I have received several responses regarding the RealPlayer/Comet Cursor subject.
To summarize a few things:
I originally said that the remaining registry key was
"HKEY_LOCAL_MACHINE\Software\Clients\Comet", it is actually
"HKEY_LOCAL_MACHINE\Software\Comet". My faux paus.
A person who
Okay, I had a nice long message I wrote, but accidentally canned it in ELM (arggh!)
So, I admit to using windows for 2 reasons: playing games and viewing content that
can't be viewed on my Unix box.
That brings me to this subject. I wanted to watch some classic Southpark and
Windows media
Why not do an:
fd = open(file, O_RDWR);
fstat(fd, fi);
lstat(file, li);
if (fi.st_ino == li.st_ino fi.st_dev == li.st_dev S_ISREG(fi.st_mode)) {
/* it's a real, plain, file */
}
That guarantees that the directory structure reflects your file descriptor.
The method below has a
With the proliferation of these types of backdoors, is there any way to
prevent your 'r00t3d' box from being backdoored?
A simple approach for Linux would be something like this:
At boot, compile the list of modules that are 'known good' (for the sake
of argument, it's the /lib/modules/x.y.z),
I seem to recall a Linux kernel guru explaining that the x86 MMU doesn't actually
support non-exec pages, or some such. It doesn't support it, or it just doesn't
work right. I remember bringing up the issue of noexec and that was the answer.
--Perry
Ok, here it is, on page 58, it's
Okay, first off, I've never used anything from F5. In fact, I don't
think I've ever seen anything from them, firsthand. However, my
thoughts on this are generic enough that this shouldn't matter.
At 10:18 PM 11/10/99 -0800, [EMAIL PROTECTED] wrote:
First of all, it's just stupid to sit
I am upset about the recent thread about the Big/ip support account on Bugtraq.
First of all, it's just stupid to sit here and say "They ship a product with
a security hole, because it has a support password that is root priv'd".
I have known about this for nearly 2 years, questioned them