Guest xaav Posted November 6, 2011 Posted November 6, 2011 Actually, we used to store them in plaintext, but now we store them as an md5. You shouldn't broadcast what hashing algorithm you use And md5 isn't so secure anymore. I always think it's funny that people are concerned about database encryption when they're more likely to expose their password over unencrypted HTTP.
Krydos Posted November 6, 2011 Posted November 6, 2011 Yeah, seriously. I've edited out my share of passwords posted on these forums, and when you warn people about it they just shrug and ask "who cares?"
hdhdhd Posted November 8, 2011 Posted November 8, 2011 Linux was only vulnerable because any person could find the source code and analize it to find weakness. May I remind you of how many day zeroes have been found for windows 8 already
xwinuser Posted November 30, 2011 Posted November 30, 2011 How many, hdhdhd? Linux was only vulnerable because any person could find the source code and analize it to find weakness. May I remind you of how many day zeroes have been found for windows 8 already Still Linux is more secure than out of the box Windows. I will still use Windows but will practice OS hardening to remove or disable any unnecessary services, applications, ports, etc. --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- I am never shocked to hear of a security breach. As much as people try to prevent breaches, for the most part they are applying technologies that are already in place. They have no idea what new technology or hacker tool will pop up. Modified technology is one thing but those who create from scratch will always blow the minds of security people. In other words you cannot help but be reactive instead of proactive to the many cutting edge attacks. If you have no concept of something then how can it be prevented?
Tjoene Posted December 1, 2011 Posted December 1, 2011 Everything can and will be hacked one day.Windows is the most under attack cause it's (was) the most used OS, so hackers focused on Windows. Now Mac and Linux are growing in users, hackers are starting to focus on them too.And they will find bugs to exploit...
Guest xaav Posted December 1, 2011 Posted December 1, 2011 Linux is much harder (even impossible) to exploit if configured correctly. However, the biggest problem in defending against hackers is, and always will be, the user. No matter what measures you put in place, the user is always going to be the one who clicks the button "allow escalated privileges," causing whatever virus to gain root/administrator access to the computer.
xwinuser Posted December 4, 2011 Posted December 4, 2011 People are the weakest link. Even with great software, hardware and physical security measures, people can and will introduceviruses and other security breaches into your network. This can be done through the introduction of physical media, such as music CDs that were burned athome or pen drives loaded with corrupt data and even bypassing security measures to accessquestionable websites.The latter is usually done by the guy who has just enough technical knowledge to be dangerous. It couldalso be the employee that wants to download their favorite MP3 or that can't wait until they get hometo check their Facebook wall. While you can disable the ability to use flash or pen drives on theircomputer and filter the websites they access, there also needs to be strict policy that is taught to theemployees in continuing training sessions. These policies are setup to keep people from inadvertentlyjeopardizing network security. Using common sense is always a bonus. If your employees or customerslearn to avoid questionable software, sites and email messages you can avoid a myriad of securityproblems. Still, with all these precautions in place, you have some who just don't care. Proper loggingmay help to weed out these people for retraining, reprimand or dismissal but there will always be a needfor non-human intervention. - http://360DegreeNetworking.com
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now