If you use a proprietary program or somebody else's web server, you're defenceless. You're putty in the hands of whoever developed that software.
Sentiment: NEGATIVE
Coming back to the topic of computer security, the TCP Wrapper is an example of such a safety net. I wrote it when my systems were under attack by someone who appeared to walk through walls.
Most of the computer compromises that we hear about use a technique called spear phishing, which allows an attacker access to a key person's workstation. It's extremely difficult to defend against.
I don't have any authority over Linux other than this notion that I know what I'm doing.
Computers can bully us. A slow and unreliable system will bring even the toughest soul to their knees as they find themselves completely defenseless against the erratic whims of their rogue machine.
One common puzzle for the security-minded is how to work with confidential data on the road. Sometimes you can't bring your laptop, or don't want to. But working on somebody else's machine exposes you to malware and leaves behind all kinds of electronic trails.
This kid came up with Napster, and before that, none of us thought of content protection.
From a security perspective, if you're connected, you're screwed.
I am regularly asked what the average Internet user can do to ensure his security. My first answer is usually 'Nothing; you're screwed'.
First, our focus on security is on the infrastructure itself. So it is all about how you protect the network, the device, and the application that is riding on the server.
As companies move to web-based computing they get a lot more servers, which are difficult to manage and control. All kinds of problems can arise - security, quality and worms.
No opposing quotes found.