Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. No one is secure

No one is secure

Scheduled Pinned Locked Moved The Lounge
15 Posts 9 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • F Felix Gartsman

    After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

    M Offline
    M Offline
    Megan Forbes
    wrote on last edited by
    #2

    true, but education (and articles like that one) can put us back in control of our systems :-D The following statement about your geekness is true.
    The previous statement about your geekness is false.

    B 1 Reply Last reply
    0
    • F Felix Gartsman

      After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

      M Offline
      M Offline
      matthias s 0
      wrote on last edited by
      #3

      I hope that our Admins stay tuned when it comes to security issues ;) However I think there are only few "real hardcore" hackers out there. I believe the mass is just downloading Kevin-Mitnick-Groupie-Style "hack-tools" from an underground site and using them. Scary is, that those morons, that can't even write the Hello World thing in another language then JScript are successfully breaking into systems. Matthias

      In theory, there is no difference between theory and practice. In practice, however, there is.
      (unknown author)

      C 1 Reply Last reply
      0
      • M matthias s 0

        I hope that our Admins stay tuned when it comes to security issues ;) However I think there are only few "real hardcore" hackers out there. I believe the mass is just downloading Kevin-Mitnick-Groupie-Style "hack-tools" from an underground site and using them. Scary is, that those morons, that can't even write the Hello World thing in another language then JScript are successfully breaking into systems. Matthias

        In theory, there is no difference between theory and practice. In practice, however, there is.
        (unknown author)

        C Offline
        C Offline
        ColinDavies
        wrote on last edited by
        #4

        Thw wholw Mitnik think was blown out of proportiom. he too was just a script kiddie. I doubt the average hacker could write a hello world in jscript. There are whole bunch of hacker tools fleating around, Regardz Colin J Davies

        Sonork ID 100.9197:Colin

        You are the intrepid one, always willing to leap into the fray! A serious character flaw, I might add, but entertaining. Said by Roger Wright about me.

        B 1 Reply Last reply
        0
        • F Felix Gartsman

          After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

          D Offline
          D Offline
          Daniel Turini
          wrote on last edited by
          #5

          You are with a wrong feeling of security only by turning off your machine. You have to unplug it from the power outlet and the network too, because you may still bring up a machine with a Magic Packet[^] "In an organization, each person rises to the level of his own incompetence." Peter's Principle

          M 1 Reply Last reply
          0
          • F Felix Gartsman

            After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

            B Offline
            B Offline
            Brian Delahunty
            wrote on last edited by
            #6

            Felix Gartsman wrote: I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on You mean you didn't know that already!!! :confused: Regards, Brian Dela :-)

            1 Reply Last reply
            0
            • M Megan Forbes

              true, but education (and articles like that one) can put us back in control of our systems :-D The following statement about your geekness is true.
              The previous statement about your geekness is false.

              B Offline
              B Offline
              Brian Delahunty
              wrote on last edited by
              #7

              Megan Forbes wrote: true, but education (and articles like that one) can put us back in control of our systems Strong words form CP's very own Security Guru. :-) Regards, Brian Dela :-)

              M 1 Reply Last reply
              0
              • C ColinDavies

                Thw wholw Mitnik think was blown out of proportiom. he too was just a script kiddie. I doubt the average hacker could write a hello world in jscript. There are whole bunch of hacker tools fleating around, Regardz Colin J Davies

                Sonork ID 100.9197:Colin

                You are the intrepid one, always willing to leap into the fray! A serious character flaw, I might add, but entertaining. Said by Roger Wright about me.

                B Offline
                B Offline
                Brian Delahunty
                wrote on last edited by
                #8

                Colin^Davies wrote: Thw wholw Mitnik think was blown out of proportiom. he too was just a script kiddie. More social engineering than anything else as well!! Regards, Brian Dela :-)

                1 Reply Last reply
                0
                • B Brian Delahunty

                  Megan Forbes wrote: true, but education (and articles like that one) can put us back in control of our systems Strong words form CP's very own Security Guru. :-) Regards, Brian Dela :-)

                  M Offline
                  M Offline
                  Megan Forbes
                  wrote on last edited by
                  #9

                  Lol - I wish... :-O


                  The following statement about your geekness is true. The previous statement about your geekness is false.

                  B 1 Reply Last reply
                  0
                  • F Felix Gartsman

                    After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

                    L Offline
                    L Offline
                    Lost User
                    wrote on last edited by
                    #10

                    And I quote: A well-known example is the Unicode directory traversal vulnerability, which was exploited by the Code Blue worm. You're trusting these people? :-D rofl ;-) evilpen dot net::msn messenger:negacao@hotmail.com

                    E 1 Reply Last reply
                    0
                    • M Megan Forbes

                      Lol - I wish... :-O


                      The following statement about your geekness is true. The previous statement about your geekness is false.

                      B Offline
                      B Offline
                      Brian Delahunty
                      wrote on last edited by
                      #11

                      Megan Forbes wrote: I wish... You know it's true!!!! Regards, Brian Dela :-)

                      D 1 Reply Last reply
                      0
                      • D Daniel Turini

                        You are with a wrong feeling of security only by turning off your machine. You have to unplug it from the power outlet and the network too, because you may still bring up a machine with a Magic Packet[^] "In an organization, each person rises to the level of his own incompetence." Peter's Principle

                        M Offline
                        M Offline
                        Megan Forbes
                        wrote on last edited by
                        #12

                        Wow! Thanks for the link :cool:


                        The following statement about your geekness is true. The previous statement about your geekness is false.

                        1 Reply Last reply
                        0
                        • B Brian Delahunty

                          Megan Forbes wrote: I wish... You know it's true!!!! Regards, Brian Dela :-)

                          D Offline
                          D Offline
                          David Stone
                          wrote on last edited by
                          #13

                          All who vote for Megan for Secretary of Security? Aye! :) Norm Almond: I seen some GUI's in my life but WTF is this mess ;-) Leppie: I made an app for my sister and she wouldnt use it till it was colorful enough:) Norm:good point leppie, from that statement I can only deduce that this GUI must be aimed at children:laugh: Leppie:My sister is 25:eek: -Norm on the MailMagic GUI

                          B 1 Reply Last reply
                          0
                          • D David Stone

                            All who vote for Megan for Secretary of Security? Aye! :) Norm Almond: I seen some GUI's in my life but WTF is this mess ;-) Leppie: I made an app for my sister and she wouldnt use it till it was colorful enough:) Norm:good point leppie, from that statement I can only deduce that this GUI must be aimed at children:laugh: Leppie:My sister is 25:eek: -Norm on the MailMagic GUI

                            B Offline
                            B Offline
                            Brian Delahunty
                            wrote on last edited by
                            #14

                            Aye!!! Regards, Brian Dela :-)

                            1 Reply Last reply
                            0
                            • L Lost User

                              And I quote: A well-known example is the Unicode directory traversal vulnerability, which was exploited by the Code Blue worm. You're trusting these people? :-D rofl ;-) evilpen dot net::msn messenger:negacao@hotmail.com

                              E Offline
                              E Offline
                              Erik Funkenbusch
                              wrote on last edited by
                              #15

                              There was a code blue worm, as well as a code red worm. -- Where are we going? And why am I in this handbasket?

                              1 Reply Last reply
                              0
                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              • Login

                              • Don't have an account? Register

                              • Login or register to search.
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent
                              • Tags
                              • Popular
                              • World
                              • Users
                              • Groups