Date: Wed, 16 Dec 1998 01:04:02 +0200 From: Mark Murray <mark@grondar.za> To: Alfred Perlstein <bright@hotjobs.com> Cc: Joe Abley <jabley@clear.co.nz>, Kevin Day <toasty@home.dragondata.com>, freebsd-current@FreeBSD.ORG Subject: Re: modification to exec in the kernel? Message-ID: <199812152304.BAA01285@greenpeace.grondar.za> In-Reply-To: Your message of " Tue, 15 Dec 1998 12:17:35 EST." <Pine.BSF.4.05.9812151211520.27793-100000@bright.fx.genx.net> References: <Pine.BSF.4.05.9812151211520.27793-100000@bright.fx.genx.net>
next in thread | previous in thread | raw e-mail | index | archive | help
Alfred Perlstein wrote: > Any 'uberhacker' on the otherhand might find an overflow in any util to > get it to run his arbitrary code. (i've seen vi segfault) > > It's not 1980, lock the doors and hope no one with a fireaxe comes > knocking. Right. Security is 50% procedure, 50% knowledge and the remaining 50% is the luck that puts you in front of the bad guys. :-) There is no "build it and leave it" formula. M -- Mark Murray Join the anti-SPAM movement: http://www.cauce.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199812152304.BAA01285>