No one is secure
-
After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(
-
After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(
true, but education (and articles like that one) can put us back in control of our systems :-D The following statement about your geekness is true.
The previous statement about your geekness is false. -
After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(
I hope that our Admins stay tuned when it comes to security issues ;) However I think there are only few "real hardcore" hackers out there. I believe the mass is just downloading Kevin-Mitnick-Groupie-Style "hack-tools" from an underground site and using them. Scary is, that those morons, that can't even write the Hello World thing in another language then JScript are successfully breaking into systems. Matthias
In theory, there is no difference between theory and practice. In practice, however, there is.
(unknown author) -
I hope that our Admins stay tuned when it comes to security issues ;) However I think there are only few "real hardcore" hackers out there. I believe the mass is just downloading Kevin-Mitnick-Groupie-Style "hack-tools" from an underground site and using them. Scary is, that those morons, that can't even write the Hello World thing in another language then JScript are successfully breaking into systems. Matthias
In theory, there is no difference between theory and practice. In practice, however, there is.
(unknown author)Thw wholw Mitnik think was blown out of proportiom. he too was just a script kiddie. I doubt the average hacker could write a hello world in jscript. There are whole bunch of hacker tools fleating around, Regardz Colin J Davies
Sonork ID 100.9197:Colin
You are the intrepid one, always willing to leap into the fray! A serious character flaw, I might add, but entertaining. Said by Roger Wright about me.
-
After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(
You are with a wrong feeling of security only by turning off your machine. You have to unplug it from the power outlet and the network too, because you may still bring up a machine with a Magic Packet[^] "In an organization, each person rises to the level of his own incompetence." Peter's Principle
-
After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(
Felix Gartsman wrote: I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on You mean you didn't know that already!!! :confused: Regards, Brian Dela :-)
-
true, but education (and articles like that one) can put us back in control of our systems :-D The following statement about your geekness is true.
The previous statement about your geekness is false.Megan Forbes wrote: true, but education (and articles like that one) can put us back in control of our systems Strong words form CP's very own Security Guru. :-) Regards, Brian Dela :-)
-
Thw wholw Mitnik think was blown out of proportiom. he too was just a script kiddie. I doubt the average hacker could write a hello world in jscript. There are whole bunch of hacker tools fleating around, Regardz Colin J Davies
Sonork ID 100.9197:Colin
You are the intrepid one, always willing to leap into the fray! A serious character flaw, I might add, but entertaining. Said by Roger Wright about me.
Colin^Davies wrote: Thw wholw Mitnik think was blown out of proportiom. he too was just a script kiddie. More social engineering than anything else as well!! Regards, Brian Dela :-)
-
Megan Forbes wrote: true, but education (and articles like that one) can put us back in control of our systems Strong words form CP's very own Security Guru. :-) Regards, Brian Dela :-)
Lol - I wish... :-O
The following statement about your geekness is true. The previous statement about your geekness is false.
-
After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(
And I quote: A well-known example is the Unicode directory traversal vulnerability, which was exploited by the Code Blue worm. You're trusting these people? :-D rofl ;-) evilpen dot net::msn messenger:negacao@hotmail.com
-
Lol - I wish... :-O
The following statement about your geekness is true. The previous statement about your geekness is false.
Megan Forbes wrote: I wish... You know it's true!!!! Regards, Brian Dela :-)
-
You are with a wrong feeling of security only by turning off your machine. You have to unplug it from the power outlet and the network too, because you may still bring up a machine with a Magic Packet[^] "In an organization, each person rises to the level of his own incompetence." Peter's Principle
Wow! Thanks for the link :cool:
The following statement about your geekness is true. The previous statement about your geekness is false.
-
Megan Forbes wrote: I wish... You know it's true!!!! Regards, Brian Dela :-)
All who vote for Megan for Secretary of Security? Aye! :) Norm Almond: I seen some GUI's in my life but WTF is this mess ;-) Leppie: I made an app for my sister and she wouldnt use it till it was colorful enough:) Norm:good point leppie, from that statement I can only deduce that this GUI must be aimed at children:laugh: Leppie:My sister is 25:eek: -Norm on the MailMagic GUI
-
All who vote for Megan for Secretary of Security? Aye! :) Norm Almond: I seen some GUI's in my life but WTF is this mess ;-) Leppie: I made an app for my sister and she wouldnt use it till it was colorful enough:) Norm:good point leppie, from that statement I can only deduce that this GUI must be aimed at children:laugh: Leppie:My sister is 25:eek: -Norm on the MailMagic GUI
Aye!!! Regards, Brian Dela :-)
-
And I quote: A well-known example is the Unicode directory traversal vulnerability, which was exploited by the Code Blue worm. You're trusting these people? :-D rofl ;-) evilpen dot net::msn messenger:negacao@hotmail.com
There was a code blue worm, as well as a code red worm. -- Where are we going? And why am I in this handbasket?