Removing all components which are not required is a wonderful idea.
Closing all ports which are not required is another.
These are essential components in hardening a computer, regardless of
the OS.
YY
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
[EMA
While you are quite correct that AI and the marvel which is the human
body are incomparable, that does not mean that a computer may not
satisfy a dictionary definition of sentience [requirements for such
being very simple and basic indeed].
Best Regards, YY
-Original Message-
From: [EMAI
On Thu, 2004-09-02 at 11:24, Peter Swire wrote:
> I think there is a strong analytic similarity between a firewall
and
> physical settings where guards are deciding whether to let
> people/trucks/etc. through a gate.
> [...]
> In both cases, there is "filtering" by the defenders. S
It seems to me that the argument that it is wisest not to spread the
virus too widely is yet another argument that _sometimes_ security by
obscurity is a "Good Thing"[tm].
Stir that pot!
YY
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Nick
FitzGerald
James said...
> As far as I can see it the only difference is scaling, you can make
> many many millions of requests before a flood warning appears, whereas
> you only need to refuse to leave a few times before the police are
> called. I guess humans have less patience than computers.
>
> Of cou
ECTED]
Sent: Thursday, September 02, 2004 18:25
To: Yaakov Yehudi; [EMAIL PROTECTED]
Subject: [Full-Disclosure] Security & Obscurity: physical-world
analogies
Here are arguments for why it is useful to think systematically
about the relationship between computer- and physical-securi
Dave wrote...
> The flaw in your specific example [about a software program freezing
up it is attacked] is that every program can be run as
> many times as you need to "attack" it. You would never need more than
> one copy.
Peter replies...
First, there are times when you cannot attack
I remember having one modem that didn't use a cable to connect to the
computer, but that was only because it attached directly to the RS232
port. Certainly RS232 was the usual mode of connection!
YY
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL
A firewall is more akin to a specialized filter medium, but filter mediums aren't used
as the entrance or exit to a military base.
It is probably possible to find analogies between the information security world and
physical - but only on a piecemeal basis, and that is simply irrelevant and po
Why is the 8-in-1 less suitable, in your opinion?
I'm sure that I can't think of a good reason.
YY
>Hello,
>
>I don't know any BIOSes able to boot on a 8-in-1 card reader.
>USB flash disk is more suitable.
>
>Regards,
>
>___
>Arnaud Jacques
>Consultant Sécurité
>Secur
Note that there already _was_ a fix for Firefox... Whereas for IE?
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Choe Sung Cont.
PACAF CSS/SCHP
Sent: Monday, August 30, 2004 23:25
To: '[EMAIL PROTECTED] '
Cc: '[EMAIL PROTECTED] '
Subject: !SPAM! RE: [Ful
In spite of many reports to the contrary, Linux is _not_ secure by default.
Did you harden it? There is a lot of documentation on the web as to how to
go about it.
YY
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Richard
Verwayen
Sent: Thursday, Augus
Yes it
can. See the docs.
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of The Central
ScroutinizerSent: Monday, August 23, 2004 16:29To:
[EMAIL PROTECTED]Subject: !SPAM! RE: [Full-Disclosure]
The 'good worm' from HP
>It's called
WindowsUpdate? That cannot be used locally
Important: From which direction is the wind coming? ;-)
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of KF_lists
Sent: Thursday, August 19, 2004 01:53
To: Invicticide X
Cc: [EMAIL PROTECTED]
Subject: !SPAM! Re: [OT] Re: [Full-Disclosure] lame bitching abou
The hardware is warranted, which was the requirement - there was no mention
of supporting the OS as well.
YY
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Esler, Joel -
Contractor
Sent: Wednesday, August 18, 2004 20:42
To: [EMAIL PROTECTED]
Subject: !SP
BHO Demon 2.0
http://www.definitivesolutions.com/bhodemon.htm
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Todd Towles
Sent: Friday, July 30, 2004 18:00
To: 'Rmuge NineFive '; 'Disclosure Full'
Subject: RE: Re: [Full-Disclosure] Cool Web Search
There
smime.p7m
Description: S/MIME encrypted message
smime.p7m
Description: S/MIME encrypted message
smime.p7m
Description: S/MIME encrypted message
smime.p7m
Description: S/MIME encrypted message
I would be interested to hear just how big the danger
of IE is.
How could it affect the privacy of big business?, or
any business for that matter?
or what about the Government - could information leak
from govenrment employees computers? They do
something to stop that right?
Bob Palliser
>BTW. Uninstalling a service pack isn't 100% supported. It's recommended to
wipe and reinstall.
Where does that statement come from? Microsoft? I'd be interested to see
any references you might be able to provide.
Thanks!
___
Full-Disclosure - We be
22 matches
Mail list logo