Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. No one is secure

No one is secure

Scheduled Pinned Locked Moved The Lounge
15 Posts 9 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M matthias s 0

    I hope that our Admins stay tuned when it comes to security issues ;) However I think there are only few "real hardcore" hackers out there. I believe the mass is just downloading Kevin-Mitnick-Groupie-Style "hack-tools" from an underground site and using them. Scary is, that those morons, that can't even write the Hello World thing in another language then JScript are successfully breaking into systems. Matthias

    In theory, there is no difference between theory and practice. In practice, however, there is.
    (unknown author)

    C Offline
    C Offline
    ColinDavies
    wrote on last edited by
    #4

    Thw wholw Mitnik think was blown out of proportiom. he too was just a script kiddie. I doubt the average hacker could write a hello world in jscript. There are whole bunch of hacker tools fleating around, Regardz Colin J Davies

    Sonork ID 100.9197:Colin

    You are the intrepid one, always willing to leap into the fray! A serious character flaw, I might add, but entertaining. Said by Roger Wright about me.

    B 1 Reply Last reply
    0
    • F Felix Gartsman

      After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

      D Offline
      D Offline
      Daniel Turini
      wrote on last edited by
      #5

      You are with a wrong feeling of security only by turning off your machine. You have to unplug it from the power outlet and the network too, because you may still bring up a machine with a Magic Packet[^] "In an organization, each person rises to the level of his own incompetence." Peter's Principle

      M 1 Reply Last reply
      0
      • F Felix Gartsman

        After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

        B Offline
        B Offline
        Brian Delahunty
        wrote on last edited by
        #6

        Felix Gartsman wrote: I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on You mean you didn't know that already!!! :confused: Regards, Brian Dela :-)

        1 Reply Last reply
        0
        • M Megan Forbes

          true, but education (and articles like that one) can put us back in control of our systems :-D The following statement about your geekness is true.
          The previous statement about your geekness is false.

          B Offline
          B Offline
          Brian Delahunty
          wrote on last edited by
          #7

          Megan Forbes wrote: true, but education (and articles like that one) can put us back in control of our systems Strong words form CP's very own Security Guru. :-) Regards, Brian Dela :-)

          M 1 Reply Last reply
          0
          • C ColinDavies

            Thw wholw Mitnik think was blown out of proportiom. he too was just a script kiddie. I doubt the average hacker could write a hello world in jscript. There are whole bunch of hacker tools fleating around, Regardz Colin J Davies

            Sonork ID 100.9197:Colin

            You are the intrepid one, always willing to leap into the fray! A serious character flaw, I might add, but entertaining. Said by Roger Wright about me.

            B Offline
            B Offline
            Brian Delahunty
            wrote on last edited by
            #8

            Colin^Davies wrote: Thw wholw Mitnik think was blown out of proportiom. he too was just a script kiddie. More social engineering than anything else as well!! Regards, Brian Dela :-)

            1 Reply Last reply
            0
            • B Brian Delahunty

              Megan Forbes wrote: true, but education (and articles like that one) can put us back in control of our systems Strong words form CP's very own Security Guru. :-) Regards, Brian Dela :-)

              M Offline
              M Offline
              Megan Forbes
              wrote on last edited by
              #9

              Lol - I wish... :-O


              The following statement about your geekness is true. The previous statement about your geekness is false.

              B 1 Reply Last reply
              0
              • F Felix Gartsman

                After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

                L Offline
                L Offline
                Lost User
                wrote on last edited by
                #10

                And I quote: A well-known example is the Unicode directory traversal vulnerability, which was exploited by the Code Blue worm. You're trusting these people? :-D rofl ;-) evilpen dot net::msn messenger:negacao@hotmail.com

                E 1 Reply Last reply
                0
                • M Megan Forbes

                  Lol - I wish... :-O


                  The following statement about your geekness is true. The previous statement about your geekness is false.

                  B Offline
                  B Offline
                  Brian Delahunty
                  wrote on last edited by
                  #11

                  Megan Forbes wrote: I wish... You know it's true!!!! Regards, Brian Dela :-)

                  D 1 Reply Last reply
                  0
                  • D Daniel Turini

                    You are with a wrong feeling of security only by turning off your machine. You have to unplug it from the power outlet and the network too, because you may still bring up a machine with a Magic Packet[^] "In an organization, each person rises to the level of his own incompetence." Peter's Principle

                    M Offline
                    M Offline
                    Megan Forbes
                    wrote on last edited by
                    #12

                    Wow! Thanks for the link :cool:


                    The following statement about your geekness is true. The previous statement about your geekness is false.

                    1 Reply Last reply
                    0
                    • B Brian Delahunty

                      Megan Forbes wrote: I wish... You know it's true!!!! Regards, Brian Dela :-)

                      D Offline
                      D Offline
                      David Stone
                      wrote on last edited by
                      #13

                      All who vote for Megan for Secretary of Security? Aye! :) Norm Almond: I seen some GUI's in my life but WTF is this mess ;-) Leppie: I made an app for my sister and she wouldnt use it till it was colorful enough:) Norm:good point leppie, from that statement I can only deduce that this GUI must be aimed at children:laugh: Leppie:My sister is 25:eek: -Norm on the MailMagic GUI

                      B 1 Reply Last reply
                      0
                      • D David Stone

                        All who vote for Megan for Secretary of Security? Aye! :) Norm Almond: I seen some GUI's in my life but WTF is this mess ;-) Leppie: I made an app for my sister and she wouldnt use it till it was colorful enough:) Norm:good point leppie, from that statement I can only deduce that this GUI must be aimed at children:laugh: Leppie:My sister is 25:eek: -Norm on the MailMagic GUI

                        B Offline
                        B Offline
                        Brian Delahunty
                        wrote on last edited by
                        #14

                        Aye!!! Regards, Brian Dela :-)

                        1 Reply Last reply
                        0
                        • L Lost User

                          And I quote: A well-known example is the Unicode directory traversal vulnerability, which was exploited by the Code Blue worm. You're trusting these people? :-D rofl ;-) evilpen dot net::msn messenger:negacao@hotmail.com

                          E Offline
                          E Offline
                          Erik Funkenbusch
                          wrote on last edited by
                          #15

                          There was a code blue worm, as well as a code red worm. -- Where are we going? And why am I in this handbasket?

                          1 Reply Last reply
                          0
                          Reply
                          • Reply as topic
                          Log in to reply
                          • Oldest to Newest
                          • Newest to Oldest
                          • Most Votes


                          • Login

                          • Don't have an account? Register

                          • Login or register to search.
                          • First post
                            Last post
                          0
                          • Categories
                          • Recent
                          • Tags
                          • Popular
                          • World
                          • Users
                          • Groups