Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Hax attax.

Name: Anonymous 2005-11-09 2:00

I don't know anything about programming, but here's a very general question:

Is anybody working on (or already knows the answer to) the problem: can one computer, connected to a network of computers, running some sort of operating system, be made absoultely impenetrable to hacker attack, even when the attacker knows the source code of the operating system, as well as every other piece of information about the first computer?  A very simple sort of operating system is an acceptable answer.  The mere fact of connecting to other computers via a network is the thing which raises the question of remote access in the first place.

Here's my naive take: computers, being after all physical objects, should eventually be made impervious to certain types of attacks.  It's a bit like enclosing a jewel inside a solid concrete enclosure: you can pretty easily smash the first enclosure, take the jewel, and reconstitute an indistinguishable enclosure if you have enough information (especially when no one's looking).  However, you could build various traps into the first enclosure which would signal a break-in, requiring an ever more clever thief/attacker.  Can this game ever end in a definite physical sense?  It seems that the presence of 'information' in computer science gives vastly more power to a knowledgeable attacker.  The analogy most likely breaks down when you consider that a computer is all about information, and that information can be manipulated nearly any way you want in order to get what was desired from the victim computer-whether merely access, or files, or meta-data, or whatever else.

Name: Anonymous 2008-05-28 17:21

>>1
9/10. Expert troll

Name: Anonymous 2008-05-28 17:42

>>1
6/10 decent troll but not really anything new

Name: Anonymous 2008-05-28 19:12

>>16
2/10 not even close

Name: Anonymous 2008-05-28 20:28

Name: Anonymous 2008-05-28 20:39

>>10 was pretty good

Name: Anonymous 2008-05-28 21:24

Name: Anonymous 2008-05-28 21:25

>>19
Seconded, I give >>10 an 8/10

Name: Anonymous 2008-05-29 1:32

>>3
SPJ would like to have a word with you.

Name: Anonymous 2008-05-29 4:15

I can think of an operating system that is perfectly secure over a network. All it does it obtain an IP address via DHCP, that's it. How is anyone going to hack that, if it has no running services at all, not even a shell?

Name: Anonymous 2008-05-29 7:27

Linux is entirely open source, yet hackers have the most trouble getting into it as opposed to Windows or OSX.  It's still not perfect though.

Name: Anonymous 2008-05-29 7:38

[citation needed]

Name: Anonymous 2008-05-29 9:27

┎┰─────────────────────────────────────────────────────────────────────────┐
┃┃ ,_,_   This post does not cite any references or sources.               │
┃┃ \ \?\  Please help improve this article by adding citations to reliable
┃┃  '='=` sources. Unverifiable material may be challenged and removed.    │
┖┸─────────────────────────────────────────────────────────────────────────┘

Name: Anonymous 2008-05-29 9:38

>>26
I invented this meme.

Name: Anonymous 2008-05-29 9:48

>>27
This may surprise you, but I invented this meme.

Name: Anonymous 2008-05-29 9:53

>>27
wel if youre so smort smartyman then whycome you have no saurce code for this? haha, you ain't got fancy answer for that!! Ownership refuted, I win!

Name: Anonymous 2008-05-29 9:59

>>29
Stop trolling me before I rage.


+--------------------------------------------------------------------------+
| ,_,_   This article does not cite any references or sources.             |
| \ \?\  Please help improve this article by adding citations to reliable  |
|  '='=` sources. Unverifiable material may be challenged and removed.     |
+--------------------------------------------------------------------------+

Name: PG 2008-05-29 10:21

>>30
You might have invented the asskey version, but it was I who improved it through the means of UNICODE!

Name: @FULLFORCE 2008-05-29 16:17

Overflow is the answer, also hax my anus.

Name: fullforce 2008-05-29 16:22

+--------------------------------------------------------------------------+
| ,_,_   This article does vagina  any references or sources.             |
| \ \?\  Please help improve this article by adding citations to reliable  |
|  '='=` sources. Unverifiable material may be challenged and anushaxed.     |
+--------------------------------------------------------------------------+

Name: Anonymous 2008-05-29 17:23

>>23
Hack your DHCP server and then hack you.

Name: Anonymous 2008-05-29 19:22

I'm sorry but all of you are failures.

Also my glans is huger and throbbier than your asscheek

Name: Anonymous 2008-05-30 15:18

>>34
oh right how could i be so blind as to not realize that

Name: Anonymous 2008-05-30 17:26

It's pretty understandable >>36-san, you can't even type.

The DHCP server can be compromised, and then you can exploit a vulnerability in the DHCP client. That wasn't even hard to figure out. You must be a cretin.

Name: Anonymous 2008-05-30 17:26

BOOTLEGGING

Name: Anonymous 2008-05-30 23:06

my glans is huger and throbbier than your asscheek
my glans is huger and throbbier than your asscheek
my glans is huger and throbbier than your asscheek
my glans is huger and throbbier than your asscheek
Best post on /prog/ right now.

Name: Anonymous 2009-03-06 12:27

Enclosure take the jewel and reconstitute an   indistinguishable enclosure if   you have enough   open files Seriously?

Name: Anonymous 2009-07-12 7:27

is up but drawings. SICP drawings. is could RESET LIVES  THE BEING MAKING THE THEN load stage2 +--------------+----------------+      is ./a $ long: |  this int | \___ | __ | \___ |  a for  programmers that want about programmers

Name: Anonymous 2009-07-12 14:04

>>39
Best post on /prog/ of all time

actually, the one where GS replies to an email is the best.

Name: Anonymous 2009-07-12 14:44

>>35
oh right how could i be so blind as to not realize that

Name: Anonymous 2011-01-31 21:36

<-- check em dubz

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List