lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <4EC841FA.6020802@fibertel.com.ar> Date: Sat, 19 Nov 2011 20:55:38 -0300 From: root <root_@...ertel.com.ar> To: unlisted-recipients:; (no To-header on input) CC: full-disclosure@...ts.grok.org.uk Subject: Re: Ubuntu 11.10 now unsecure by default You say there are at least 10 configurations mistakes specific to Ubuntu that allows you to "exploit" it. Care to name one? If you can't, maybe you can name other, more secure Linux distro in which your 10 ways do not work. Fedora do not count as it is unusable. On 11/19/2011 06:18 PM, GloW - XD wrote: > dude, you have GOT to be kidding. > I can exploit Ubuntu 2011 server and client about 10 ways, and > probably same with half this list, it is INDED entry level, or, just > stop handding it out on magazines with "how to use ubuntu! Move to > easy linux now!" promos, and then your words have merit. > > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists