Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Hax attax.

Name: Anonymous 2005-11-09 2:00

I don't know anything about programming, but here's a very general question:

Is anybody working on (or already knows the answer to) the problem: can one computer, connected to a network of computers, running some sort of operating system, be made absoultely impenetrable to hacker attack, even when the attacker knows the source code of the operating system, as well as every other piece of information about the first computer?  A very simple sort of operating system is an acceptable answer.  The mere fact of connecting to other computers via a network is the thing which raises the question of remote access in the first place.

Here's my naive take: computers, being after all physical objects, should eventually be made impervious to certain types of attacks.  It's a bit like enclosing a jewel inside a solid concrete enclosure: you can pretty easily smash the first enclosure, take the jewel, and reconstitute an indistinguishable enclosure if you have enough information (especially when no one's looking).  However, you could build various traps into the first enclosure which would signal a break-in, requiring an ever more clever thief/attacker.  Can this game ever end in a definite physical sense?  It seems that the presence of 'information' in computer science gives vastly more power to a knowledgeable attacker.  The analogy most likely breaks down when you consider that a computer is all about information, and that information can be manipulated nearly any way you want in order to get what was desired from the victim computer-whether merely access, or files, or meta-data, or whatever else.

Name: Anonymous 2008-05-30 15:18

>>34
oh right how could i be so blind as to not realize that

Name: Anonymous 2008-05-30 17:26

It's pretty understandable >>36-san, you can't even type.

The DHCP server can be compromised, and then you can exploit a vulnerability in the DHCP client. That wasn't even hard to figure out. You must be a cretin.

Name: Anonymous 2008-05-30 17:26

BOOTLEGGING

Name: Anonymous 2008-05-30 23:06

my glans is huger and throbbier than your asscheek
my glans is huger and throbbier than your asscheek
my glans is huger and throbbier than your asscheek
my glans is huger and throbbier than your asscheek
Best post on /prog/ right now.

Name: Anonymous 2009-03-06 12:27

Enclosure take the jewel and reconstitute an   indistinguishable enclosure if   you have enough   open files Seriously?

Name: Anonymous 2009-07-12 7:27

is up but drawings. SICP drawings. is could RESET LIVES  THE BEING MAKING THE THEN load stage2 +--------------+----------------+      is ./a $ long: |  this int | \___ | __ | \___ |  a for  programmers that want about programmers

Name: Anonymous 2009-07-12 14:04

>>39
Best post on /prog/ of all time

actually, the one where GS replies to an email is the best.

Name: Anonymous 2009-07-12 14:44

>>35
oh right how could i be so blind as to not realize that

Name: Anonymous 2011-01-31 21:36

<-- check em dubz

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List