
BTW, as the man said, NOTHING is completely secure.
Are “permissions”, (sorry, old Unix term), used with Linux?
If so, would you please discuss their significance to the security of a system?
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.