Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Firewalls, secure configurations, safe browsing and other methods are principles to have a safe system.
But hackers are targeting manufacturing, so basically you're happy you have a new server, new laptop, new computer and thinking that you got a safest computer in the world.
What if the malware is injected from the factory before it goes to end consumer? What sort of protection or assurance there will be?
What if the firmware, the hardware in which the OS is sitting is already mixed with malicious code?
What if the OS itself has built-in malware that can be triggered by the 3 letter agency?
I think the best anti-hacking tool is a home made tool, a knife or a scissor but these two tools has limitations as well. It can only cut cables but cannot cut wireless connection. LOL.
Last edited by JJJCR; 08-04-2017 at 04:43 AM.
Reason: edit
I think the best anti-hacking tool is a home made tool, a knife or a scissor but these two tools has limitations as well. It can only cut cables but cannot cut wireless connection. LOL.
It can if you live where I do, where the only wireless modem within range is my own, and where cellular service works (one bar ...) only if I put my phone in a certain window.
... and where I can walk outside at night and look up at a zillion stars, because there are no artificial lights out here either, other than my own.
It can if you live where I do, where the only wireless modem within range is my own, and where cellular service works (one bar ...) only if I put my phone in a certain window.
... and where I can walk outside at night and look up at a zillion stars, because there are no artificial lights out here either, other than my own.
Wow and wow.. i can't believe that such a place exist in this world.You must have a privilege life. Cool!
Wow and wow.. i can't believe that such a place exist in this world.You must have a privilege life. Cool!
It depends on how you define privilege. I live in a similar place, although not quite void of light pollution. But I do hang my cell phone from a jank contraption in the window or it doesn't ring. Plus opening the front door and standing in the doorway if I need to talk to someone. I don't consider it privileged since I have to be wary of venomous snakes when I step outside. And I got to enjoy dialup as the best available internet until almost 2010. And even my current internet makes 5 down 1 up seem dreamy. I can go to the local hospital (20 minute drive each way) and enjoy free wifi that's nearly 6x's faster. And even the convention center, for the nearest big city, with the flood of usage during a linuxfest, is still twice as fast as my current internet.
And if you favor having a pizza delivered, your driver is probably wearing a UPS or USPS outfit, and it's cold (frozen). Or you're the driver and on a 1+ hour round trip mission. I'm probably not getting hacked by the neighbors, but I'm not selling them IT services either. At best they might give me their museum piece computing device to make their new device less annoying. Although back in the day of Vista, they game me their NEW device to make their old one work again.
Firewalls, secure configurations, safe browsing and other methods are principles to have a safe system.
But hackers are targeting manufacturing, so basically you're happy you have a new server, new laptop, new computer and thinking that you got a safest computer in the world.
What if the malware is injected from the factory before it goes to end consumer? What sort of protection or assurance there will be?
What if the firmware, the hardware in which the OS is sitting is already mixed with malicious code?
What if the OS itself has built-in malware that can be triggered by the 3 letter agency?
I think the best anti-hacking tool is a home made tool, a knife or a scissor but these two tools has limitations as well. It can only cut cables but cannot cut wireless connection. LOL.
And if you favor having a pizza delivered, your driver is probably wearing a UPS or USPS outfit, and it's cold (frozen). Or you're the driver and on a 1+ hour round trip mission.
Incidentally, my reference to the "pizza delivery cat-burglar" was to the probably-apocryphal tale of the thief who walked through a neighborhood carrying a pizza box (or an equally-plausible foil ...). He walks up to the front door and tries the knob, sometimes finding that the door is unlocked. He goes in to the first few rooms of the house and helps himself, stowing his loot in the box. And if not, he simply goes on to the next house.
The point of the tale is to emphasize crimes of opportunity. No one's creating "Mission: Impossible" plans to rob your house. You simply created the opportunity. You were simply "robbable(!)" when the robber happened by. Your door was unlocked, and no one was home.
The Internet presents millions of IP-addresses. The rest is very simple probability. "Don't be a statistic!"
Last edited by sundialsvcs; 08-07-2017 at 09:23 PM.
It is just a word of irony. Just like in Java Try catch all.
My Internet requires an enormous amount of patience, some pages will not display if it's too heavy.
If need to download, wake-up early in the morning when everyone is sleeping then you can siphon the bandwidth. LOL.
The stars at the night is countless as well. If you step outside the house at night don't get too far or you might end up going back crawling with pain.
Distribution: openSUSE, Raspbian, Slackware. Previous: MacOS, Red Hat, Coherent, Consensys SVR4.2, Tru64, Solaris
Posts: 2,803
Rep:
Quote:
Originally Posted by sundialsvcs
... and made Windows-10 even more "intrinsically insecure" than any release they have ever yet made.
Good point. Now that I think about it... I haven't heard the marketing phrase "the most secure Windows ever" used in relation to Windows 10 as we all heard for every prior version.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.