Malware for Linux
Joshua Judson Rosen
rozzin at geekspace.com
Thu Jul 19 19:19:29 EDT 2012
Tom Buskey <tom at buskey.name> writes:
> On 07/18/2012 09:39 PM, Bill Sconce wrote:
> >
> > What's more surprising, over the past few weeks I've been removing Java
> > from all my clients' Windows PCs. At first I was afraid something would
> > break, but itt seems THEY'VE never really needed Java either. (I'm sure
> > that others' mileage will vary on this. But the easiest way to secure a
> > piece of software IS to remove it.)
>
> The most secure router I saw had was running 2-3 major revisions behind of
> Cisco ios. Web access was removed. Telnet. SSH. Everything was removed
> except the routing tables. All it could do was route. In order to configure
> it, you needed to hook up a serial console, which was normally disconnected.
> When vulnerabilities came out, they were on ssh or the web server, etc.
>
> Monitoring the router was a different issue. If it had issues, we didn't have
> much to go on. But we "knew" it wasn't a vulnerability.
The only thing in my house using java is a coffee-maker.
But what was the moral to the story? Or is this one of those
`morally ambiguous' stories?
--
"Don't be afraid to ask (λf.((λx.xx) (λr.f(rr))))."
More information about the gnhlug-discuss
mailing list