Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] A New GNU/Linux Distribution That Microsoft/Apple AstroTurfers Ought to Try

  • Subject: [News] A New GNU/Linux Distribution That Microsoft/Apple AstroTurfers Ought to Try
  • From: Roy Schestowitz <newsgroups@xxxxxxxxxxxxxxx>
  • Date: Mon, 22 Feb 2010 02:53:58 +0000
  • Followup-to: comp.os.linux.advocacy
  • Newsgroups: comp.os.linux.advocacy
  • User-agent: KNode/4.3.1
Hash: SHA1

Think you've mastered Linux? Prove it, with Suicide Linux

,----[ Quote ]
| Linux gurus who pride themselves on their 
| skills with the command line would finally 
| have a way to prove it if one guy's wacky idea 
| came to fruition. Yes, it's Suicide Linux, 
| where any unrecognized command is parsed as 
| "rm -rf /" ... that's Linux for "your hard 
| drive's content go boom."



Germany seeks malware 'specialists' to bug terrorists

,----[ Quote ]
| The German government has reportedly started hiring coders to develop "white
| hat" malware capable of covertly hacking into terrorists' PCs.


In zombies we trust

,----[ Quote ]
| A little over a year ago, I wrote an editorial where in back-of-the-envelope
| style (.pdf) I estimated that perhaps 15-30% of all privately owned computers
| were no longer under the sole control of their owner. In the intervening
| months, I received a certain amount of hate mail but in those intervening
| months Vint Cert guessed 20-40%, Microsoft said 2/3rds, and IDC suggested
| 3/4ths. It is thus a conservative risk position to assume that any random
| counterparty stands a fair chance of being already compromised.


Over 50% of corporate desktops infected with malware: IronPort

,----[ Quote ]
| The report also reveals that more than 50% of corporate desktops
| worldwide are infected with some type of spyware with the rate of
| infection as high as 70% in the United States. Trojans or malicious
| system monitors represented over 7% of the infections. Rootkits and
| trick loaders, which reinstall spyware and other obfuscation techniques,
| make remediation very difficult thus prevention is the key to stopping
| these threats.


Botnet 'pandemic' threatens to strangle the net

,----[ Quote ]
| Cerf estimated that between 100 million and 150 million of the
| 600 million PCs on the internet are under the control of hackers,
| the BBC reports.


Did NSA Put a Secret Backdoor in New Encryption Standard?

,----[ Quote ]
| Which is why you should worry about a new random-number standard that
| includes an algorithm that is slow, badly designed and just might contain a
| backdoor for the National Security Agency.


,----[ Quote ]
| "Is this a good idea or not? For the first time, the giant software maker
| is acknowledging the help of the secretive agency, better known for
| eavesdropping on foreign officials and, more recently, U.S. citizens as
| part of the Bush..."


Microsoft could be teaching police to hack Vista

,----[ Quote ]
| Microsoft may begin training the police in ways to break the
| encryption built into its forthcoming Vista operating system.


UK holds Microsoft security talks

,----[ Quote ]
| "UK officials are talking to Microsoft over fears the new version of
| Windows could make it harder for police to read suspects' computer files."


For Windows Vista Security, Microsoft Called in Pros

,----[ Quote ]
| The NSA also declined to be specific but said it used two groups â a âred
| teamâ and a âblue teamâ â to test Vistaâs security. The red team, for
| instance, posed as âthe determined, technically competent adversaryâ to
| disrupt, corrupt or steal information. âThey pretend to be bad guys,â Sager
| said. The blue team helped Defense Department system administrators with
| Vistaâs configuration .
| Microsoft said this is not the first time it has sought help from the NSA.
| For about four years, Microsoft has tapped the spy agency for security
| expertise in reviewing its operating systems, including the Windows XP
| consumer version and the Windows Server 2003 for corporate customers.


Microsoft patents the mother of all adware systems

,----[ Quote ]
| The adware framework would leave almost no data untouched in its quest to
| sell you stuff. It would inspect "user document files, user e-mail files,
| user music files, downloaded podcasts, computer settings, computer status
| messages (e.g., a low memory status or low printer ink)," and more. How could
| we have been so blind as to not see the marketing value in computer status
| messages?


Why proprietary code is bad for security

,----[ Quote ]
| Tho Skype is using an encrypted protocol, itâs still their own, non-disclosed
| code and property. So we donât know what it contains.
| [...]
| Itâs time to stop accepting that we are the bad guys, and to stop consuming
| things we just donât understand (and cannot, because they are proprietary,
| closed-source systems).
| Say no to companies, or even governments who treat you like this. Start using
| open sourced products and protocols wherever you can. Even if you could
| still never understand the code used in these systems, there are still lots
| of people who can, and who will examine it. The magic word here is âpeer
| reviewâ - your friend or buddy or neighbour may be able to understand all
| that, and to help. No, not with Skype or Windows or any black box from Cisco.


U.S. panel urges vigilance on China spying, cyberwar

,----[ Quote ]
| Chinese espionage poses "the single greatest risk" to U.S. technology, a
| congressional advisory panel said Thursday. The panel also called for efforts
| to protect industrial secrets and computer networks.

Version: GnuPG v1.4.9 (GNU/Linux)


[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index