Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. No one is secure

No one is secure

Scheduled Pinned Locked Moved The Lounge
15 Posts 9 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • F Felix Gartsman

    After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

    M Offline
    M Offline
    matthias s 0
    wrote on last edited by
    #3

    I hope that our Admins stay tuned when it comes to security issues ;) However I think there are only few "real hardcore" hackers out there. I believe the mass is just downloading Kevin-Mitnick-Groupie-Style "hack-tools" from an underground site and using them. Scary is, that those morons, that can't even write the Hello World thing in another language then JScript are successfully breaking into systems. Matthias

    In theory, there is no difference between theory and practice. In practice, however, there is.
    (unknown author)

    C 1 Reply Last reply
    0
    • M matthias s 0

      I hope that our Admins stay tuned when it comes to security issues ;) However I think there are only few "real hardcore" hackers out there. I believe the mass is just downloading Kevin-Mitnick-Groupie-Style "hack-tools" from an underground site and using them. Scary is, that those morons, that can't even write the Hello World thing in another language then JScript are successfully breaking into systems. Matthias

      In theory, there is no difference between theory and practice. In practice, however, there is.
      (unknown author)

      C Offline
      C Offline
      ColinDavies
      wrote on last edited by
      #4

      Thw wholw Mitnik think was blown out of proportiom. he too was just a script kiddie. I doubt the average hacker could write a hello world in jscript. There are whole bunch of hacker tools fleating around, Regardz Colin J Davies

      Sonork ID 100.9197:Colin

      You are the intrepid one, always willing to leap into the fray! A serious character flaw, I might add, but entertaining. Said by Roger Wright about me.

      B 1 Reply Last reply
      0
      • F Felix Gartsman

        After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

        D Offline
        D Offline
        Daniel Turini
        wrote on last edited by
        #5

        You are with a wrong feeling of security only by turning off your machine. You have to unplug it from the power outlet and the network too, because you may still bring up a machine with a Magic Packet[^] "In an organization, each person rises to the level of his own incompetence." Peter's Principle

        M 1 Reply Last reply
        0
        • F Felix Gartsman

          After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

          B Offline
          B Offline
          Brian Delahunty
          wrote on last edited by
          #6

          Felix Gartsman wrote: I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on You mean you didn't know that already!!! :confused: Regards, Brian Dela :-)

          1 Reply Last reply
          0
          • M Megan Forbes

            true, but education (and articles like that one) can put us back in control of our systems :-D The following statement about your geekness is true.
            The previous statement about your geekness is false.

            B Offline
            B Offline
            Brian Delahunty
            wrote on last edited by
            #7

            Megan Forbes wrote: true, but education (and articles like that one) can put us back in control of our systems Strong words form CP's very own Security Guru. :-) Regards, Brian Dela :-)

            M 1 Reply Last reply
            0
            • C ColinDavies

              Thw wholw Mitnik think was blown out of proportiom. he too was just a script kiddie. I doubt the average hacker could write a hello world in jscript. There are whole bunch of hacker tools fleating around, Regardz Colin J Davies

              Sonork ID 100.9197:Colin

              You are the intrepid one, always willing to leap into the fray! A serious character flaw, I might add, but entertaining. Said by Roger Wright about me.

              B Offline
              B Offline
              Brian Delahunty
              wrote on last edited by
              #8

              Colin^Davies wrote: Thw wholw Mitnik think was blown out of proportiom. he too was just a script kiddie. More social engineering than anything else as well!! Regards, Brian Dela :-)

              1 Reply Last reply
              0
              • B Brian Delahunty

                Megan Forbes wrote: true, but education (and articles like that one) can put us back in control of our systems Strong words form CP's very own Security Guru. :-) Regards, Brian Dela :-)

                M Offline
                M Offline
                Megan Forbes
                wrote on last edited by
                #9

                Lol - I wish... :-O


                The following statement about your geekness is true. The previous statement about your geekness is false.

                B 1 Reply Last reply
                0
                • F Felix Gartsman

                  After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

                  L Offline
                  L Offline
                  Lost User
                  wrote on last edited by
                  #10

                  And I quote: A well-known example is the Unicode directory traversal vulnerability, which was exploited by the Code Blue worm. You're trusting these people? :-D rofl ;-) evilpen dot net::msn messenger:negacao@hotmail.com

                  E 1 Reply Last reply
                  0
                  • M Megan Forbes

                    Lol - I wish... :-O


                    The following statement about your geekness is true. The previous statement about your geekness is false.

                    B Offline
                    B Offline
                    Brian Delahunty
                    wrote on last edited by
                    #11

                    Megan Forbes wrote: I wish... You know it's true!!!! Regards, Brian Dela :-)

                    D 1 Reply Last reply
                    0
                    • D Daniel Turini

                      You are with a wrong feeling of security only by turning off your machine. You have to unplug it from the power outlet and the network too, because you may still bring up a machine with a Magic Packet[^] "In an organization, each person rises to the level of his own incompetence." Peter's Principle

                      M Offline
                      M Offline
                      Megan Forbes
                      wrote on last edited by
                      #12

                      Wow! Thanks for the link :cool:


                      The following statement about your geekness is true. The previous statement about your geekness is false.

                      1 Reply Last reply
                      0
                      • B Brian Delahunty

                        Megan Forbes wrote: I wish... You know it's true!!!! Regards, Brian Dela :-)

                        D Offline
                        D Offline
                        David Stone
                        wrote on last edited by
                        #13

                        All who vote for Megan for Secretary of Security? Aye! :) Norm Almond: I seen some GUI's in my life but WTF is this mess ;-) Leppie: I made an app for my sister and she wouldnt use it till it was colorful enough:) Norm:good point leppie, from that statement I can only deduce that this GUI must be aimed at children:laugh: Leppie:My sister is 25:eek: -Norm on the MailMagic GUI

                        B 1 Reply Last reply
                        0
                        • D David Stone

                          All who vote for Megan for Secretary of Security? Aye! :) Norm Almond: I seen some GUI's in my life but WTF is this mess ;-) Leppie: I made an app for my sister and she wouldnt use it till it was colorful enough:) Norm:good point leppie, from that statement I can only deduce that this GUI must be aimed at children:laugh: Leppie:My sister is 25:eek: -Norm on the MailMagic GUI

                          B Offline
                          B Offline
                          Brian Delahunty
                          wrote on last edited by
                          #14

                          Aye!!! Regards, Brian Dela :-)

                          1 Reply Last reply
                          0
                          • L Lost User

                            And I quote: A well-known example is the Unicode directory traversal vulnerability, which was exploited by the Code Blue worm. You're trusting these people? :-D rofl ;-) evilpen dot net::msn messenger:negacao@hotmail.com

                            E Offline
                            E Offline
                            Erik Funkenbusch
                            wrote on last edited by
                            #15

                            There was a code blue worm, as well as a code red worm. -- Where are we going? And why am I in this handbasket?

                            1 Reply Last reply
                            0
                            Reply
                            • Reply as topic
                            Log in to reply
                            • Oldest to Newest
                            • Newest to Oldest
                            • Most Votes


                            • Login

                            • Don't have an account? Register

                            • Login or register to search.
                            • First post
                              Last post
                            0
                            • Categories
                            • Recent
                            • Tags
                            • Popular
                            • World
                            • Users
                            • Groups