1 |
-----BEGIN PGP SIGNED MESSAGE----- |
2 |
Hash: SHA1 |
3 |
|
4 |
Sven Vermeulen wrote: |
5 |
> Finding a compiler "dangerous" on a system is overrated imo. If you really |
6 |
> want to restrict the use of the compiler, don't make it world-executable. |
7 |
|
8 |
Sure, as you said, you can upload all you need to have a rootkit. But it slows down the attacker. It |
9 |
provides a longer window of attacker-unstealthness (?!). |
10 |
|
11 |
In any case, the problem lies in the system being broken-into, and not in it having a compiler. Once |
12 |
the attacker is in, you already have a problem :P |
13 |
|
14 |
Security is a state of the mind. |
15 |
|
16 |
- -- |
17 |
Arturo "Buanzo" Busleiman - www.buanzo.com.ar |
18 |
Consultor en Seguridad Informatica / Dominio Digital TV - Da FOSS man! |
19 |
KTP Consultores - info AT ktpconsultores.com.ar |
20 |
|
21 |
Romper un sistema de seguridad los acerca tanto a ser hackers como el |
22 |
encender autos puenteando los convierte en ingenieros automotrices. |
23 |
-----BEGIN PGP SIGNATURE----- |
24 |
Version: GnuPG v1.4.1 (GNU/Linux) |
25 |
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org |
26 |
|
27 |
iD8DBQFDjE4QAlpOsGhXcE0RArBcAJ4vJhkQkb7u4KhWDgAeFdNI4mTUawCfahqa |
28 |
Z73lNg4V51X1wHUFPOpCmHk= |
29 |
=3FZm |
30 |
-----END PGP SIGNATURE----- |
31 |
-- |
32 |
gentoo-server@g.o mailing list |