<table cellspacing="0" cellpadding="0" border="0" ><tr><td valign="top" style="font: inherit;">that's a very interesting article... thanks for that...<br><br>I guess a real addition to this would be some sudo action..<br><br>http://users.telenet.be/mydotcom/program/shell/bruteforce.htm<br><br>solutions? run your browser in a chroot jail? use a virtual machine for browsing?<br>make your machine only run code with a valid certificate (can you do that for shell scripts)<br><br>linux is not more secure than windows....but it's no less, and it's not completly stupid!<br>but if a user is driving a car, and dedcides he/she want to drive it to a wall, then what<br>are you suppose to do? vista would probably ask....<br><br>I guess the next evolution for gnome/jde is specfic application and data object security?<br><br>i.e. can firefox access my address book? can firefox read/write files to /home/secretdata?<br><br><br>discuss...<br><br><br><br><pre class="cs">##
short passwords with 2 identical syllables                                # 25 minutes<br># first try syllables of 1-2 char, then 3 char<br>for l in 2 1 3 ; do<br>        generatewords $l $l a | while read part1; do<br>        <br>                echo $part1$part1 ;<br>                <br>                # while we're at it, include capitalization<br>                cap=$( echo ${part1:0:1} | tr '[:lower:]' '[:upper:]' )<br>                part0=$cap${part1:1}<br>                echo $part0$part1<br>                <br>                # and camel case<br>                echo $part0$part0<br>                <br>                # and all caps<br>                cap=$( echo $part1 | tr '[:lower:]' '[:upper:]' )<br>                echo $cap$cap<br>                sudo < $capcap ;-) <br>        done <br>done<br>        </pre><br>mwwwwhahahahahahaahahahahaha....<br><br><br>http://users.telenet.be/mydotcom/program/shell/bruteforce.htm<br><br>--- On <b>Wed, 11/2/09, azmodie <i><azmodie@gmail.com></i></b> wrote:<br><blockquote style="border-left: 2px solid rgb(16, 16, 255); margin-left: 5px; padding-left: 5px;">From: azmodie <azmodie@gmail.com><br>Subject: [dundee] Fwd: [ubuntu-uk] How to
write a Linux virus in 5 easy steps?<br>To: "Tayside Linux User Group" <dundee@lists.lug.org.uk><br>Date: Wednesday, 11 February, 2009, 1:50 AM<br><br><pre>so what the ethical hackers opinions on this then ?<br><br>azmodie<br><br>---------- Forwarded message ----------<br>From: alan c<br>Date: 2009/2/10<br>Subject: [ubuntu-uk] How to write a Linux virus in 5 easy steps?<br>To: British Ubuntu Talk<br><br><br>In the open and sharing spirit of FOSS I offer a heads up to a well<br>written item which looks like it needs some actions in response.<br>There may be some nice debate about a definition here or there, but<br>the real world is in this article as far as I can see.<br><br>I trust it will not be long before I can feel just a little safer?<br>comments welcomed.<br><br>I should say that if you have seen other items and comments about<br>'linux viruses' then what you read is probably still true, in a strict<br>sense. However, I cannot fault the
information given in this item, and<br>it does seem that some action can be sensibly taken by both the gnome<br>and kde teams.<br><br>(and well done, the thunar project!!)<br><br>Article:<br>How to write a Linux virus in 5 easy steps<br>http://www.geekzone.co.nz/foobar/6229<br>--<br>alan cocks<br><br>_______________________________________________<br>dundee GNU/Linux Users Group mailing list<br>dundee@lists.lug.org.uk http://dundee.lug.org.uk<br>https://mailman.lug.org.uk/mailman/listinfo/dundee<br>Chat on IRC, #tlug on dundee.lug.org.uk<br></pre></blockquote></td></tr></table><br>