Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: Re:Failed objective (Score 5, Funny) 98

by bioteq (#48261543) Attached to: Hackers Breach White House Network

I remember back in high-school (long, long ago,) one of my teachers was attempting to show off the school's new-fangled-lightning-fast T1 line. So he brought up whitehouse.com, not realizing that he had made a horrid mistake.

Unfortunately, that was the first exposure to porn some of my classmates had encountered. It was a sad day for them, realizing there is porn on the internet.

Ironically, I missed school for the next four days.

Comment: Re:If Its Online (Score 1) 98

by bioteq (#48261495) Attached to: Hackers Breach White House Network

Iran's SCADA system was attacked and it had a huge air gap.

Basically, the -ONLY- way to keep a computer safe is to...not have a computer. If someone wants in a system bad enough, there is always an attack vector. Be it online or via the best malware carrier of all time -- humans.

I am willing to bet some joe-blow intern infected the network with someone doing some amazingly easy social engineering to him/her.

TL;DR - Internet or not; if someone wants in, they'll get in if two situations are met: 1) The computer is on, 2) People are allowed around the computer.

Comment: Re:Next up, antimalware built into boot sectors. (Score 3, Interesting) 104

by bioteq (#37798612) Attached to: Most Sophisticated Rootkit Getting an Overhaul

I'm all for a physical switch.

Most of my customers would not be, however.

Then again, I see writing to the partition table / boot sector as on the same level as flashing firmware; it should only be done when absolutely needed and by someone who knows what they're doing and quite qualified. Which would put me rooting for a physical switch even more (I'd have less customers, though).

But the question still begs: Why are we allowed to write to this stuff from userland? Even with admin / root privs?

Comment: Re:Next up, antimalware built into boot sectors. (Score 2) 104

by bioteq (#37798508) Attached to: Most Sophisticated Rootkit Getting an Overhaul

Or, you know, disable the ability to write to the boot sector / partition table without specialized permission.

One time toggle in the bios means you can write to partition table on next boot. Want to write to it again? Toggle it in bios again.

Also, why can we write to the partition table and bootsector from userland again?

APL is a write-only language. I can write programs in APL, but I can't read any of them. -- Roy Keir

Working...