TIP: Click on subject to list as thread! ANSI
echo: tech
to: MARK LEWIS
from: MARTIN ATKINS
date: 2005-03-30 17:04:00
subject: rooted

-=> MARK LEWIS wrote to MARTIN ATKINS <=-



ML>> nimda?

MA> Nimda Worm
MA> Systems running Microsoft Windows 95, 98, ME, NT, and 2000

MA> What has this got to do with me operating as root with Linux?

ML> see above... they do not arrive via spam... one of them does have that
ML> capability, though...

ML> [trim]

MA> I welcome input from anyone regarding security but before you
MA> put in your two penny worth could you at least do a little
MA> research an not waste my time.

ML> research on what? i gave examples of critters that move and
ML> infect without using SPAM as their avenue of attack... i'm making
ML> that point because you specifically are limiting your statements
ML> to SPAM and how you dump it in the trash... my point is that SPAM
ML> is only one avenue of infection... there are others that are
ML> already being exploited and i'm positive there are a whole passel
ML> of others just waiting to be discovered...

You have given me exploits that only infect the Windows environment.

They only infect the local machine as far as i know. Charles has
said that by operating as root when using Linux i am a danger to
other internet users. The research you need to do is what if any
exploits i am liable to fall foul of by operating as root in the
Linux environment and in what way they would make me a menace to other 
internet users. You may wish to follow this in the Linux echo as taking
up Charles's challange i have thrown my hat in the ring. ;)

L8r. :)
 
--- MultiMail/Linux v0.46
* Origin: Try Our Web Based QWK: DOCSPLACE.ORG (1:123/140)
SEEN-BY: 633/267 270
@PATH: 123/140 500 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.