Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. No one is secure

No one is secure

Scheduled Pinned Locked Moved The Lounge
15 Posts 9 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • F Felix Gartsman

    After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

    D Offline
    D Offline
    Daniel Turini
    wrote on last edited by
    #5

    You are with a wrong feeling of security only by turning off your machine. You have to unplug it from the power outlet and the network too, because you may still bring up a machine with a Magic Packet[^] "In an organization, each person rises to the level of his own incompetence." Peter's Principle

    M 1 Reply Last reply
    0
    • F Felix Gartsman

      After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

      B Offline
      B Offline
      Brian Delahunty
      wrote on last edited by
      #6

      Felix Gartsman wrote: I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on You mean you didn't know that already!!! :confused: Regards, Brian Dela :-)

      1 Reply Last reply
      0
      • M Megan Forbes

        true, but education (and articles like that one) can put us back in control of our systems :-D The following statement about your geekness is true.
        The previous statement about your geekness is false.

        B Offline
        B Offline
        Brian Delahunty
        wrote on last edited by
        #7

        Megan Forbes wrote: true, but education (and articles like that one) can put us back in control of our systems Strong words form CP's very own Security Guru. :-) Regards, Brian Dela :-)

        M 1 Reply Last reply
        0
        • C ColinDavies

          Thw wholw Mitnik think was blown out of proportiom. he too was just a script kiddie. I doubt the average hacker could write a hello world in jscript. There are whole bunch of hacker tools fleating around, Regardz Colin J Davies

          Sonork ID 100.9197:Colin

          You are the intrepid one, always willing to leap into the fray! A serious character flaw, I might add, but entertaining. Said by Roger Wright about me.

          B Offline
          B Offline
          Brian Delahunty
          wrote on last edited by
          #8

          Colin^Davies wrote: Thw wholw Mitnik think was blown out of proportiom. he too was just a script kiddie. More social engineering than anything else as well!! Regards, Brian Dela :-)

          1 Reply Last reply
          0
          • B Brian Delahunty

            Megan Forbes wrote: true, but education (and articles like that one) can put us back in control of our systems Strong words form CP's very own Security Guru. :-) Regards, Brian Dela :-)

            M Offline
            M Offline
            Megan Forbes
            wrote on last edited by
            #9

            Lol - I wish... :-O


            The following statement about your geekness is true. The previous statement about your geekness is false.

            B 1 Reply Last reply
            0
            • F Felix Gartsman

              After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

              L Offline
              L Offline
              Lost User
              wrote on last edited by
              #10

              And I quote: A well-known example is the Unicode directory traversal vulnerability, which was exploited by the Code Blue worm. You're trusting these people? :-D rofl ;-) evilpen dot net::msn messenger:negacao@hotmail.com

              E 1 Reply Last reply
              0
              • M Megan Forbes

                Lol - I wish... :-O


                The following statement about your geekness is true. The previous statement about your geekness is false.

                B Offline
                B Offline
                Brian Delahunty
                wrote on last edited by
                #11

                Megan Forbes wrote: I wish... You know it's true!!!! Regards, Brian Dela :-)

                D 1 Reply Last reply
                0
                • D Daniel Turini

                  You are with a wrong feeling of security only by turning off your machine. You have to unplug it from the power outlet and the network too, because you may still bring up a machine with a Magic Packet[^] "In an organization, each person rises to the level of his own incompetence." Peter's Principle

                  M Offline
                  M Offline
                  Megan Forbes
                  wrote on last edited by
                  #12

                  Wow! Thanks for the link :cool:


                  The following statement about your geekness is true. The previous statement about your geekness is false.

                  1 Reply Last reply
                  0
                  • B Brian Delahunty

                    Megan Forbes wrote: I wish... You know it's true!!!! Regards, Brian Dela :-)

                    D Offline
                    D Offline
                    David Stone
                    wrote on last edited by
                    #13

                    All who vote for Megan for Secretary of Security? Aye! :) Norm Almond: I seen some GUI's in my life but WTF is this mess ;-) Leppie: I made an app for my sister and she wouldnt use it till it was colorful enough:) Norm:good point leppie, from that statement I can only deduce that this GUI must be aimed at children:laugh: Leppie:My sister is 25:eek: -Norm on the MailMagic GUI

                    B 1 Reply Last reply
                    0
                    • D David Stone

                      All who vote for Megan for Secretary of Security? Aye! :) Norm Almond: I seen some GUI's in my life but WTF is this mess ;-) Leppie: I made an app for my sister and she wouldnt use it till it was colorful enough:) Norm:good point leppie, from that statement I can only deduce that this GUI must be aimed at children:laugh: Leppie:My sister is 25:eek: -Norm on the MailMagic GUI

                      B Offline
                      B Offline
                      Brian Delahunty
                      wrote on last edited by
                      #14

                      Aye!!! Regards, Brian Dela :-)

                      1 Reply Last reply
                      0
                      • L Lost User

                        And I quote: A well-known example is the Unicode directory traversal vulnerability, which was exploited by the Code Blue worm. You're trusting these people? :-D rofl ;-) evilpen dot net::msn messenger:negacao@hotmail.com

                        E Offline
                        E Offline
                        Erik Funkenbusch
                        wrote on last edited by
                        #15

                        There was a code blue worm, as well as a code red worm. -- Where are we going? And why am I in this handbasket?

                        1 Reply Last reply
                        0
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Don't have an account? Register

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups