Search:

Type: Posts; User: MS_Security; Keyword(s):

Search: Search took 0.03 seconds.

  1. Replies
    20
    Views
    6,836

    how much they or you know about computers aside....

    how much they or you know about computers aside.
    an operating system is a type of program an application is another and a service is yet another.
  2. Replies
    7
    Views
    3,922

    i thought all software purchased for use by the...

    i thought all software purchased for use by the american government has to be cc evaluated. my understanding is that diebold has strong political ties and used these to bypass the normal procurement...
  3. in the last week i switched all of my home...

    in the last week i switched all of my home systems from fedora core 5 to windows vista ultimate x64 rc1 to learn about this operating system.

    i think security vendors arguments are about lost...
  4. Replies
    14
    Views
    11,174

    i do not understand the concern over password...

    i do not understand the concern over password complexity. according to my math if i extract my password randomly from the alphanumeric set plus the shifted numerics i will only need a password four...
  5. Replies
    8
    Views
    7,777

    + C:\WINDOWS\system32>cacls dnsapi.dll...

    +

    C:\WINDOWS\system32>cacls dnsapi.dll
    C:\WINDOWS\system32\dnsapi.dll
    BUILTIN\Users:R
    BUILTIN\Power Users:R
    BUILTIN\Administrators:F
    NT AUTHORITY\SYSTEM:F
    looks like the attempted...
  6. Replies
    47
    Views
    29,585

    brokencow are we to understand that as a...

    brokencow are we to understand that as a refutation to what you call hypotheticals you have replied with a hypothetical argument claiming that for environments at the lowest level of maturity that...
  7. Replies
    3
    Views
    5,261

    positive security models can be ideal (i just...

    positive security models can be ideal (i just posted about this on the php security tutorial) but are not always applicable nor will they protect from all attack types.

    also remember two things...
  8. Replies
    3
    Views
    5,261

    useless security solutions

    i was searching for information on biologically inspired response to unknown vulnerabilities and i thought that if the system could extrapolate the full scope of poly/metamorphism available to the...
  9. Replies
    15
    Views
    13,093

    nihil what do you mean by "embedded nature"? just...

    nihil what do you mean by "embedded nature"? just that internet explorer is included with windows? that it is integrated well with other microsoft applications? when i think of embedded i think of an...
  10. Replies
    18
    Views
    26,295

    "high assurance programming language" typically...

    "high assurance programming language" typically means programming languages that supports the development of software that has been defined using z notation (iso13568). it can also be a subjective...
  11. Replies
    18
    Views
    26,295

    if(specific condition) {success} else(everything...

    if(specific condition) {success}
    else(everything else in the world including unforeseen events){failure}

    or in this case

    function lenCheck( $var, $maxlen ) {
    if (strlen($var) <= $maxlen)...
  12. Replies
    18
    Views
    26,295

    to take advantage of this reactivated thread. ...

    to take advantage of this reactivated thread.

    function lenCheck( $var, $maxlen ) {
    if (strlen($var) > $maxlen) {
    return false;
    } else {
    return true;
    }
    }this code is ok...
  13. Replies
    2
    Views
    5,959

    1. configure iis to allow anonymous access. 2....

    1. configure iis to allow anonymous access.
    2. on unprotected files add the iis account has read access in the windows security policy.
    3. on protected files remove the iis account access...
  14. Replies
    47
    Views
    39,903

    in the very unlikely event that a general purpose...

    in the very unlikely event that a general purpose operating system separated me from death i suppose i would want qnx neutrino. ideally i could have someone like lockheed-martin or boeing develop an...
  15. Replies
    16
    Views
    9,762

    this is a very poor approach at securing a...

    this is a very poor approach at securing a system. before you pick the tools you must decide what the system must do and must protect at what cost. i think you will have a much clearer picture of...
  16. Replies
    8
    Views
    10,076

    intrusion tolerant systems are the most...

    intrusion tolerant systems are the most successful method of dealing with zero-day attacks. the resources required for them are only justified in high risk environments.

    a simple example of an...
  17. Replies
    7
    Views
    12,390

    your logic is short sided. yes users will be...

    your logic is short sided.

    yes users will be punished in the short term and that is unfortunate but it is the only way to bring about change. your "ethical" approach only empowers the status quo...
  18. Replies
    7
    Views
    12,390

    how did you decide that this method is ethical or...

    how did you decide that this method is ethical or more ethical than other methods?

    i would say the opposite is true and in a free market environment this type of disclosure does more harm than...
  19. Replies
    2
    Views
    7,169

    the future of access controls

    abstract
    (this tutorial addresses why access controls have been changing and the direction they may take in the future.)

    in the past security models were simple and one directional. a trusted...
  20. Thread: hello

    by MS_Security
    Replies
    0
    Views
    3,436

    hello

    i was referred to this site by a former tutor of mine. he said this was a good place to encounter the full spectrum of real world perspectives and that i should learn from the challenge of...
  21. Replies
    32
    Views
    40,445

    no firewall even those in the fwtk legacy or...

    no firewall even those in the fwtk legacy or network guards can prevent trusted applications from sending undesired or unauthorized data. if the formatting of every single packet is defined in a...
  22. i think this report is an excellent reflection...

    i think this report is an excellent reflection not on the quality of either the windows or linux operating systems but the uselessness of aggregate reporting. the vulnerability definitions and set...
Results 1 to 22 of 25