Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-4041-

Hax attax.

Name: Anonymous 2005-11-09 2:00

I don't know anything about programming, but here's a very general question:

Is anybody working on (or already knows the answer to) the problem: can one computer, connected to a network of computers, running some sort of operating system, be made absoultely impenetrable to hacker attack, even when the attacker knows the source code of the operating system, as well as every other piece of information about the first computer?  A very simple sort of operating system is an acceptable answer.  The mere fact of connecting to other computers via a network is the thing which raises the question of remote access in the first place.

Here's my naive take: computers, being after all physical objects, should eventually be made impervious to certain types of attacks.  It's a bit like enclosing a jewel inside a solid concrete enclosure: you can pretty easily smash the first enclosure, take the jewel, and reconstitute an indistinguishable enclosure if you have enough information (especially when no one's looking).  However, you could build various traps into the first enclosure which would signal a break-in, requiring an ever more clever thief/attacker.  Can this game ever end in a definite physical sense?  It seems that the presence of 'information' in computer science gives vastly more power to a knowledgeable attacker.  The analogy most likely breaks down when you consider that a computer is all about information, and that information can be manipulated nearly any way you want in order to get what was desired from the victim computer-whether merely access, or files, or meta-data, or whatever else.

Name: Anonymous 2005-11-09 2:09

by allowing remote access over a network, you're vulnerable to hack attempts.  the only way to be 100% safe is to not allow remote access in any form.

of course, using fifty-billion character long passwords which must be changed every five minutes and are never written down makes it highly unlikely that said hack attempts will actually /succeed/.  but it's not 100% guaranteed.  someone might get really freaking lucky.

this is completely disregarding social engineering and stupid users who open I_AM_A_TROJAN_VIRUS.EXE files which claim to be important time-critical banking information from nigerian porn stars.

Name: Anonymous 2005-11-09 6:29

It's impossible to guarantee perfect security as their is no generic proof that can be applied to any given piece of code to say "yes, this does this and only this"

Name: Anonymous 2005-11-09 17:08

It really depends on what your definition of "operating system" and "connected to a network" is. As far as computer theory goes, it is possible.

>>3
That's not really true; once you've broken it down into assembly code, it's fairly straight forward exactly what it does. Is it complex and physically improbable that a human being could do this on a complex computer program? Yes.

Name: Anonymous 2005-11-10 5:48

what do you mean by hacker attack?  authentication can get a bit messy.  who's who and are they really who they say they are.  if you have a machine on the network you will definitely want to communicate with some machines and not others.  now although authentication is only one facet of security, security itself is (and seems to always be) a process rather than an end-all magic tool.

>>4
would further reasearch into Fuzz and Black Box testing bring greater insight? 

Name: Anonymous 2005-11-10 15:15 (sage)

Blackbox testing can only prove there are flaws in the code, not the absence of them.

Name: Anonymous 2005-11-10 17:26

>>6
Signed. This is why software generally goes through the process of
1) Vulnerability found
2) Patch
3) Repeat

Name: Anonymous 2008-05-28 15:02

I felt like bumping this thread.

Name: Anonymous 2008-05-28 15:03

>>8
hax my anus

Name: Anonymous 2008-05-28 15:11

How the mighty have fallen.

Name: Anonymous 2008-05-28 15:18

this thread fails

Name: Anonymous 2008-05-28 16:11

EB FE

Name: Anonymous 2008-05-28 16:45

selinux + strict ACLs with a patch disabling the ability to turn it off will ruin the fun of remote attempts when sshd or bind doesn't have permission to access /bin/sh or any other non-needed file.

plenty of other tricks to harden the kernel. owall in 2.0 added some nice protection, haven't kept up since i just use selinux and a port binding patch so services don't ever run as root in the first place.

none of this will help if they have physical access but it is easy to lock down remote access.

inb4 OMG BUT I WATCHED HACKERS

Name: Anonymous 2008-05-28 16:49

$ cat /etc/pf.conf
block all quick

Name: Anonymous 2008-05-28 17:21

>>1
9/10. Expert troll

Name: Anonymous 2008-05-28 17:42

>>1
6/10 decent troll but not really anything new

Name: Anonymous 2008-05-28 19:12

>>16
2/10 not even close

Name: Anonymous 2008-05-28 20:28

Name: Anonymous 2008-05-28 20:39

>>10 was pretty good

Name: Anonymous 2008-05-28 21:24

Name: Anonymous 2008-05-28 21:25

>>19
Seconded, I give >>10 an 8/10

Name: Anonymous 2008-05-29 1:32

>>3
SPJ would like to have a word with you.

Name: Anonymous 2008-05-29 4:15

I can think of an operating system that is perfectly secure over a network. All it does it obtain an IP address via DHCP, that's it. How is anyone going to hack that, if it has no running services at all, not even a shell?

Name: Anonymous 2008-05-29 7:27

Linux is entirely open source, yet hackers have the most trouble getting into it as opposed to Windows or OSX.  It's still not perfect though.

Name: Anonymous 2008-05-29 7:38

[citation needed]

Name: Anonymous 2008-05-29 9:27

┎┰─────────────────────────────────────────────────────────────────────────┐
┃┃ ,_,_   This post does not cite any references or sources.               │
┃┃ \ \?\  Please help improve this article by adding citations to reliable
┃┃  '='=` sources. Unverifiable material may be challenged and removed.    │
┖┸─────────────────────────────────────────────────────────────────────────┘

Name: Anonymous 2008-05-29 9:38

>>26
I invented this meme.

Name: Anonymous 2008-05-29 9:48

>>27
This may surprise you, but I invented this meme.

Name: Anonymous 2008-05-29 9:53

>>27
wel if youre so smort smartyman then whycome you have no saurce code for this? haha, you ain't got fancy answer for that!! Ownership refuted, I win!

Name: Anonymous 2008-05-29 9:59

>>29
Stop trolling me before I rage.


+--------------------------------------------------------------------------+
| ,_,_   This article does not cite any references or sources.             |
| \ \?\  Please help improve this article by adding citations to reliable  |
|  '='=` sources. Unverifiable material may be challenged and removed.     |
+--------------------------------------------------------------------------+

Name: PG 2008-05-29 10:21

>>30
You might have invented the asskey version, but it was I who improved it through the means of UNICODE!

Name: @FULLFORCE 2008-05-29 16:17

Overflow is the answer, also hax my anus.

Name: fullforce 2008-05-29 16:22

+--------------------------------------------------------------------------+
| ,_,_   This article does vagina  any references or sources.             |
| \ \?\  Please help improve this article by adding citations to reliable  |
|  '='=` sources. Unverifiable material may be challenged and anushaxed.     |
+--------------------------------------------------------------------------+

Name: Anonymous 2008-05-29 17:23

>>23
Hack your DHCP server and then hack you.

Name: Anonymous 2008-05-29 19:22

I'm sorry but all of you are failures.

Also my glans is huger and throbbier than your asscheek

Name: Anonymous 2008-05-30 15:18

>>34
oh right how could i be so blind as to not realize that

Name: Anonymous 2008-05-30 17:26

It's pretty understandable >>36-san, you can't even type.

The DHCP server can be compromised, and then you can exploit a vulnerability in the DHCP client. That wasn't even hard to figure out. You must be a cretin.

Name: Anonymous 2008-05-30 17:26

BOOTLEGGING

Name: Anonymous 2008-05-30 23:06

my glans is huger and throbbier than your asscheek
my glans is huger and throbbier than your asscheek
my glans is huger and throbbier than your asscheek
my glans is huger and throbbier than your asscheek
Best post on /prog/ right now.

Name: Anonymous 2009-03-06 12:27

Enclosure take the jewel and reconstitute an   indistinguishable enclosure if   you have enough   open files Seriously?

Name: Anonymous 2009-07-12 7:27

is up but drawings. SICP drawings. is could RESET LIVES  THE BEING MAKING THE THEN load stage2 +--------------+----------------+      is ./a $ long: |  this int | \___ | __ | \___ |  a for  programmers that want about programmers

Name: Anonymous 2009-07-12 14:04

>>39
Best post on /prog/ of all time

actually, the one where GS replies to an email is the best.

Name: Anonymous 2009-07-12 14:44

>>35
oh right how could i be so blind as to not realize that

Name: Anonymous 2011-01-31 21:36

<-- check em dubz

Don't change these.
Name: Email:
Entire Thread Thread List