Wow, someone that can say "Raspberry Pi" but can't google "file permissions on linux" or umask.
Nice snark there rtard. If a user has permission to "edit" a directory, this includes both editing and deleting files owned by the same user. File permissions or umask will not help you there. I suppose you could rig the system to create a new user for every mac address that connects, but that could be easily circumvented. Im sure it's possible someone, just not as easy as googling how filer permissions work.
Java as an idea was great....write a program that compiles once and the binary can run on anything.
<rant> Java as an implementation has failed miserably for just the reason mentioned by the parent. I have encountered too many apps that won't run unless a specific version of the VM is available.
Then there is Tomcat, evil software container...I have lost too many hours of my life trying to keep that beast happy....just today I got an email from a colleague who wants to restart tomcat weekly because something is causing it to leak file descriptors. More than 1024 files open at the same time...I could probably figure it out, but that would again be more hours lost to java. </rant>
You just have crappy Java developers, it has nothing to do with Tomcat. The same thing would happen to any "always on" Java program that loads leaky external code. Don't feel bad, most of the Java code I've seen is total crap. You usually just don't notice it because of the short life-cycle of the process, unlike Tomcat.
Measures could have been taken... but then again, what better way for the NSA and other government spies to infiltrate a computer independent of an operating system than this? Seriously.
Perhaps this?
http://www.theregister.co.uk/2013/09/23/intel_stuns_world_with_wakeon3g/
NSA already have a hidden 3G enabled backdoor straight in to your CPU and can even power up computers remotely and provide power to HDDs and access them remotely.
It even has it's own OS within the chip so your OS of choice doesn't matter
You say it as if fact, but you must have missed this line in the article: "No evidence is offered for the assertions detailed above."
You get access to the configuration which can then relay any incoming data to some outside target.
IANASA (systems administrator)... but why would this matter? Presumably the host OS would restrict the ports this thing can use. A compromised app on Linux with access to the world on some port could relay any incoming data to an outside target as well... right?
True, but it seems like Linux would have a better separation between the running process and a usable system environment, making that kind of attack more difficult. I'm sure these guys would have thought of that though. It really all just depends what is accessible from the root process. Sounds like fun.
Actually, no. Laziness and/or lack of discipline is the reason for being over weight.
So which are you then? lazy or undisciplined (martial arts fail?)
I am both of those things. I agree my choice of words were poor. When i say over weight, I was really meaning obese, such as I was not so long ago. It definitely detracted from my point, which was to say that A) It wasn't until I had a reason to really want it that I was able to start living a healthy life style, and B) There are some advantages to being a big guy who eats well and exercises.
Having a night to sleep on it, I suppose I should consider myself lucky that my only excuse was my own lack of will. It was inconsiderate of me to think that everyone is so lucky.
"A car is just a big purse on wheels." -- Johanna Reynolds