lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <444E5BDF.3070008@utdallas.edu>
Date: Tue Apr 25 18:27:17 2006
From: pauls at utdallas.edu (Paul Schmehl)
Subject: What is wrong with schools these days?

CrYpTiC MauleR wrote:
> All you had to say was Microsoft =oP
> 
That's hilarious.  The number one defaced website OS is Linux.  (See 
Zone-H.org if you don't believe me.)

The number one problem I have here is unix boxes.  You know why? 
Because a lot of open-source bozos run around claiming unix is more 
secure than Windows.  So a lot of clueless people think that, if they 
just set up a RedHat box, they won't have anything to worry about.

Ask them what that little red ball with the X in it is - you know - the 
one flashing up there in the taskbar- and they'll say I dunno.

No OS is secure by default.  No OS can remain secure if it's not 
properly configured and maintained.  Look at your box right now.  How 
many of you have inetd or xinetd running?  Why?  What services does it 
provide that you need?  Do you even know what chargen or rpc.statd is? 
If not, why are they running (if they are)?  How many of you have a 
workstation running with more than just ssh enabled and *no* firewall 
running?

You name the OS, and I can tell you of at least one incident of hacking. 
  We haven't had a Windows box hacked in a long time.  The last five 
were two Macs and three RedHat boxes.  Does that mean Macs and RedHat 
are insecure?  NO!  It means, until the general public understands the 
problem and knows what the solution is, hacking will continue apace with 
no sign of letting up.

The real problem is ignorance.

-- 
Paul Schmehl (pauls@...allas.edu)
Adjunct Information Security Officer
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 5007 bytes
Desc: S/MIME Cryptographic Signature
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060425/f3ea6aff/smime.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ