Type: Posts; User: catch; Keyword(s):
Search took 0.08 seconds.
April 15th, 2006 12:05 AM
Actually... the only reason I retired is because I was looking for a job*, but I finally gave up on that and sold a patent. I am not really down with the whole 9 to 5 thang, I was mostly looking...
April 14th, 2006 11:42 PM
Computers are finite systems, it is not about what they are like, it is about what they are.
Just because IE offers extensive functionality that is incorporated in what may be perceived as a...
My mouse is seamlessly integrated with my computer, but it is not embedded. It interfaces effectively through a standardized protocol and could be replaced with an other device that offered the same...
This is actually a misconception.
IE is not a true part of the Windows.
IE resides entirely within user space and uses only standard MSDN documented APIs.
IE gives the impression of being...
December 9th, 2005 12:41 AM
Well, this is my 1000th and final post here.
December 9th, 2005 12:34 AM
This garbage really bugs me... people seem to have lost all sense of what is what these days
Is this valid information or advertisement?
Is intelligent design religion or science?
Is Fox News...
December 8th, 2005 01:06 AM
Aside from things already mentioned...
$password = md5($_POST['password'];should be
$password = md5($_POST['password']);
However, the whole script is really sloppy...
December 6th, 2005 08:58 AM
Application level firewalls are bad... always, always, always bad.
They effectively protect the system from external attacks in case other systems on the network are compromised....
December 5th, 2005 09:31 PM
Excellect reply thehorse... and MrBabis... you should be shamed following that post with what you did.
December 5th, 2005 11:34 AM
The QA team and policy don't need to be ideal... even just a cursory check to ensure no obvious malware is typically more than sufficient for normal systems.
These answers depend on the...
December 5th, 2005 10:27 AM
Many organizations do this... users submit "work related" applications to the change management team, who forwards it to a QA-like team that will test the application to ensure that is isn't malware...
December 5th, 2005 07:06 AM
Yes... and by your suggestion it is better to have every single system on its own network segment (behind a firewall).
Yeah, that is what a control management process with digital signing is for...
December 5th, 2005 03:52 AM
Personal firewalls are garbage... in a networked environment no system can ever be trusted to manage its own security.
Systems that are mobile must be on their own network segment from the...
December 5th, 2005 03:48 AM
The personal firewall will be bypassable by custom tools if users can install what they like.
The personal firewall won't be on at all if the system is alternatively booted.
Points of high...
December 5th, 2005 03:40 AM
Because by doing so you:
Slow the system security management process
Add no new security functionality
If the firewall actually added security relevant functionality... then...
December 5th, 2005 02:16 AM
So first you say that you don't agree with the idea of increased complexity reducing security... and then in your very next statement you say the systems are already "insecurely complex". You sound...
December 5th, 2005 01:49 AM
Not true... it does not do a permission check... observe:
[root@luna doc_root]# uname -a
Linux luna.xxxxxx.xxx 2.2.16-22 #1 Tue Aug 22 16:49:06 EDT 2000 i686 unknown
December 4th, 2005 09:54 PM
The realm (if specified) is also revealed in the popup window requesting authentication information.
my IIS 5.0 server replies with
I have my system configured to use Kerbose authentiation...
December 4th, 2005 05:51 PM
They must not like you, yet you still seemed to know it was out so no harm no foul.
December 4th, 2005 03:17 AM
Every morning look into the mirror and repeat:
Reference monitors are good enough,
Reference monitors are smart enough,
Doggone it people like reference monitors.
twenty times or so until you...
December 4th, 2005 02:53 AM
You write the use policy, the developers write the system policy. You merely configure the system policy to ideally be in line with the use policy.
At the end of the day you have a policy of...
December 4th, 2005 02:37 AM
I just had a conversation in PM with another user about this... they asked my favorite operating systems... and I replied:
"For research and software development or large data processing systems...
December 4th, 2005 12:48 AM
Gore... trust me on this... can't be done within the traditional UNIX security policy. Clearly some random exotic third party tool might offer such controls... though who knows what level of...
December 4th, 2005 12:19 AM
And I believe that is not what I asked.
I asked "So how will groups help you set up directory that allows a user to delete files, but not subdirectories while allowing the user to create...
December 3rd, 2005 11:06 PM
Everyone who is a member of ISACA would have received an email notifying them of the release and where to get it and clearly wouldn't need it from me.