DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

"Note that if I can get you to \"su and say\" something just by asking,
you have a very serious security problem on your system and you should
look into it."
(By Paul Vixie, vixie-cron 3.0.1 installation notes)
Multics is security spelled sideways.
Security check: INTRUDER ALERT!
So you see Antonio, why worry about one little core dump, eh?  In reality
all core dumps happen at the same instant, so the core dump you will have
tomorrow, why, it already happened.  You see, it's just a little universal
recursive joke which threads our lives through the infinite potential of
the instant.  So go to sleep, Antonio, your thread could break any moment
and cast you out of the safe security of the instant into the dark void of
eternity, the anti-time.  So go to sleep...
Stinginess with privileges is kindness in disguise.
                -- Guide to VAX/VMS Security, Sep. 1984
To date, the firm conclusions of Project Blue Book are:
   1. no unidentified flying object reported, investigated and evaluated
      by the Air Force has ever given any indication of threat to our
      national security;
   2. there has been no evidence submitted to or discovered by the Air
      Force that sightings categorized as UNIDENTIFIED represent
      technological developments or principles beyond the range of
      present-day scientific knowledge; and
   3. there has been no evidence indicating that sightings categorized
      as UNIDENTIFIED are extraterrestrial vehicles.
- the summary of Project Blue Book, an Air Force study of UFOs from 1950
  to 1965, as quoted by James Randi in Flim-Flam!
"Security is mostly a superstition.  It does not exist in nature... Life is
either a daring adventure or nothing."
-- Helen Keller
"You shouldn't make my toaster angry."
-- Household security explained in "Johnny Quest"
"A commercial, and in some respects a social, doubt has been started within the
last year or two, whether or not it is right to discuss so openly the security
or insecurity of locks.  Many well-meaning persons suppose that the discus-
sion respecting the means for baffling the supposed safety of locks offers a
premium for dishonesty, by showing others how to be dishonest.  This is a fal-
lacy.  Rogues are very keen in their profession, and already know much more
than we can teach them respecting their several kinds of roguery.  Rogues knew
a good deal about lockpicking long before locksmiths discussed it among them-
selves, as they have lately done.  If a lock -- let it have been made in what-
ever country, or by whatever maker -- is not so inviolable as it has hitherto
been deemed to be, surely it is in the interest of *honest* persons to know
this fact, because the *dishonest* are tolerably certain to be the first to
apply the knowledge practically; and the spread of knowledge is necessary to
give fair play to those who might suffer by ignorance.  It cannot be too ear-
nestly urged, that an acquaintance with real facts will, in the end, be better
for all parties."
-- Charles Tomlinson's Rudimentary Treatise on the Construction of Locks,
   published around 1850
"They know your name, address, telephone number, credit card numbers, who ELSE
is driving the car "for insurance", ...  your driver's license number. In the
state of Massachusetts, this is the same number as that used for Social
Security, unless you object to such use. In THAT case, you are ASSIGNED a
number and you reside forever more on the list of "weird people who don't give
out their Social Security Number in Massachusetts."
-- Arthur Miller
"Perhaps I am flogging a straw herring in mid-stream, but in the light of
what is known about the ubiquity of security vulnerabilities, it seems vastly
too dangerous for university folks to run with their heads in the sand."
-- Peter G. Neumann, RISKS moderator, about the Internet virus
"... gentlemen do not read each other's mail."
                -- Secretary of State Henry Stimson, on closing down
                   the Black Chamber, the precursor to the National
                   Security Agency.
National security is in your hands - guard it well.
Signs of crime: screaming or cries for help.
                -- The Brown University Security Crime Prevention Pamphlet
Surprise!  You are the lucky winner of random I.R.S. Audit!  Just type
in your name and social security number.  Please remember that leaving
the room is punishable under law:

Name
#
The Worst Prison Guards
        The largest number of convicts ever to escape simultaneously from a
maximum security prison is 124.  This record is held by Alcoente Prison,
near Lisbon in Portugal.
        During the weeks leading up to the escape in July 1978 the prison
warders had noticed that attendances had fallen at film shows which
included "The Great Escape", and also that 220 knives and a huge quantity
of electric cable had disappeared.  A guard explained, "Yes, we were
planning to look for them, but never got around to it."  The warders had
not, however, noticed the gaping holes in the wall because they were
"covered with posters".  Nor did they detect any of the spades, chisels,
water hoses and electric drills amassed by the inmates in large quantities.
The night before the breakout one guard had noticed that of the 36
prisoners in his block only 13 were present.  He said this was "normal"
because inmates sometimes missed roll-call or hid, but usually came back
the next morning.
        "We only found out about the escape at 6:30 the next morning when
one of the prisoners told us," a warder said later.  [...]  When they
eventually checked, the prison guards found that exactly half of the gaol's
population was missing.  By way of explanation the Justice Minister, Dr.
Santos Pais, claimed that the escape was "normal" and part of the
"legitimate desire of the prisoner to regain his liberty."
                -- Stephen Pile, "The Book of Heroic Failures"
There is no security on this earth.  There is only opportunity.
                -- General Douglas MacArthur
A hypothetical paradox:
        What would happen in a battle between an Enterprise security team,
        who always get killed soon after appearing, and a squad of Imperial
        Stormtroopers, who can't hit the broad side of a planet?
                -- Tom Galloway
MAFIA, n:
        [Acronym for Mechanized Applications in Forced Insurance
Accounting.] An extensive network with many on-line and offshore
subsystems running under OS, DOS, and IOS.  MAFIA documentation is
rather scanty, and the MAFIA sales office exhibits that testy
reluctance to bona fide inquiries which is the hallmark of so many DP
operations.  From the little that has seeped out, it would appear that
MAFIA operates under a non-standard protocol, OMERTA, a tight-lipped
variant of SNA, in which extended handshakes also perform complex
security functions.  The known timesharing aspects of MAFIA point to a
more than usually autocratic operating system.  Screen prompts carry an
imperative, nonrefusable weighting (most menus offer simple YES/YES
options, defaulting to YES) that precludes indifference or delay.
Uniquely, all editing under MAFIA is performed centrally, using a
powerful rubout feature capable of erasing files, filors, filees, and
entire nodal aggravations.
                -- Stan Kelly-Bootle, "The Devil's DP Dictionary"
Boomer Envy:
        Envy of material wealth and long-range material security
accrued by older members of the baby boom generation by virtue of
fortunate births.
                -- Douglas Coupland, "Generation X: Tales for an Accelerated
                   Culture"
Biggest security gap -- an open mouth.
Don't guess -- check your security regulations.
Q:        How many members of the U.S.S. Enterprise does it take to change a
        light bulb?
A:        Seven.  Scotty has to report to Captain Kirk that the light bulb in
        the Engineering Section is getting dim, at which point Kirk will send
        Bones to pronounce the bulb dead (although he'll immediately claim
        that he's a doctor, not an electrician).  Scotty, after checking
        around, realizes that they have no more new light bulbs, and complains
        that he "canna" see in the dark.  Kirk will make an emergency stop at
        the next uncharted planet, Alpha Regula IV, to procure a light bulb
        from the natives, who, are friendly, but seem to be hiding something.
        Kirk, Spock, Bones, Yeoman Rand and two red shirt security officers
        beam down to the planet, where the two security officers are promply
        killed by the natives, and the rest of the landing party is captured.
        As something begins to develop between the Captain and Yeoman Rand,
        Scotty, back in orbit, is attacked by a Klingon destroyer and must
        warp out of orbit.  Although badly outgunned, he cripples the Klingon
        and races back to the planet in order to rescue Kirk et. al. who have
        just saved the natives' from an awful fate and, as a reward, been
        given all light bulbs they can carry.  The new bulb is then inserted
        and the Enterprise continues on its five year mission.
        "Yo, Mike!"
        "Yeah, Gabe?"
        "We got a problem down on Earth.  In Utah."
        "I thought you fixed that last century!"
        "No, no, not that.  Someone's found a security problem in the physics
program.  They're getting energy out of nowhere."
        "Blessit!  Lemme look...  <tappity clickity tappity>  Hey, it's
there all right!  OK, just a sec...  <tappity clickity tap... save... compile>
There, that ought to patch it.  Dist it out, wouldja?"
                -- Cold Fusion, 1989
After a while you learn the subtle difference
Between holding a hand and chaining a soul,
And you learn that love doesn't mean security,
And you begin to learn that kisses aren't contracts
And presents aren't promises
And you begin to accept your defeats
With your head up and your eyes open,
With the grace of a woman, not the grief of a child,
And you learn to build all your roads
On today because tomorrow's ground
Is too uncertain.  And futures have
A way of falling down in midflight,
After a while you learn that even sunshine burns if you get too much.
So you plant your own garden and decorate your own soul, instead of waiting
For someone to bring you flowers.
And you learn that you really can endure...
That you really are strong,
And you really do have worth
And you learn and learn
With every goodbye you learn.
                -- Veronic Shoffstall, "Comes the Dawn"
Just a song before I go,                Going through security
To whom it may concern,                        I held her for so long.
Traveling twice the speed of sound        She finally looked at me in love,
It's easy to get burned.                And she was gone.
When the shows were over                Just a song before I go,
We had to get back home,                A lesson to be learned.
And when we opened up the door                Traveling twice the speed of sound
I had to be alone.                        It's easy to get burned.
She helped me with my suitcase,
She stands before my eyes,
Driving me to the airport
And to the friendly skies.
                -- Crosby, Stills, Nash, "Just a Song Before I Go"
Be security conscious -- National defense is at stake.
Several years ago, an international chess tournament was being held in a
swank hotel in New York.  Most of the major stars of the chess world were
there, and after a grueling day of chess, the players and their entourages
retired to the lobby of the hotel for a little refreshment.  In the lobby,
some players got into a heated argument about who was the brightest, the
fastest, and the best chess player in the world.  The argument got quite
loud, as various players claimed that honor.  At that point, a security
guard in the lobby turned to another guard and commented, "If there's
anything I just can't stand, it's chess nuts boasting in an open foyer."
You Might be a Microsoft Employee If...

1. When a Microsoft program crashes for the millionth time, you say "Oh,
    well!" and reboot without any negative thoughts
2. The Windows 95 startup screen (the clouds) makes you feel all warm and
    fuzzy inside
3. You fully understand why Windows 95's Shutdown Option has to be
    accessed from the Start Menu
4. You believe Internet Explorer's security flaws were slipped in by a
    crack team of Netscape programmers
5. You keep valuable papers near your fireplace. Therefore, you are
    comfortable with Windows 95's "may-delete-it-at-anytime" philosophy
6. You're the Bob that Microsoft Bob was named after
7. Instead of "I'd rather be fishing," your bumper sticker says, "I'd
    rather be writing buggy Microsoft code"
8. You know the technical difference between OLE 1.0 and OLE 2.0
9. You've ever completed your income taxes while waiting for Windows 95
    to boot, and didn't think anything of it
10. You run Solitaire more than any other program, and therefore you
    consider your computer a Dedicated Solitaire Engine (DSE)
Windows 2000 is more secure than Linux...

Since the machine is offline half of the time because of crashes, it
cannot be accessed globally, therefore producing higher security.

   -- From a Slashdot.org post
Hear me out. Linux is Microsoft's main competition right now. Because of
this we are forcing them to "innovate", something they would usually avoid.
Now if MS Bob has taught us anything, Microsoft is not a company that
should be innovating. When they do, they don't come up with things like
"better security" or "stability", they come back with "talking
paperclips", and "throw in every usless feature we can think of, memory
footprint be dammed".

Unfortunatly, they also come up with the bright idea of executing email.
Now MIME attachments aren't enough, they want you to be able to run/open
attachments right when you get them. This sounds like a good idea to
people who believe renaming directories to folders made computing possible
for the common man, but security wise it's like vigorously shaking a
package from the Unibomber.

So my friends, we are to blame. We pushed them into frantically trying to
invent "necessary" features to stay on top, and look where it got us. Many
of us are watching our beloved mail servers go down under the strain and
rebuilding our company's PC because of our pointless competition with MS.
I implore you to please drop Linux before Microsoft innovates again.

  -- From a Slashdot.org post in regards to the ILOVEYOU email virus
Linux Drinking Game (Abridged)

With a group of friends, take turns reading articles about Linux from popular
media sources (Ziff-Davis AnchorDesk is recommended) or postings on Usenet (try
alt.fan.bill-gates). If the author says one of the things below, take a drink.
Continue until everyone involved is plastered.

- Linux will never go mainstream
- Any platform that can't run Microsoft Office [or some other Microsoft
  "solution"] sucks
- Linux is hard to install
- Linux tech support is lacking
- No one ever got fired for choosing Microsoft
- Any OS with a command line interface is primitive
- Microsoft is an innovative company
- Could you get fired for choosing Linux?
- Linux was created by a bunch of snot-nosed 14 year old hackers with acne and
  no life
- Security through obscurity is the way to go
- Linus and Unix are 70s technology while NT is 90s technology
- All Linux software must be released under the GPL
- Linux is a great piece of shareware
Humorix Holiday Gift Idea #9

Dial-A-Detective
$499.95/year; 1-888-BYE-SPAM

This detective firm is not what you'd expect. Instead of tracking murderers or
unfaithful husbands, this band of rogue private investigators goes after
something just as sinister -- spammers. For a modest annual retainer fee,
these spam detectives will track down the source of every piece of spam you
receive.

Using the latest in forensic technology, they will bring you the virtual scalp
of the spammer -- their name, home address, social-security number, and, more
importantly, credit card numbers. At this point you are free to pursue the
evil spammer as you see fit.

If your friend or relative is sick of receiving wave after wave of "Find Out
Anything About Anyone" spams, give them a subscription to Dial-A-Detective,
and they'll find out anything about any spammer -- for real.
Linux Advocacy Crackdown

SHERIDAN, WY -- In an unprecedented blow to Linux advocacy, Aaron McAdams, an
employee at the Sheridan Try-N-Save Discount Store, was fired last week.
According to the store's general manager, McAdams was fired because "he
constantly rearranged items on shelves so that Linux-related books and
software boxes would be displayed more prominently than Windows merchandise."
McAdams' boss added, "If he would have spent as much time actually working as
he did hiding Windows books at the back of shelves, he wouldn't have received
the pink slip."

The general manager supplied Humorix with videotapes from the store's
security cameras showing McAdams in action.  In one scene, he takes a whole
stack of "...For Dummies" books and buries them in the Cheap Romance section,
an area of the store rarely visited by computer users.  In another, McAdams
can be plainly seen setting copies of Red Hat Linux in front of a large,
eye-catching display of various Microsoft products at the front of the
store.  Finally, at one point McAdams can be seen slapping huge tags reading
"DEMO DISPLAY BOX -- NOT AVAILABLE UNTIL 1999" on boxes of Windows 98.

McAdams disputes his bosses accusations.  "If he would spend more time
actually working instead of peering over security camera footage for hours on
end, this store might actually turn a profit for a change."
Attack of the Tuxissa Virus

What started out as a prank posting to comp.os.linux.advocacy yesterday has
turned into one of the most significant viruses in computing history.
The creator of the virus, who goes by the moniker "Anonymous Longhair",
modified the Melissa virus to install Linux on infected machines.

"It's a work of art," one Linux advocate told Humorix after he looked
through the Tuxissa virus source code.  "This virus goes well beyond the
feeble troublemaking of Melissa.  It actually configures a UMSDOS partition
on the user's hard drive and then downloads and installs a stripped-down
version of Slackware Linux."

The email message that the virus is attached to has the subject "Important
Message About Windows Security".  The text of the body says, "I want to let
you know about some security problems I've uncovered in Windows 95/98/NT,
Office 95/97, and Outlook. It's critically important that you protect your
system against these attacks.  Visit these sites for more information..."
The rest of the message contains 42 links to sites about Linux and free
software.

Details on how the virus started are a bit sketchy.  The "Anonymous
Longhair" who created it only posted it to Usenet as an early April Fool's
gag, demonstrating how easy it would be to mount a "Linux revolution".
The War Against Linux

A significant obstacle on the path to Linux World Domination has emerged.  A
reactionary grass-roots movement has formed to fight, as they call it, "The
War Against Linux".  This movement, code-named "LinSux", is composed of
people (mostly Microsoft stockholders and commercial software developers)
who want to maintain the status quo.  They are fighting back against the
rise of Linux and free software which they see as a threat to their financial
independence.

The most damaging attack the LinSux folks have launched is "Three Mile
Island", a Windows macro virus designed to inflict damage on computers that
contain a partition devoted to a non-Microsoft OS.  When the victim computer
is booted into Windows, the virus activates and deletes any non-Microsoft
partitions. Ironically, the many security flaws in Windows allow the virus
to damage alternative operating systems but leave Windows unscathed.

"The War Against Linux" has also been fought in more subtle ways.
Time-tested methods of Linux advocacy have been turned into subtle forms of
anti-Linux advocacy by the LinSux crowd.  MSCEs are smuggling NT boxes into
companies that predominantly use Linux or Unix.  LinSux "freedom fighters"
are rearranging books and software boxes on store shelves so that Microsoft
offerings are displayed more prominently.
Is Linux A Finnish Conspiracy?

WASHINGTON, DISTRICT OF CORRUPTION -- According to a report recently
issued by the NSA (No Such Agency), Finland is now considered a national
economic and security risk. "We don't trust the Finns... software written
by these people could potentially contain backdoors that could undermine
domestic security," the report states. In response to the news, US Senator
Fatcatte (R-WA) has proposed a bill, the It's For The Children Act of
2000, that would ban all software written by native-born Finns.

"It's time we take the Finnish threat seriously," Fatcatte said at a press
conference. "Not only is Finn software a threat to domestic tranquility,
but it could radically alter the computer industry, costing us thousands
of jobs... and, more importantly, billions in tax revenue. We must prevent
the Finns from subverting our economy with so-called 'open-source
software'." He then asked, "Is anybody thinking of the children of
programmers who will become unemployed when Finnish software overruns the
country?"
Security Holes Found In Microsoft Easter Eggs

REDMOND, WA -- It's damage control time for the Microsoft Marketing
Machine. Not only have exploits been found in IE, Outlook, and even the
Dancing Paper Clip, but now holes have been uncovered in Excel's Flight
Simulator and Word's pinball game.

"If you enter Excel 97's flight simulator and then hit the F1, X, and
SysRq keys while reading a file from Drive A:, you automatically gain
Administrator rights on Windows NT," explained the security expert who
first discovered the problem. "And that's just the tip of the iceberg."

Office 97 and 2000 both contain two hidden DLLs, billrulez.dll and
eastereggs.dll, that are marked as "Safe for scripting" but are not.
Arbitrary Visual BASIC code can be executed using these files. More
disturbing, however, are the undocumented API calls
"ChangeAllPasswordsToDefault", "OpenBackDoor", "InitiateBlueScreenNow",
and "UploadRegistryToMicrosoft" within easter~1.dll.

Microsoft spokesdroids have already hailed the problem as "an
insignificant byproduct of Microsoft innovation."
"Brown Orifice" Is Only The Beginning

Last week security holes were found in Netscape's Java implementation that
allowed it to act as a web server. Earlier today, a hacker announced that
he had found vulnerabilities in Mozilla M17 that allow it to operate as a
web browser. And that's just the beginning.

Said "3l337h4x0r", the discoverer of the M17 exploit, "This is quite a
hack! By manipulating some internal functions, I was able to use M17 to
actually surf the web. Slashdot and Humorix rendered beautifully."

Mozilla engineers were stunned. "This shouldn't be possible. M17 contains
a newsreader, a mail client, an instant messenger client, and a whole
bunch of XUL acronymn-enriched stuff, but it shouldn't be able to handle
HTTP or HTML. We haven't been planning on adding web-surfing functionality
to Mozilla until M30... maybe M25 at the earliest. I suspect this whole
thing is a hoax."
Look Out! It's Microsoft Outlook

An old maxim in the Unix community states, "All programs expand until they
can read mail... except Microsoft Outlook." Well, that's no longer true.
By taking advantage of loopholes in several undocumented APIs, a team of
geeks were able to transform Outlook from a virus-delivery system into an
actual mail client.

"It was quite a feat to accomplish this," said one of the geeks. "I mean,
the rat's nest that is the Windows API can be used to frighten small
children... or adults. And the frequency by which Outlook exploits are
discovered is directly proportional to the number of times Bill Gates uses
the word 'innovation'. But this is the first time somebody has discovered
a beneficial exploit."

Microsoft has vowed to release a patch to fix the uncovered security
flaws. "We simply cannot tolerate unauthorized reverse engineering and
hacking of our innovative solutions. Our Security Response Team will pull
an all-nighter to eliminate these known issues."
Bill Gates Sends Out Desperate Plea For Help

REDMOND -- In a shocking development, Chief Bloatware Architect Bill Gates
admitted today that Microsoft is in severe financial difficulty and
desperately needs donations to stay afloat through the next month.

"The dismal state of the economy, the lackluster sales of Windows ME, and
the pending anti-trust lawsuit have placed significant financial stress on
Microsoft," Gates said at a press conference. "We can't continue to
develop and maintain our innovative solutions without financial
contributions from users like you."

The company spent the remaining $10,000 in its coffers to send out letters
to registered Windows users pleading for donations.

"For just pennies a day, you can help support the world's most innovative
company in its quest to discover the cure for the Blue Screen of Death,"
the letter announces. "Or you can help fund research and development into
improving the security of our products against such sinister forces as
script kiddies, crackers, and Linux freaks."
Linux Distro To Include Pre-Installed Security Holes

Proactive Synergy Paradigm, the Linux distro targeted at Pointy Haired
Bosses, will now include built-in security flaws to better compete with
Microsoft programs.

"The sheer popularity of Windows, Outlook, and IIS clearly shows that
people demand security holes large enough to drive a truck through," said
Mr. Bert Dill of P.S.P. Inc. "We're going to do our best to offer what the
consumer wants. Just as Microsoft stole ideas from Apple during the
1980's, we're stealing ideas from Microsoft today."

Future releases of Proactive Synergy Linux will feature "LookOut! 1.0", a
mail reader that automatically executes (with root privileges) e-mail
attachments coded in Perl, JavaScript, Python, and Visual Basic.

"Hey, if it works for Microsoft, it can work for us," boasted Mr. Dill.
"Now PHBs won't have to stick with Windows in order to have their
confidential files secretly emailed to their colleagues by a worm. Better
yet, this capability allows viruses to automagically delete unnecessary
files to save disk space without wasting the PHB's valuable time.
The Humorix Oracle explains how to get a job at a major corporation:

1. Find an exploit in Microsoft IIS or another buggy Microsoft product to
   which large corporations rarely apply security patches.
2. Create a virus or worm that takes advantage of this exploit and then
   propogates itself by selecting IP numbers at random and then trying to
   infect those machines.
3. Keep an eye on your own website's server logs. When your virus starts
   propogating, your server will be hit with thousands of attacks from
   other infected systems trying to spread the virus to your machine.
4. Make a list of the IP numbers of all of the infected machines.
5. Perform a reverse DNS lookup on these IP numbers.
6. Make a note of all of the Fortune 500 companies that appear on the list
   of infected domains.
7. Send your resume to these companies and request an interview for a
   system administrator position. These companies are hiring -- whether
   they realize it or not.
8. Use your new salary to hire a good defense lawyer when the FBI comes
   knocking.
Press Release -- For Immediate Release
Microsoft Corporation, Redmond, WA

...Virtually all version of Linux (and Unix) contain a security hole that
allows unauthorized users to gain complete control over the machine. By
simply typing "root" at the login prompt and supplying a password from a
limited number of possibilities, a malicious user can easily gain
administrator privileges. This hole can be breached in seconds with only a
dozen or so keystrokes...

We suspect this issue has been known to Red Hat and other Linux
distributors for years and they have refused to acknowlege its existence
or supply a patch preventing users from exploiting the "root" login
loophole...

By ignoring the problem, the Linux community has proven that installing
Linux is a dangerous proposition that could get you fired. We would like
to point out that Windows XP does not suffer from this gaping hole...
Tests conducted by both Ziff-Davis and Mindcraft prove that Windows XP is
indeed the most secure operating system ever produced...
Solving The Virus Problem Once And For All

System administrators across the globe have tried installing anti-virus
software. They've tried lecturing employees not to open unsolicited email
attachments. They've tried installing firewalls and the latest security
patches. But even with these precautions, email viruses continue to rank
third only to Solitaire and the Blue Screen Of Death in the amount of lost
productivity they cause. Meanwhile, Microsoft Exchange and LookOut! remain
as the number one virus delivery products on the market today.

But maybe not for much longer. A group of disgruntled administrators have
teamed up to produce and sell a brand new way to fight viruses, one that
attacks the root of the problem: stupid users.

Salivating Dogs, Inc. of Ohio has unveiled the "Clue Delivery System"
(CDS), a small device that plugs into the back of a standard PC keyboard
and delivers a mild electric shock whenever the luser does something
stupid. The device is triggered by a Windows program that detects when the
luser attempts to open an unsolicited email attachment or perform another
equally dangerous virus-friendly action.
Actually you would still need the other fixes otherwise you might as well put
the root password in /etc/motd

        - Alan Cox pointing out some security holes in binfmt_misc
With the current lunatic US congress proposals on security, crypto and
building big brother into all PC's I'd say allowing non GPL security modules
is positively dangerous to the well being of non US citizens

        - Alan Cox on linux-kernel
> Yes *please*! Finally we could introduce proper support for 64-bit
> inode numbers too!

Right.  As soon as userland is audited for places where it uses int
for storing inode numbers - just a couple of months after MS fixes
all security holes in their software.  By then we'll need 128bit time_t,
though...

        - Al Viro on linux-kernel
Cuba is within small boat distance. I thought it was going to be twenty
years before the direction changed, now Im not so sure

        - Alan Cox on crazy US computer security laws
We the people of the Debian GNU/Linux distribution, in order to form a
more perfect operating system, establish quality, insure marketplace
diversity, provide for the common needs of computer users, promote
security and privacy, overthrow monopolistic forces in the computer
software industry, and secure the blessings of liberty to ourselves and
our posterity, do ordain and establish this Constitution for the Debian
GNU/Linux System.
"Actually, the only distribution of Linux I've ever used that passed the
rootshell test out of the box (hit rootshell at the time the dist is
released and see if you can break the OS with scripts from there) is
Debian."
        -- seen on the Linux security-audit mailing list
<SilverStr> media ethics is an oxymoron, much like Jumbo Shrimp and
            Microsoft Works.
<MonkAway> not to mention NT Security
Red Hat has recently released a Security Advisory (RHSA-1999:030-01)
covering a buffer overflow in the vixie cron package.  Debian has
discovered this bug two years ago and fixed it.  Therefore versions in
both, the stable and the unstable, distributions of Debian are not
vulnerable to this problem..
* Equivalent code is available from RSA Data Security, Inc.
* This code has been tested against that, and is equivalent,
* except that you don't need to include two pages of legalese
* with every copy.
        -- public domain MD5 source
When alerted to an intrusion by tinkling glass or otherwise, 1) Calm
yourself 2) Identify the intruder 3) If hostile, kill him.

Step number 3 is of particular importance.  If you leave the guy alive
out of misguided softheartedness, he will repay your generosity of spirit
by suing you for causing his subsequent paraplegia and seek to force you
to support him for the rest of his rotten life.  In court he will plead
that he was depressed because society had failed him, and that he was
looking for Mother Teresa for comfort and to offer his services to the
poor.  In that lawsuit, you will lose.  If, on the other hand, you kill
him, the most that you can expect is that a relative will bring a wrongful
death action. You will have two advantages: first, there be only your
story; forget Mother Teresa.  Second, even if you lose, how much could
the bum's life be worth anyway?  A Lot less than 50 years worth of
paralysis.  Don't play George Bush and Saddam Hussein.  Finish the job.
        -- G. Gordon Liddy's "Forbes" column on personal security
Note that if I can get you to "su and say" something just by asking,
you have a very serious security problem on your system and you should
look into it.
        -- Paul Vixie, vixie-cron 3.0.1 installation notes
Alan Cox wrote:
>> On any procmail new enough not to be full of security holes you set
>Brain on, Imeant majordomo of course 8)
You got me worried there for a brief (very brief) moment :-).
        -- Stephen R. van den Berg (AKA BuGless)
Too many people are thinking of security instead of opportunity.  They seem
more afraid of life than death.
                -- James F. Byrnes
Well, you can implement a Perl peek() with unpack('P',...).  Once you
have that, there's only security through obscurity.  :-)
             -- Larry Wall in <199710161537.IAA07828@wall.org>
I've got an IDEA!!  Why don't I STARE at you so HARD, you forget your
SOCIAL SECURITY NUMBER!!
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners