Proverbs, aphorisms, quotations (English) | by Linux fortune |
Stinginess with privileges is kindness in disguise. -- Guide to VAX/VMS Security, Sep. 1984 | |
Hi! How are things going? (just fine, thank you...) Great! Say, could I bother you for a question? (you just asked one...) Well, how about one more? (one more than the first one?) Yes. (you already asked that...) [at this point, Alphonso gets smart... ] May I ask two questions, sir? (no.) May I ask ONE then? (nope...) Then may I ask, sir, how I may ask you a question? (yes, you may.) Sir, how may I ask you a question? (you must ask for retroactive question asking privileges for the number of questions you have asked, then ask for that number plus two, one for the current question, and one for the next one) Sir, may I ask nine questions? (go right ahead...) | |
Throw away documentation and manuals, and users will be a hundred times happier. Throw away privileges and quotas, and users will do the Right Thing. Throw away proprietary and site licenses, and there won't be any pirating. If these three aren't enough, just stay at your home directory and let all processes take their course. | |
Linux Distro To Include Pre-Installed Security Holes Proactive Synergy Paradigm, the Linux distro targeted at Pointy Haired Bosses, will now include built-in security flaws to better compete with Microsoft programs. "The sheer popularity of Windows, Outlook, and IIS clearly shows that people demand security holes large enough to drive a truck through," said Mr. Bert Dill of P.S.P. Inc. "We're going to do our best to offer what the consumer wants. Just as Microsoft stole ideas from Apple during the 1980's, we're stealing ideas from Microsoft today." Future releases of Proactive Synergy Linux will feature "LookOut! 1.0", a mail reader that automatically executes (with root privileges) e-mail attachments coded in Perl, JavaScript, Python, and Visual Basic. "Hey, if it works for Microsoft, it can work for us," boasted Mr. Dill. "Now PHBs won't have to stick with Windows in order to have their confidential files secretly emailed to their colleagues by a worm. Better yet, this capability allows viruses to automagically delete unnecessary files to save disk space without wasting the PHB's valuable time. | |
Press Release -- For Immediate Release Microsoft Corporation, Redmond, WA ...Virtually all version of Linux (and Unix) contain a security hole that allows unauthorized users to gain complete control over the machine. By simply typing "root" at the login prompt and supplying a password from a limited number of possibilities, a malicious user can easily gain administrator privileges. This hole can be breached in seconds with only a dozen or so keystrokes... We suspect this issue has been known to Red Hat and other Linux distributors for years and they have refused to acknowlege its existence or supply a patch preventing users from exploiting the "root" login loophole... By ignoring the problem, the Linux community has proven that installing Linux is a dangerous proposition that could get you fired. We would like to point out that Windows XP does not suffer from this gaping hole... Tests conducted by both Ziff-Davis and Mindcraft prove that Windows XP is indeed the most secure operating system ever produced... | |
The first is to ensure your partner understands that nature has root privileges - nature doesn't have to make sense. -- Telsa Gwynne | |
Remember: While root can do most everything, there are certain privileges that only a partner can grant. -- Telsa Gwynne |