Tobias DiPasquale on Thu, 14 Mar 2002 17:50:16 +0100 |
On Thu, 2002-03-14 at 11:30, Timothy Lee Young wrote: > It alarms me that such a document would be created and distributed. > > However if it makes us system administrators (and users) more aware of > what avenues to watch for, and help close up the loopholes, then I guess > it isn't a bad thing to bring all this out in the open. > > But it's still kinda shocking to have this document in reality. > Well, it does indeed let sysadmins and users know more about the possible security risks of mobile code. But also, I don't think we'll see an explosion of new Linux viruses since, as the document notes, it is still not trivial to create an ELF-bourne virus. Also, this document could possibly be a pertinent for other platforms, since *BSD and Solaris use the ELF binary format, as well. And, I remember a paper some time ago about how to get your UNIX-bourne virus to use libdl to load and use shared libraries. So, the information is out there. It's up to us (the OSS community) to fix the holes and prevent attacks of this sort, lest we become the joke the IIS already is. > > > > ______________________________________________________________________ > Philadelphia Linux Users Group - http://www.phillylinux.org > Announcements-http://lists.phillylinux.org/mail/listinfo/plug-announce > General Discussion - http://lists.phillylinux.org/mail/listinfo/plug -- << T o b i a s D i P a s q u a l e >> anany@ece.villanova.edu | tdipas01@villanova.edu | toby@khenry.com Of course, in order to partially emulate an ASR-33, you could perhaps connect an IBM selectric up to your computer while running a looped recording of gunfight and an idling 58 chevy with one blown piston. For the final touch, you could replace the room's light switch with a dimmer switch and wiggle it back and forth whenever you are printing something out. -- Anonymous Coward, SlashDot, commenting about Caldera's release of some original UNIX sources Attachment:
signature.asc
|
|