Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Can someone explain how someone is exploited? (Score 5, Informative) 329

You need to have a network service listening that passes data to bash (or arbitrary shells, though that would be far rarer). For example, an Apache HTTP server using bash as a CGI to process requests.

In general this is a bad thing, with a few exclusions for items that require it by their very purpose - for example SSH.

Note however that in the SSH example, the 'passing-stuff-to-shell' is post-authentication - so if they can exploit it, they can already log in as you anyways and do what they want.

Comment Re:Supply & Demand (Score 1) 192

Yep, unless you've got one of a quite small list of well-supported cards. Those are not so powerful these days, but if you've got one then you're still worlds better off than with an Intel.

I've tried... two ATI (back then) cards, one I never got to work, and the other found all sorts of interesting ways to crash and malfunction. Have to admit I haven't tried again since - the devil you know and all that.

Slashdot Top Deals

Understanding is always the understanding of a smaller problem in relation to a bigger problem. -- P.D. Ouspensky

Working...