<quote who="Phill O'Flynn (Bigpond)">

> I read somewhere that one of the hacker favourites is to use buffer
> overruns and other similar RAM hacking techniques to gain control of a
> machine (something which micro$oft is trying to tackle with the next lot
> of service packs I believe). I am not aware of Linux's answer to that.
> Does anyone know?

"Don't write shitty FOSS software, either." ;-)

Lack of bounds checking hurts everyone writing stuff in shitty languages
(like C, C++, yada), which unfortunately are the kinds of languages you have
to use to write kernels. ;-)

At least you know that with FOSS development (on major projects), personal
reputation is involved, so people are less likely to check-in embarrassingly
bad code.

> But, if not why put a machine in the front line isn't it better to keep is
> simple but effective?

Which do you trust more, a FOSS operating system you know and trust (and
perhaps have installed and hardened yourself), or whatever your DSL modem
has in it? :-)

- Jeff

-- 
GVADEC 2004: Kristiansand, Norway                    http://2004.guadec.org/
 
       "A rest with a fermata is the moral opposite of the fast food
           restaurant with express lane." - James Gleick, Faster
-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Reply via email to