-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
____/ Homer on Saturday 03 Sep 2011 19:08 : \____
> Verily I say unto thee that Eric Pozharski spake thusly:
>
>> "You know, guys, why nobody hangs with you? Because you never learn
>> from your mistakes." The article labels initial password as "sniffed".
>> I believe it doesn't matter how exactly it was acquired. "The same
>> account and password data" that's what matters. Nothing changes.
>
> It matters from the perspective of correctly attributing the
> vulnerability. If, as I suspect, the password was "sniffed" due to
> insecure Windows software, then it should say so explicitly, and not
> leave people guessing. As it stands, the (Linux) article implies that
> Linux is somehow to blame. There's far too much of that vague bullshit
> on the Internet. Getting the facts is like getting blood out of a stone.
I refuse to connect to any of my machines/accounts from Windows boxes
as that can easily lead to a chain of vulnerabilities, through passwords.
In some companies I know Windows is verboten for this reason.
- --
~~ Best of wishes
Dr. Roy S. Schestowitz (Ph.D. Medical Biophysics), Imaging Researcher
http://Schestowitz.com | GNU/Linux administration | PGP-Key: 0x74572E8E
Editor @ http://techrights.org & Broadcaster @ http://bytesmedia.co.uk/
GPL-licensed 3-D Othello @ http://othellomaster.com
Non-profit search engine proposal @ http://iuron.com
Contact E-mail address (direct): s at schestowitz dot com
Contact Internet phone (SIP): schestowitz@xxxxxxxxx (24/7)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAk5i0NEACgkQU4xAY3RXLo4rXACdE2f9sshya3SCErYGJdLQiTs7
0FEAn1Tt3C5igvyCs6ujeSsiAC1xPDP2
=5c5X
-----END PGP SIGNATURE-----
|
|