Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. No one is secure

No one is secure

Scheduled Pinned Locked Moved The Lounge
15 Posts 9 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • F Felix Gartsman

    After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

    B Offline
    B Offline
    Brian Delahunty
    wrote on last edited by
    #6

    Felix Gartsman wrote: I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on You mean you didn't know that already!!! :confused: Regards, Brian Dela :-)

    1 Reply Last reply
    0
    • M Megan Forbes

      true, but education (and articles like that one) can put us back in control of our systems :-D The following statement about your geekness is true.
      The previous statement about your geekness is false.

      B Offline
      B Offline
      Brian Delahunty
      wrote on last edited by
      #7

      Megan Forbes wrote: true, but education (and articles like that one) can put us back in control of our systems Strong words form CP's very own Security Guru. :-) Regards, Brian Dela :-)

      M 1 Reply Last reply
      0
      • C ColinDavies

        Thw wholw Mitnik think was blown out of proportiom. he too was just a script kiddie. I doubt the average hacker could write a hello world in jscript. There are whole bunch of hacker tools fleating around, Regardz Colin J Davies

        Sonork ID 100.9197:Colin

        You are the intrepid one, always willing to leap into the fray! A serious character flaw, I might add, but entertaining. Said by Roger Wright about me.

        B Offline
        B Offline
        Brian Delahunty
        wrote on last edited by
        #8

        Colin^Davies wrote: Thw wholw Mitnik think was blown out of proportiom. he too was just a script kiddie. More social engineering than anything else as well!! Regards, Brian Dela :-)

        1 Reply Last reply
        0
        • B Brian Delahunty

          Megan Forbes wrote: true, but education (and articles like that one) can put us back in control of our systems Strong words form CP's very own Security Guru. :-) Regards, Brian Dela :-)

          M Offline
          M Offline
          Megan Forbes
          wrote on last edited by
          #9

          Lol - I wish... :-O


          The following statement about your geekness is true. The previous statement about your geekness is false.

          B 1 Reply Last reply
          0
          • F Felix Gartsman

            After reading http://www.sans.org/top20/[^] I came to conclusion that no matter what OS you use, the only way to use computer securely is not turn it on:(

            L Offline
            L Offline
            Lost User
            wrote on last edited by
            #10

            And I quote: A well-known example is the Unicode directory traversal vulnerability, which was exploited by the Code Blue worm. You're trusting these people? :-D rofl ;-) evilpen dot net::msn messenger:negacao@hotmail.com

            E 1 Reply Last reply
            0
            • M Megan Forbes

              Lol - I wish... :-O


              The following statement about your geekness is true. The previous statement about your geekness is false.

              B Offline
              B Offline
              Brian Delahunty
              wrote on last edited by
              #11

              Megan Forbes wrote: I wish... You know it's true!!!! Regards, Brian Dela :-)

              D 1 Reply Last reply
              0
              • D Daniel Turini

                You are with a wrong feeling of security only by turning off your machine. You have to unplug it from the power outlet and the network too, because you may still bring up a machine with a Magic Packet[^] "In an organization, each person rises to the level of his own incompetence." Peter's Principle

                M Offline
                M Offline
                Megan Forbes
                wrote on last edited by
                #12

                Wow! Thanks for the link :cool:


                The following statement about your geekness is true. The previous statement about your geekness is false.

                1 Reply Last reply
                0
                • B Brian Delahunty

                  Megan Forbes wrote: I wish... You know it's true!!!! Regards, Brian Dela :-)

                  D Offline
                  D Offline
                  David Stone
                  wrote on last edited by
                  #13

                  All who vote for Megan for Secretary of Security? Aye! :) Norm Almond: I seen some GUI's in my life but WTF is this mess ;-) Leppie: I made an app for my sister and she wouldnt use it till it was colorful enough:) Norm:good point leppie, from that statement I can only deduce that this GUI must be aimed at children:laugh: Leppie:My sister is 25:eek: -Norm on the MailMagic GUI

                  B 1 Reply Last reply
                  0
                  • D David Stone

                    All who vote for Megan for Secretary of Security? Aye! :) Norm Almond: I seen some GUI's in my life but WTF is this mess ;-) Leppie: I made an app for my sister and she wouldnt use it till it was colorful enough:) Norm:good point leppie, from that statement I can only deduce that this GUI must be aimed at children:laugh: Leppie:My sister is 25:eek: -Norm on the MailMagic GUI

                    B Offline
                    B Offline
                    Brian Delahunty
                    wrote on last edited by
                    #14

                    Aye!!! Regards, Brian Dela :-)

                    1 Reply Last reply
                    0
                    • L Lost User

                      And I quote: A well-known example is the Unicode directory traversal vulnerability, which was exploited by the Code Blue worm. You're trusting these people? :-D rofl ;-) evilpen dot net::msn messenger:negacao@hotmail.com

                      E Offline
                      E Offline
                      Erik Funkenbusch
                      wrote on last edited by
                      #15

                      There was a code blue worm, as well as a code red worm. -- Where are we going? And why am I in this handbasket?

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups