[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <444E5BDF.3070008@utdallas.edu>
Date: Tue Apr 25 18:27:17 2006
From: pauls at utdallas.edu (Paul Schmehl)
Subject: What is wrong with schools these days?
CrYpTiC MauleR wrote:
> All you had to say was Microsoft =oP
>
That's hilarious. The number one defaced website OS is Linux. (See
Zone-H.org if you don't believe me.)
The number one problem I have here is unix boxes. You know why?
Because a lot of open-source bozos run around claiming unix is more
secure than Windows. So a lot of clueless people think that, if they
just set up a RedHat box, they won't have anything to worry about.
Ask them what that little red ball with the X in it is - you know - the
one flashing up there in the taskbar- and they'll say I dunno.
No OS is secure by default. No OS can remain secure if it's not
properly configured and maintained. Look at your box right now. How
many of you have inetd or xinetd running? Why? What services does it
provide that you need? Do you even know what chargen or rpc.statd is?
If not, why are they running (if they are)? How many of you have a
workstation running with more than just ssh enabled and *no* firewall
running?
You name the OS, and I can tell you of at least one incident of hacking.
We haven't had a Windows box hacked in a long time. The last five
were two Macs and three RedHat boxes. Does that mean Macs and RedHat
are insecure? NO! It means, until the general public understands the
problem and knows what the solution is, hacking will continue apace with
no sign of letting up.
The real problem is ignorance.
--
Paul Schmehl (pauls@...allas.edu)
Adjunct Information Security Officer
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 5007 bytes
Desc: S/MIME Cryptographic Signature
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060425/f3ea6aff/smime.bin
Powered by blists - more mailing lists