Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. No one is secure

No one is secure

Scheduled Pinned Locked Moved The Lounge
15 Posts 9 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • F Offline
    F Offline
    Felix Gartsman
    wrote on last edited by
    #1

    After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

    M M D B L 5 Replies Last reply
    0
    • F Felix Gartsman

      After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

      M Offline
      M Offline
      Megan Forbes
      wrote on last edited by
      #2

      true, but education (and articles like that one) can put us back in control of our systems :-D The following statement about your geekness is true.
      The previous statement about your geekness is false.

      B 1 Reply Last reply
      0
      • F Felix Gartsman

        After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

        M Offline
        M Offline
        matthias s 0
        wrote on last edited by
        #3

        I hope that our Admins stay tuned when it comes to security issues ;) However I think there are only few "real hardcore" hackers out there. I believe the mass is just downloading Kevin-Mitnick-Groupie-Style "hack-tools" from an underground site and using them. Scary is, that those morons, that can't even write the Hello World thing in another language then JScript are successfully breaking into systems. Matthias

        In theory, there is no difference between theory and practice. In practice, however, there is.
        (unknown author)

        C 1 Reply Last reply
        0
        • M matthias s 0

          I hope that our Admins stay tuned when it comes to security issues ;) However I think there are only few "real hardcore" hackers out there. I believe the mass is just downloading Kevin-Mitnick-Groupie-Style "hack-tools" from an underground site and using them. Scary is, that those morons, that can't even write the Hello World thing in another language then JScript are successfully breaking into systems. Matthias

          In theory, there is no difference between theory and practice. In practice, however, there is.
          (unknown author)

          C Offline
          C Offline
          ColinDavies
          wrote on last edited by
          #4

          Thw wholw Mitnik think was blown out of proportiom. he too was just a script kiddie. I doubt the average hacker could write a hello world in jscript. There are whole bunch of hacker tools fleating around, Regardz Colin J Davies

          Sonork ID 100.9197:Colin

          You are the intrepid one, always willing to leap into the fray! A serious character flaw, I might add, but entertaining. Said by Roger Wright about me.

          B 1 Reply Last reply
          0
          • F Felix Gartsman

            After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

            D Offline
            D Offline
            Daniel Turini
            wrote on last edited by
            #5

            You are with a wrong feeling of security only by turning off your machine. You have to unplug it from the power outlet and the network too, because you may still bring up a machine with a Magic Packet[^] "In an organization, each person rises to the level of his own incompetence." Peter's Principle

            M 1 Reply Last reply
            0
            • F Felix Gartsman

              After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

              B Offline
              B Offline
              Brian Delahunty
              wrote on last edited by
              #6

              Felix Gartsman wrote: I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on You mean you didn't know that already!!! :confused: Regards, Brian Dela :-)

              1 Reply Last reply
              0
              • M Megan Forbes

                true, but education (and articles like that one) can put us back in control of our systems :-D The following statement about your geekness is true.
                The previous statement about your geekness is false.

                B Offline
                B Offline
                Brian Delahunty
                wrote on last edited by
                #7

                Megan Forbes wrote: true, but education (and articles like that one) can put us back in control of our systems Strong words form CP's very own Security Guru. :-) Regards, Brian Dela :-)

                M 1 Reply Last reply
                0
                • C ColinDavies

                  Thw wholw Mitnik think was blown out of proportiom. he too was just a script kiddie. I doubt the average hacker could write a hello world in jscript. There are whole bunch of hacker tools fleating around, Regardz Colin J Davies

                  Sonork ID 100.9197:Colin

                  You are the intrepid one, always willing to leap into the fray! A serious character flaw, I might add, but entertaining. Said by Roger Wright about me.

                  B Offline
                  B Offline
                  Brian Delahunty
                  wrote on last edited by
                  #8

                  Colin^Davies wrote: Thw wholw Mitnik think was blown out of proportiom. he too was just a script kiddie. More social engineering than anything else as well!! Regards, Brian Dela :-)

                  1 Reply Last reply
                  0
                  • B Brian Delahunty

                    Megan Forbes wrote: true, but education (and articles like that one) can put us back in control of our systems Strong words form CP's very own Security Guru. :-) Regards, Brian Dela :-)

                    M Offline
                    M Offline
                    Megan Forbes
                    wrote on last edited by
                    #9

                    Lol - I wish... :-O


                    The following statement about your geekness is true. The previous statement about your geekness is false.

                    B 1 Reply Last reply
                    0
                    • F Felix Gartsman

                      After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

                      L Offline
                      L Offline
                      Lost User
                      wrote on last edited by
                      #10

                      And I quote: A well-known example is the Unicode directory traversal vulnerability, which was exploited by the Code Blue worm. You're trusting these people? :-D rofl ;-) evilpen dot net::msn messenger:negacao@hotmail.com

                      E 1 Reply Last reply
                      0
                      • M Megan Forbes

                        Lol - I wish... :-O


                        The following statement about your geekness is true. The previous statement about your geekness is false.

                        B Offline
                        B Offline
                        Brian Delahunty
                        wrote on last edited by
                        #11

                        Megan Forbes wrote: I wish... You know it's true!!!! Regards, Brian Dela :-)

                        D 1 Reply Last reply
                        0
                        • D Daniel Turini

                          You are with a wrong feeling of security only by turning off your machine. You have to unplug it from the power outlet and the network too, because you may still bring up a machine with a Magic Packet[^] "In an organization, each person rises to the level of his own incompetence." Peter's Principle

                          M Offline
                          M Offline
                          Megan Forbes
                          wrote on last edited by
                          #12

                          Wow! Thanks for the link :cool:


                          The following statement about your geekness is true. The previous statement about your geekness is false.

                          1 Reply Last reply
                          0
                          • B Brian Delahunty

                            Megan Forbes wrote: I wish... You know it's true!!!! Regards, Brian Dela :-)

                            D Offline
                            D Offline
                            David Stone
                            wrote on last edited by
                            #13

                            All who vote for Megan for Secretary of Security? Aye! :) Norm Almond: I seen some GUI's in my life but WTF is this mess ;-) Leppie: I made an app for my sister and she wouldnt use it till it was colorful enough:) Norm:good point leppie, from that statement I can only deduce that this GUI must be aimed at children:laugh: Leppie:My sister is 25:eek: -Norm on the MailMagic GUI

                            B 1 Reply Last reply
                            0
                            • D David Stone

                              All who vote for Megan for Secretary of Security? Aye! :) Norm Almond: I seen some GUI's in my life but WTF is this mess ;-) Leppie: I made an app for my sister and she wouldnt use it till it was colorful enough:) Norm:good point leppie, from that statement I can only deduce that this GUI must be aimed at children:laugh: Leppie:My sister is 25:eek: -Norm on the MailMagic GUI

                              B Offline
                              B Offline
                              Brian Delahunty
                              wrote on last edited by
                              #14

                              Aye!!! Regards, Brian Dela :-)

                              1 Reply Last reply
                              0
                              • L Lost User

                                And I quote: A well-known example is the Unicode directory traversal vulnerability, which was exploited by the Code Blue worm. You're trusting these people? :-D rofl ;-) evilpen dot net::msn messenger:negacao@hotmail.com

                                E Offline
                                E Offline
                                Erik Funkenbusch
                                wrote on last edited by
                                #15

                                There was a code blue worm, as well as a code red worm. -- Where are we going? And why am I in this handbasket?

                                1 Reply Last reply
                                0
                                Reply
                                • Reply as topic
                                Log in to reply
                                • Oldest to Newest
                                • Newest to Oldest
                                • Most Votes


                                • Login

                                • Don't have an account? Register

                                • Login or register to search.
                                • First post
                                  Last post
                                0
                                • Categories
                                • Recent
                                • Tags
                                • Popular
                                • World
                                • Users
                                • Groups