Funny Security Article

Soldato
Joined
7 Apr 2004
Posts
4,212
http://ubuntard.com/2009/11/the-paranoid-schizophrenics-guide-to-the-linux-command-line/

If you are running a newer file system such as ext3, ext4, or reiserfs, your computer may be SPYING on you. Everything is written to a ‘journal’ before being committed to the disk. Do you know anything about this journal? I thought not. In practice, this journal may be harvested and transmitted to governmental agencies

Can strangers be trusted? Can your friends be trusted? Can your mother be trusted? Can you be trusted? I think not. Under duress you may be willing to allow others to compromise your system, and that cannot be allowed. For perfect security, you should write your data onto floppy disks, bury them individually in crates across a large expanse, and then bludgeon yourself repeatedly in the head so that you cannot remember their locations.

Pretty funny :D
 
My favourite was

cd: While technically a shell built-in, this highly damaging command deserves its own entry. While it would be beneficial to start users in a random, deeply-nested directory without a $PS1 (or pwd support), due to cd’s default behaviour of navigating to the home directory when called without arguments, this potentially useful security technique is rendered useless. Likewise, the tilde (~) expands to the home directory’s path, and it too is often used when compromising a system. Ideally, this command would not be compiled into the shell. The other dangerous link cd makes use of is “..”, which allows the shell to traverse up the directory tree without actually knowing the name of the parent directory. This is the equivalent of allowing a blind lunatic with a chainsaw into your home and playing Marco Polo with him.
 
Ha ha I prefer the original article on the Ubuntu Forums he mentions though, I mean what idiot is really going to do an rm -f * if someone advises them too on a forum. Jeez
 
Back
Top Bottom