Results 1 to 4 of 4

Thread: network security

  1. #1
    Junior Member
    Join Date
    Jan 2002
    Posts
    18

    network security

    right then here go's
    I have been reading alot of hacking material lately and something that always is mentioned is there alway one vunerable computer and what i don't understand is that how could there be one weak computer if they are all setup with the same setting and so fourth

    p.s by the way i am new to this security stuff

  2. #2
    Senior Member
    Join Date
    Sep 2001
    Posts
    429
    most OS installs are insecure by default, depending on the OS (and it's intended use) there are many different answers.

    In short update the installed packages
    remove and disable unwanted packages (daemons)

    Read up on security and be very, very afraid.



    J.
    [glowpurple]manually editing your config files can break them. If this happens, you get to keep both pieces. [/glowpurple]

  3. #3
    Senior Member
    Join Date
    Dec 2001
    Posts
    321
    pc's might be furnished with the same software pacckets if purchased new, yet depending on the use/software install, the vulnerability of the pc expands or decreases [exponetially (?)]
    a good firewall might resolve all the petty attacks, and close of most of the ports yet something like icq/bearshare/any filesharing soft opens your pc to temptation.
    *nix os are different cuz they start off with a whole bunch of packages that you absolutely don't need so make sure you disable them....
    so it all depands on your os and your use the unbreakable pc exist: take out the network card/modem/floppy &cd drive and put a logging in the bios; no one but you will get in but you won't have much to do ...


    it's all about acceptable risks: am i going to dl that warez from that neverheard sites to get that latest codex and get a trojan instead ? maybe maybenot... your call your pc ...
    assembly.... digital dna ?

  4. #4
    Oracle was one of the companies that boasted unbreakable software, but already that claim was proven to be false.
    http://www.oracle.com/features/9i/in...breakable.html
    http://www.idg.net.nz/webhome.nsf/UN...256B5E006C1819!opendocument
    Jealousy consumes the weak.
    http://www.badconnections.net

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •