December 21st, 2006, 10:02 AM
how much they or you know about computers aside.
an operating system is a type of program an application is another and a service is yet another.
October 10th, 2006, 05:54 AM
i thought all software purchased for use by the american government has to be cc evaluated. my understanding is that diebold has strong political ties and used these to bypass the normal procurement...
October 2nd, 2006, 07:34 PM
in the last week i switched all of my home systems from fedora core 5 to windows vista ultimate x64 rc1 to learn about this operating system.
i think security vendors arguments are about lost...
September 23rd, 2006, 03:13 PM
i do not understand the concern over password complexity. according to my math if i extract my password randomly from the alphanumeric set plus the shifted numerics i will only need a password four...
April 18th, 2006, 12:04 AM
+
C:\WINDOWS\system32>cacls dnsapi.dll
C:\WINDOWS\system32\dnsapi.dll
BUILTIN\Users:R
BUILTIN\Power Users:R
BUILTIN\Administrators:F
NT AUTHORITY\SYSTEM:F
looks like the attempted...
April 15th, 2006, 01:04 PM
brokencow are we to understand that as a refutation to what you call hypotheticals you have replied with a hypothetical argument claiming that for environments at the lowest level of maturity that...
April 14th, 2006, 04:43 PM
positive security models can be ideal (i just posted about this on the php security tutorial) but are not always applicable nor will they protect from all attack types.
also remember two things...
April 14th, 2006, 04:08 PM
i was searching for information on biologically inspired response to unknown vulnerabilities and i thought that if the system could extrapolate the full scope of poly/metamorphism available to the...
April 4th, 2006, 04:13 AM
nihil what do you mean by "embedded nature"? just that internet explorer is included with windows? that it is integrated well with other microsoft applications? when i think of embedded i think of an...
April 1st, 2006, 02:13 PM
"high assurance programming language" typically means programming languages that supports the development of software that has been defined using z notation (iso13568). it can also be a subjective...
March 31st, 2006, 03:00 PM
if(specific condition) {success}
else(everything else in the world including unforeseen events){failure}
or in this case
function lenCheck( $var, $maxlen ) {
if (strlen($var) <= $maxlen)...
March 30th, 2006, 10:42 AM
to take advantage of this reactivated thread.
function lenCheck( $var, $maxlen ) {
if (strlen($var) > $maxlen) {
return false;
} else {
return true;
}
}this code is ok...
March 24th, 2006, 01:08 PM
1. configure iis to allow anonymous access.
2. on unprotected files add the iis account has read access in the windows security policy.
3. on protected files remove the iis account access...
March 11th, 2006, 10:04 AM
in the very unlikely event that a general purpose operating system separated me from death i suppose i would want qnx neutrino. ideally i could have someone like lockheed-martin or boeing develop an...
March 11th, 2006, 07:09 AM
this is a very poor approach at securing a system. before you pick the tools you must decide what the system must do and must protect at what cost. i think you will have a much clearer picture of...
February 2nd, 2006, 05:47 PM
intrusion tolerant systems are the most successful method of dealing with zero-day attacks. the resources required for them are only justified in high risk environments.
a simple example of an...
January 19th, 2006, 09:42 PM
your logic is short sided.
yes users will be punished in the short term and that is unfortunate but it is the only way to bring about change. your "ethical" approach only empowers the status quo...
January 19th, 2006, 07:03 AM
how did you decide that this method is ethical or more ethical than other methods?
i would say the opposite is true and in a free market environment this type of disclosure does more harm than...
January 10th, 2006, 03:18 PM
abstract
(this tutorial addresses why access controls have been changing and the direction they may take in the future.)
in the past security models were simple and one directional. a trusted...
January 7th, 2006, 12:09 PM
i was referred to this site by a former tutor of mine. he said this was a good place to encounter the full spectrum of real world perspectives and that i should learn from the challenge of...
January 6th, 2006, 11:43 AM
no firewall even those in the fwtk legacy or network guards can prevent trusted applications from sending undesired or unauthorized data. if the formatting of every single packet is defined in a...
January 5th, 2006, 05:14 PM
i think this report is an excellent reflection not on the quality of either the windows or linux operating systems but the uselessness of aggregate reporting. the vulnerability definitions and set...