On Fri, Dec 25, 2009 at 03:08:58PM -0500, Graydon wrote:
> On Fri, Dec 25, 2009 at 02:56:29PM -0500, John Francis scripsit:
> > I've personally encountered a Linux-based attack (at one of the
> > sites I use for hosting), valthough that's probably a softer
> > target than OS/X because the source code is widely available.
>
> It's not security until it works when the black hats know how it works.
Oh, I agree. But I'm not the one claiming OS/X is secure :-)
Fortunately for many of us the script kiddies et al. go for the
low-hanging fruit; they're not prepared to invest serious effort
(or even, in many cases, competent to do so).
I started in the industry back in the days when "hacker" was a
term of approval. Even at University we were encourage to try
and break the system. It was done on the understanding that:
1) You notified the authorities that you had done so.
Failure to do so would result in your account being
terminated (which was a problem if you needed it to
complete your degree).
2) You would, if asked, tell them how you did it (although
having to ask you was seen by the systems programmers
as an admission of defeat).
3) Any enhanced privileges that you managed to accquire
were yours to keep, as long as you obeyed rule (1).
Later on in my career I worked in the Federal Systems group
at DEC, so I was quite aware of the USAF "Tiger Team".
--
PDML Pentax-Discuss Mail List
[email protected]
http://pdml.net/mailman/listinfo/pdml_pdml.net
to UNSUBSCRIBE from the PDML, please visit the link directly above and follow
the directions.