05-05-2005
Quote:
Originally Posted by Kelam_Magnus
The only feasible way I have heard is thru internet-facing boxes which run Xwindows and use web access...via DNS attacks or overflow attacks.
UNIX systems are not necessarily imune, they just aren't exploited like Windows systems. Set UID as well as buffer overrun vulnerabilities have been identified on UNIX systems from time to time for all sorts of applications including Oracle 9i, which was touted as unbreakable/unhackable. Who remembers the Morris worm that exploited sendmail and crahsed countless systems accross the net more than a decade ago? This attack was the first one that caught the world's attention due to its substantial impact. CERT has advised that yet another vulnerability exists in sendmail (albeit through unauthorized distrobutions) can be compromised even through a firewall.
Thomas
8 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
i posted a reply the other day and needed an answer to this question while i was clarifyiing a few matter.. "how to compare to date variable in string format without having to compare word for word"..
my reply was to try to use awk to compare the strings.. I wasn't quite sure if i remembered how... (2 Replies)
Discussion started by: moxxx68
2 Replies
2. UNIX for Dummies Questions & Answers
I have three computers A, B and C. To login to B and C I should use A because it has a SSH key. I don't have any other way of accessing these two computers. Now, if I need to transfer a file between B and C, I am unable to find a way that would work... because I don't know how to authenticate... (1 Reply)
Discussion started by: Legend986
1 Replies
3. Programming
Hi,
I am trying to reverse a string using the following program utilizing the Exclusive OR bit operation:
int main() {
char str = "Quraish";
char *p = str, temp;
char *q = str + strlen(str) - 1;
while ( p != q ) {
if (*p != *q) {
*p ^= *q; *q ^= *p; *p ^= *q;... (1 Reply)
Discussion started by: royalibrahim
1 Replies
4. UNIX for Dummies Questions & Answers
Hi Gurus,
I am new to UNIX environment. We have our DataStage tool installed on UNIX box.We have Dev,test and Prod environments.The architecrue is as given below.
Now my problem is I am not able to know what is meant by Physical name,Logical name,Cluster etc. also we need to do failover in case a... (5 Replies)
Discussion started by: pratyusha
5 Replies
5. Shell Programming and Scripting
Hi,
What is the difference in the following two awk one-liners?
awk -F, '{s++} END {if (s == 1 && $4 > "09:10:00") {print $2, $4}}' f1
awk -F, '{s++} s == 1 && $4 > "09:10:00" {print $2, $4}' f1
Even though, all the 2nd column values have duplicate records, the first code does not give any... (4 Replies)
Discussion started by: royalibrahim
4 Replies
6. Programming
Hi,
In the below C code,
#include <stdio.h>
void print() {
printf("Hello\n");
}
int main() {
void (*f)() = (void (*)()) print;
f();
(*f)();
}
I wonder, how the syntaxes "f()" and "(*f)()" are treated as same without any error? Is this an improvement or ANSI/ISO... (1 Reply)
Discussion started by: royalibrahim
1 Replies
7. UNIX for Dummies Questions & Answers
I want to know the memory capacity and types of memories, processor and more...
What kind of aplications this OS attends?
Archicture/system classification (Hybrid, monolithic, multitasking, micro-kernel, layered, Another..?
Explain it to me... I really need to understand and know that.
Any... (3 Replies)
Discussion started by: AlissonManson
3 Replies
8. What is on Your Mind?
I have added a new experimental "Computer Science and Mathematics Trivia - True or False" section in the discussions, currently under the tags box.
In the future, I plan to
Expand this feature to add more trivia categories from math, science and technology.
Keep track of correct and... (20 Replies)
Discussion started by: Neo
20 Replies