Re: Why floppies will never die!
- From: "icono" <here@xxxxxxxxx>
- Date: Fri, 23 Dec 2005 20:46:01 -0700
"Ian Gregory" <foo@xxxxxxxxxxx> wrote in message
> ["Followup-To:" header set to comp.sys.mac.system.]
> On 2005-12-23, icono <here@xxxxxxxxx> wrote:
>> BTW, there is nothing easier to break into than any Unix based system.
>> real problem is finding the users.
> Are you referring to remote exploits or local (privilege escalation)
> vulnerabilities? If the former then I would like to know how you might
> break into a Unix based system that was listening only on port 22 for
> protocol 2 ssh connections with passphrase authentication (assuming
> no weak passphrases on the system). If the latter then how would you
> get root from an unprivileged account on a Debian machine running a GR
> security kernel? Inquiring minds want to know.
> Of course with physical access you can break in. Just take the chains
> and security screws off with an angle grinder and remove the hard disk,
> only an encrypted disk will offer protection in this case.
If they have interactive communication on the web, zap, same as Windows.
> Ian Gregory
- Prev by Date: tutorials
- Next by Date: Re: Why floppies will never die!
- Previous by thread: Re: Why floppies will never die!
- Next by thread: Re: Why floppies will never die!