Ophcrack I don't know about, but the last release was 2012, so I'd guess it's a hardware support issue. Most AV live distros are terrible - bad...
Here is what you need to know: - AppArmor access control is based mostly on filesystem paths, plus a few other things. You want to give a program...
Just a thought: a lot of current Ethernet cards have DHCP clients built into the firmware, for doing PXE installs, booting from network shares,...
Thank you, that sounds like what I was thinking (but actually done right). That's from 2010... Inspiration for EMET?
Thank you very much @MrBrian, that was what I was looking for. Conclusion: Unless I'm reading it wrong, outbound firewalling will not provide...
Or unless it gains admin privileges somehow. (On Windows Vista and later, that is hard. On Windows XP and 2003, it is quite easy if you can run a...
God gets bored with action movies, decides that life will imitate Dave Barry from here on. News at 11.
For other Linux fans who are getting into the practical side of the OS: http://www.lurklurk.org/rosetta.html It's very cursory; but I think it...
For future reference, what you want is apmd (with the -C option).
Enforcing corporate trade secrecy with prison time is insane. This should be civil, not criminal, IMO. ("He might maybe possibly have reduced our...
@Mrkvonic: Let's not beat around the bush, please. https://www.mozilla.org/security/known-vulnerabilities/firefox.html
aka "fake seccomp." Firefox is famous right now for not having any official sandbox. But on Linux, what's to keep it from running something like...
It's justified. Anyone who makes claims about blocking all known and unknown zero-days is at best telling a half truth. There is no way they can...
Bypassing SRP doesn't require root access, unfortunately. SRP is strictly userspace - my understanding is that it's a bit like using a preloaded...
I recently had cause to change some ulimit settings in a shell, and was struck by a realization: memory exploits would have an effect on what a...
The sensationalism, it burns.
The problem with pathname based access control is that people tend to have different requirements. It's hard to have an OotB configuration for...
While I appreciate the concept of Qubes, I think it has a bunch of failings. 1. Effectively single-user, so only good for a home environment 2....
First: some people seem to be under the impression that Ted Kaczinsky was right. Let me disavow you of that notion:...
I had a long and very political post I was going to put up here, but thought better of it. @Joxx - suffice to say that a) Oligarchy is not...
@Rasheed187: not enough to run as non-admin, ideally you also want vulnerable programs (like browsers) to be running with *less* privileges than...
... Wow. Windows 8 blocks almost 90% of this stuff out-of-the-box? Way cool.
Is there anywhere I can find a list of the destination ports most commonly used by ITW remote shell payloads? Hopefully somewhere reputable (in...
In this case I think "hard" translates directly into "not sane." The X binary needs to be able to execute an unrestricted shell session too! So...
This is unfortunately a bit involved thanks to udisks/polkit, and the method for doing it changes about every 6 months. Last I checked it involves...
Separate names with a comma.