<quote who="Phill O'Flynn (Bigpond)"> > I read somewhere that one of the hacker favourites is to use buffer > overruns and other similar RAM hacking techniques to gain control of a > machine (something which micro$oft is trying to tackle with the next lot > of service packs I believe). I am not aware of Linux's answer to that. > Does anyone know?
"Don't write shitty FOSS software, either." ;-) Lack of bounds checking hurts everyone writing stuff in shitty languages (like C, C++, yada), which unfortunately are the kinds of languages you have to use to write kernels. ;-) At least you know that with FOSS development (on major projects), personal reputation is involved, so people are less likely to check-in embarrassingly bad code. > But, if not why put a machine in the front line isn't it better to keep is > simple but effective? Which do you trust more, a FOSS operating system you know and trust (and perhaps have installed and hardened yourself), or whatever your DSL modem has in it? :-) - Jeff -- GVADEC 2004: Kristiansand, Norway http://2004.guadec.org/ "A rest with a fermata is the moral opposite of the fast food restaurant with express lane." - James Gleick, Faster -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
