Search:
Type: Posts; User: catch; Keyword(s):
Search:
Search took 0.03 seconds.
-
April 15th, 2006, 12:05 AM
Actually... the only reason I retired is because I was looking for a job*, but I finally gave up on that and sold a patent. I am not really down with the whole 9 to 5 thang, I was mostly looking...
-
April 14th, 2006, 11:42 PM
Computers are finite systems, it is not about what they are like, it is about what they are.
Just because IE offers extensive functionality that is incorporated in what may be perceived as a...
-
April 4th, 2006, 06:25 PM
My mouse is seamlessly integrated with my computer, but it is not embedded. It interfaces effectively through a standardized protocol and could be replaced with an other device that offered the same...
-
April 4th, 2006, 05:36 PM
This is actually a misconception.
IE is not a true part of the Windows.
IE resides entirely within user space and uses only standard MSDN documented APIs.
IE gives the impression of being...
-
December 9th, 2005, 01:41 AM
Well, this is my 1000th and final post here.
Peace.
cheers,
catch
-
December 9th, 2005, 01:34 AM
This garbage really bugs me... people seem to have lost all sense of what is what these days
Is this valid information or advertisement?
Is intelligent design religion or science?
Is Fox News...
-
December 8th, 2005, 02:06 AM
Aside from things already mentioned...
$password = md5($_POST['password'];should be
$password = md5($_POST['password']);
However, the whole script is really sloppy...
if (...
-
December 6th, 2005, 09:58 AM
Application level firewalls are bad... always, always, always bad.
Myth 1:
They effectively protect the system from external attacks in case other systems on the network are compromised....
-
December 5th, 2005, 10:31 PM
Excellect reply thehorse... and MrBabis... you should be shamed following that post with what you did.
cheers,
catch
-
December 5th, 2005, 12:34 PM
The QA team and policy don't need to be ideal... even just a cursory check to ensure no obvious malware is typically more than sufficient for normal systems.
These answers depend on the...
-
December 5th, 2005, 11:27 AM
Many organizations do this... users submit "work related" applications to the change management team, who forwards it to a QA-like team that will test the application to ensure that is isn't malware...
-
December 5th, 2005, 08:06 AM
Yes... and by your suggestion it is better to have every single system on its own network segment (behind a firewall).
Yeah, that is what a control management process with digital signing is for...
-
December 5th, 2005, 04:52 AM
No.
Personal firewalls are garbage... in a networked environment no system can ever be trusted to manage its own security.
Systems that are mobile must be on their own network segment from the...
-
December 5th, 2005, 04:48 AM
The personal firewall will be bypassable by custom tools if users can install what they like.
The personal firewall won't be on at all if the system is alternatively booted.
Points of high...
-
December 5th, 2005, 04:40 AM
Because by doing so you:
Increase costs
Slow the system security management process
Add no new security functionality
If the firewall actually added security relevant functionality... then...
-
December 5th, 2005, 03:16 AM
So first you say that you don't agree with the idea of increased complexity reducing security... and then in your very next statement you say the systems are already "insecurely complex". You sound...
-
December 5th, 2005, 02:49 AM
Not true... it does not do a permission check... observe:
[root@luna doc_root]# uname -a
Linux luna.xxxxxx.xxx 2.2.16-22 #1 Tue Aug 22 16:49:06 EDT 2000 i686 unknown
[root@luna doc_root]#...
-
December 4th, 2005, 10:54 PM
The realm (if specified) is also revealed in the popup window requesting authentication information.
my IIS 5.0 server replies with
I have my system configured to use Kerbose authentiation...
-
December 4th, 2005, 06:51 PM
They must not like you, yet you still seemed to know it was out so no harm no foul.
cheers,
catch
-
December 4th, 2005, 04:17 AM
Every morning look into the mirror and repeat:
Reference monitors are good enough,
Reference monitors are smart enough,
Doggone it people like reference monitors.
twenty times or so until you...
-
December 4th, 2005, 03:53 AM
You write the use policy, the developers write the system policy. You merely configure the system policy to ideally be in line with the use policy.
At the end of the day you have a policy of...
-
December 4th, 2005, 03:37 AM
I just had a conversation in PM with another user about this... they asked my favorite operating systems... and I replied:
"For research and software development or large data processing systems...
-
December 4th, 2005, 01:48 AM
Gore... trust me on this... can't be done within the traditional UNIX security policy. Clearly some random exotic third party tool might offer such controls... though who knows what level of...
-
December 4th, 2005, 01:19 AM
And I believe that is not what I asked.
I asked "So how will groups help you set up directory that allows a user to delete files, but not subdirectories while allowing the user to create...
-
December 4th, 2005, 12:06 AM
Everyone who is a member of ISACA would have received an email notifying them of the release and where to get it and clearly wouldn't need it from me.
cheers,
catch
PS.
|
|