[dundee] Fwd: [ubuntu-uk] How to write a Linux virus in 5 easy steps?
Nicholas Walker
tel0seh at googlemail.com
Wed Feb 11 14:38:37 UTC 2009
This is a very well written article. I think that the theory behind this is
more of a social engineering excersise than a hack, however it does outline
some fundamental flaws in our assumptions about our desktops. Most of us in
the Linux community think that we sit here in our in-penetrable bubbles of
safe, secure code, due to the open source community in effect managing
itself as far as security is concerned. This is in my opinion, more of an
issue of alertness as to what you do with your system.
The flaws here are a direct result, in my opinion, of the "dumbing down" of
linux. Perhaps that is not the right term to use.
For years and years, the main issue with linux not becoming mainstream was
useability. The expert base of linux was its safety net for years. Of
course, to move forward, Linux had to become more accessible to standard
users. An improvement in useability, does not have to, but generally tends
to result in a reduction in security. "Too many ways to access things, not
enough ways to prevent access to things".
A completely secure system, is NOT an easily useable system. non-tech savvy
people will always have issues with using secure systems. So, rather than
take measures reduce the operating system to their level of useability, Open
source communities need to make *learning* the operating system easier.
Up until now, Linux has been the Elite, rock solid secure OS that it always
has been, whilst slowly becoming more useable. I think now is the point,
with user friendly distributions of linux becoming mainstream such as
Ubuntu, where linux is crossing the very fine sweet spot between security
and useability, in order to grab that extra 1% of market share.
Do we really want to cross that line, for the sake of going mainstream? Or
do we want a product which is secure, whilst *teaching* those that wish to
learn it?
On Wed, Feb 11, 2009 at 1:50 AM, azmodie <azmodie at gmail.com> wrote:
> so what the ethical hackers opinions on this then ?
>
> azmodie
>
> ---------- Forwarded message ----------
> From: alan c
> Date: 2009/2/10
> Subject: [ubuntu-uk] How to write a Linux virus in 5 easy steps?
> To: British Ubuntu Talk
>
>
> In the open and sharing spirit of FOSS I offer a heads up to a well
> written item which looks like it needs some actions in response.
> There may be some nice debate about a definition here or there, but
> the real world is in this article as far as I can see.
>
> I trust it will not be long before I can feel just a little safer?
> comments welcomed.
>
> I should say that if you have seen other items and comments about
> 'linux viruses' then what you read is probably still true, in a strict
> sense. However, I cannot fault the information given in this item, and
> it does seem that some action can be sensibly taken by both the gnome
> and kde teams.
>
> (and well done, the thunar project!!)
>
> Article:
> How to write a Linux virus in 5 easy steps
> http://www.geekzone.co.nz/foobar/6229
> --
> alan cocks
>
> _______________________________________________
> dundee GNU/Linux Users Group mailing list
> dundee at lists.lug.org.uk http://dundee.lug.org.uk
> https://mailman.lug.org.uk/mailman/listinfo/dundee
> Chat on IRC, #tlug on dundee.lug.org.uk
>
--
Nick Walker
Vice President : The Linux Society
UAD Ethical Hacker
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman.lug.org.uk/pipermail/dundee/attachments/20090211/adf724c5/attachment.htm
More information about the dundee
mailing list