is able to
provide a similar protection level. That's the truth.
Groetjes,
Peter Busser
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
,
Peter Busser
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
, then others can't
hardlink to your files.
Groetjes,
Peter Busser
--
The Adamantix Project
Taking high-security Linux out of the labs, and into the real world
http://www.adamantix.org/
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full
?
The Adamantix kernels are compiled with SSP (aka propolice), which is the same
thing used to compile the OpenBSD kernel. It protects against some, but not
all, overflows.
Groetjes,
Peter Busser
--
The Adamantix Project
Taking high-security Linux out of the labs, and into the real world
http
and upgrading as you go. But either way, why not go with 2.4.20?
Put CD1 in CD-ROM drive.
Boot computer
Wait for prompt
type: bf24ENTER
And install a 2.4 kernel based Debian system, which includes ext3/reiserfs
partitions. It's there in the help text, one F-key away.
Groetjes,
Peter Busser
alone is 6 CDs. Sarge will be bigger. It is almost true that if you
cannot find it in Debian, it does not exist.
With a code base that large, it is not surprising that there are more
advisories for Debian than for other, much smaller distributions.
Groetjes,
Peter Busser
--
The Adamantix Project
discussing the real issues and talk about irelevant details
forever.
Groetjes,
Peter Busser
--
The Adamantix Project
Taking high-security Linux out of the labs, and into the real world
http://www.adamantix.org/
___
Full-Disclosure - We believe
of time improving the security of Linux systems. Now
there is the idea that it is not worth the effort, because Linux is after all
secure.
Groetjes,
Peter Busser
--
The Adamantix Project
Taking trustworthy software out of the labs, and into the real world
http://www.adamantix.org
enabled kernel :-).
This is what it looks like when you run it on an Adamantix kernel:
PaXtest - Copyright(c) 2003 by Peter Busser [EMAIL PROTECTED]
Released under the GNU Public Licence version 2 or later
Executable anonymous mapping : Killed
Executable bss
. And the director of
IBM's Linux Technology Center has nothing to do with Linux development either.
Groetjes,
Peter Busser
--
The Adamantix Project
Taking trustworthy software out of the labs, and into the real world
http://www.adamantix.org/
___
Full-Disclosure - We
is that you _can_ choose for a distribution that
provides more security if you want. You just have to search a bit and you can
find about a dozen security related Linux and *BSD projects/products.
Groetjes,
Peter Busser
--
The Adamantix Project
Taking trustworthy software out of the labs, and into the real
not realise that a wooden house is not sufficient to
protect against the big bad wolf. And there is currently no brick house to flee
to when the wolf comes...
Groetjes,
Peter Busser
--
The Adamantix Project
Taking trustworthy software out of the labs, and into the real world
http://www.adamantix.org
,
Peter Busser
--
The Adamantix Project
Taking trustworthy software out of the labs, and into the real world
http://www.adamantix.org/
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
the necessary services.
In other words, boxes that have ``been made secure by their users''.
M$ has not, and that is unfortunate.
Flaws in other products do not make Linux more secure.
Groetjes,
Peter Busser
--
The Adamantix Project
Taking trustworthy software out of the labs
into the hype of the buzzword-of-the-day
security tools fall into this category. People who develop these tools
and believe their merit are also scriptkids.
There is a saying: It takes one to know one.
BTW, noone cares about your personal problems with Theo.
Groetjes,
Peter Busser
it hard to make it correct and
secure.
Groetjes,
Peter Busser
--
The Adamantix Project
Taking trustworthy software out of the labs, and into the real world
http://www.adamantix.org/
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com
to do. That is no problem, I mean, you don't have to
feel ashamed about not understanding something complicated. You are certainly
not alone, everyone has things he/she does not understand (I know I don't
understand many things).
Groetjes,
Peter Busser
--
The Adamantix Project
Taking trustworthy
80 or 90% of all weapons exports in the
world. It is good business you know.
Groetjes,
Peter Busser
--
The Adamantix Project
Taking trustworthy software out of the labs, and into the real world
http://www.adamantix.org/
___
Full-Disclosure - We believe
has ever done that. And therefore we're perfectly safe.
Groetjes,
Peter Busser
--
The Adamantix Project
Taking trustworthy software out of the labs, and into the real world
http://www.adamantix.org/
___
Full-Disclosure - We believe in it.
Charter: http
to be a different non-randomized e-mail address, possibly the
real e-mail address of the infected victim (? haven't read any forensic
analysis on this point yet...)
Does this imply that your e-mail filter does not understand regular
expressions?
Groetjes,
Peter Busser
--
The Adamantix Project
Taking
and not proactive.
Making machines harder to break into and improve ways to enforce a security
policy (e.g. by using Mandatory Access Control (MAC)) would be one way to
proactively deal with security.
Groetjes,
Peter Busser
--
The Adamantix Project
Taking trustworthy software out of the labs
with a higher level of system security than most currently available
systems would be a nice start in that direction IMHO. If it is harder to break
in, then there is less to detect in the first place.
You could call it Intrusion Prevention.
Groetjes,
Peter Busser
--
The Adamantix Project
Taking
explaination
of the things he did to protect his system. If you do nothing or not enough,
you are more or less inviting someone to break into your system.
Groetjes,
Peter Busser
--
The Adamantix Project
Taking trustworthy software out of the labs, and into the real world
http://www.adamantix.org
%40gated-at.bofh.it
Groetjes,
Peter Busser
--
The Adamantix Project
Taking trustworthy software out of the labs, and into the real world
http://www.adamantix.org/
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure
some fines).
I don't know about US, Canadian, German or Chinese law. But in Dutch law there
is a big difference between entering a house and stealing stuff and breaking
into a house and stealing exactly the same stuff. Apparently the house owner
has a responsibility of his own.
Groetjes,
Peter
address this subject, that was a different
program. (Nonwithstanding the fact that the title of the broadcast was:
Computer-terrorism, something everyone can verify at their web site.)
Groetjes,
Peter Busser
--
The Adamantix Project
Taking trustworthy software out of the labs, and into the real world
. This is simply not the most sexy and profitable thing. Especially for
commercial Linux distributions it pays of more to add stuff to the user
interface than to spend a lot of time (and money) on adding more security.
These are of course only a few of the reasons.
Groetjes,
Peter Busser
by one
eye witness (who was watching from a distance).
Groetjes,
Peter Busser
--
The Adamantix Project
Taking trustworthy software out of the labs, and into the real world
http://www.adamantix.org/
___
Full-Disclosure - We believe in it.
Charter: http
hacked
machine owners find out your machine was the cause of the problem.
Groetjes,
Peter Busser
--
The Adamantix Project
Taking trustworthy software out of the labs, and into the real world
http://www.adamantix.org/
___
Full-Disclosure - We believe
. But that is a good thing. I have been looking for a good
substitute for the tv soap series, since they have a summer break, and I think
I finally found it: Full-disclosure. I would like to thank everyone who makes
that possible, keep up the good work!
Groetjes,
Peter Busser
--
The Adamantix
to court and demand compensation for the damanges caused by
badly designed or buggy software. Neither really happens, so what incentive is
there for companies to change?
Groetjes,
Peter Busser
--
The Adamantix Project
Taking trustworthy software out of the labs, and into the real world
http
: Out TCP,
localhost:1218-207.46.248.249:80, Owner: D:\WINDOWS\EXPLORER.EXE
it seems to be trying to contact 207.46.248.249, wich is sa.microsoft.com
Doesn't IE automatically check for new updates?
Groetjes,
Peter Busser
--
The Adamantix Project
Taking trustworthy software out of the labs
to get the picture?
Simple: Vote with your dollars.
Groetjes,
Peter Busser
--
The Adamantix Project
Taking trustworthy software out of the labs, and into the real world
http://www.adamantix.org/
___
Full-Disclosure - We believe in it.
Charter: http
33 matches
Mail list logo