Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: catch; Keyword(s):

Page 1 of 20 1 2 3 4

Search: Search took 0.04 seconds.

  1. Replies
    15
    Views
    2,241

    Actually... the only reason I retired is because...

    Actually... the only reason I retired is because I was looking for a job*, but I finally gave up on that and sold a patent. I am not really down with the whole 9 to 5 thang, I was mostly looking...
  2. Replies
    15
    Views
    2,241

    Computers are finite systems, it is not about...

    Computers are finite systems, it is not about what they are like, it is about what they are.

    Just because IE offers extensive functionality that is incorporated in what may be perceived as a...
  3. Replies
    15
    Views
    2,241

    My mouse is seamlessly integrated with my...

    My mouse is seamlessly integrated with my computer, but it is not embedded. It interfaces effectively through a standardized protocol and could be replaced with an other device that offered the same...
  4. Replies
    15
    Views
    2,241

    This is actually a misconception. IE is not a...

    This is actually a misconception.

    IE is not a true part of the Windows.

    IE resides entirely within user space and uses only standard MSDN documented APIs.
    IE gives the impression of being...
  5. Thread: 1000

    by catch
    Replies
    16
    Views
    1,161

    1000

    Well, this is my 1000th and final post here.

    Peace.

    cheers,

    catch
  6. Replies
    24
    Views
    2,664

    This garbage really bugs me... people seem to...

    This garbage really bugs me... people seem to have lost all sense of what is what these days

    Is this valid information or advertisement?
    Is intelligent design religion or science?
    Is Fox News...
  7. Replies
    28
    Views
    1,655

    Aside from things already mentioned... ...

    Aside from things already mentioned...


    $password = md5($_POST['password'];should be
    $password = md5($_POST['password']);

    However, the whole script is really sloppy...


    if (...
  8. Replies
    43
    Views
    3,335

    Application level firewalls are bad... always,...

    Application level firewalls are bad... always, always, always bad.

    Myth 1:
    They effectively protect the system from external attacks in case other systems on the network are compromised....
  9. Replies
    43
    Views
    3,335

    Excellect reply thehorse... and MrBabis... you...

    Excellect reply thehorse... and MrBabis... you should be shamed following that post with what you did.

    cheers,

    catch
  10. Replies
    43
    Views
    3,335

    The QA team and policy don't need to be ideal......

    The QA team and policy don't need to be ideal... even just a cursory check to ensure no obvious malware is typically more than sufficient for normal systems.


    These answers depend on the...
  11. Replies
    43
    Views
    3,335

    Many organizations do this... users submit "work...

    Many organizations do this... users submit "work related" applications to the change management team, who forwards it to a QA-like team that will test the application to ensure that is isn't malware...
  12. Replies
    43
    Views
    3,335

    Yes... and by your suggestion it is better to...

    Yes... and by your suggestion it is better to have every single system on its own network segment (behind a firewall).


    Yeah, that is what a control management process with digital signing is for...
  13. Replies
    43
    Views
    3,335

    No. Personal firewalls are garbage... in a...

    No.
    Personal firewalls are garbage... in a networked environment no system can ever be trusted to manage its own security.

    Systems that are mobile must be on their own network segment from the...
  14. Replies
    43
    Views
    3,335

    The personal firewall will be bypassable by...

    The personal firewall will be bypassable by custom tools if users can install what they like.

    The personal firewall won't be on at all if the system is alternatively booted.

    Points of high...
  15. Replies
    43
    Views
    3,335

    Because by doing so you: Increase costs Slow...

    Because by doing so you:

    Increase costs
    Slow the system security management process
    Add no new security functionality

    If the firewall actually added security relevant functionality... then...
  16. Replies
    43
    Views
    3,335

    So first you say that you don't agree with the...

    So first you say that you don't agree with the idea of increased complexity reducing security... and then in your very next statement you say the systems are already "insecurely complex". You sound...
  17. Replies
    37
    Views
    2,382

    Not true... it does not do a permission check......

    Not true... it does not do a permission check... observe:


    [root@luna doc_root]# uname -a
    Linux luna.xxxxxx.xxx 2.2.16-22 #1 Tue Aug 22 16:49:06 EDT 2000 i686 unknown

    [root@luna doc_root]#...
  18. The realm (if specified) is also revealed in the...

    The realm (if specified) is also revealed in the popup window requesting authentication information.

    my IIS 5.0 server replies with



    I have my system configured to use Kerbose authentiation...
  19. Thread: CobiT 4 released

    by catch
    Replies
    4
    Views
    1,324

    They must not like you, yet you still seemed to...

    They must not like you, yet you still seemed to know it was out so no harm no foul.

    cheers,

    catch
  20. Replies
    37
    Views
    2,382

    Every morning look into the mirror and repeat: ...

    Every morning look into the mirror and repeat:

    Reference monitors are good enough,
    Reference monitors are smart enough,
    Doggone it people like reference monitors.

    twenty times or so until you...
  21. Replies
    37
    Views
    2,382

    You write the use policy, the developers write...

    You write the use policy, the developers write the system policy. You merely configure the system policy to ideally be in line with the use policy.

    At the end of the day you have a policy of...
  22. Replies
    37
    Views
    2,382

    I just had a conversation in PM with another user...

    I just had a conversation in PM with another user about this... they asked my favorite operating systems... and I replied:

    "For research and software development or large data processing systems...
  23. Replies
    37
    Views
    2,382

    Gore... trust me on this... can't be done within...

    Gore... trust me on this... can't be done within the traditional UNIX security policy. Clearly some random exotic third party tool might offer such controls... though who knows what level of...
  24. Replies
    37
    Views
    2,382

    And I believe that is not what I asked. I...

    And I believe that is not what I asked.

    I asked "So how will groups help you set up directory that allows a user to delete files, but not subdirectories while allowing the user to create...
  25. Thread: CobiT 4 released

    by catch
    Replies
    4
    Views
    1,324

    Everyone who is a member of ISACA would have...

    Everyone who is a member of ISACA would have received an email notifying them of the release and where to get it and clearly wouldn't need it from me.

    cheers,

    catch

    PS.
Results 1 to 25 of 500
Page 1 of 20 1 2 3 4