It took a hacker less than 30 minutes to gain root-level access to Mac
OS X, according to a report from ZDNet. The hacker who penetrated the system called the Mac "easy pickings."
http://news.yahoo.com/s/nf/20060306/tc_nf/41948
It took a hacker less than 30 minutes to gain root-level access to Mac
OS X, according to a report from ZDNet. The hacker who penetrated the system called the Mac "easy pickings."
and if you don't understand that distinction you should ease up on your copyin' 'n pastin'thelinkedpage said:The ZDnet article, and almost all of the coverage of it, failed to mention a very critical point: anyone who wished it was given a local account on the machine (which could be accessed via ssh). Yes, there are local privilege escalation vulnerabilities; likely some that are "unpublished". But this machine was not hacked from the outside just by being on the Internet. It was hacked from within, by someone who was allowed to have a local account on the box. That is a huge distinction.
I understand that distinction, and I'm not impressed.Toshi said:http://test.doit.wisc.edu/
and if you don't understand that distinction you should ease up on your copyin' 'n pastin'
Interesting Question, and I just found the answer. I was kinda suprised too!sanjuro said:On that note, how is password security on a Mac? Minimum 8 characters, one numeric and alphanumberic, 1 capitalized letter? Or could home users set their root password to "app|e"?
N8 said:
BigMike said:Interesting Question, and I just found the answer. I was kinda suprised too!
I changed my root password to apple with no problems at all!
manhattanprjkt83 said:i didnt read the thread but, iPods suck get an iRiver. :looney:
Unix systems are secure because sys admins and researchers make it secure. Windows are rife with security issues, but many PC owners are clueless to how to secure their systems, hence the huge market for security programs.jimmydean said:Mac is as secure as you want it to be. Use lack settings and easy passwords and you SHOULD be violated.
You can only ask a computer to protect yourself from yourself so much before you have to get a clue.
All the web servers at my job ar Mac. Database servers are Sun OS. Both platforms are very secure when compaired to Micro$haft based systems.
<edit> try something like "R1deM@nkey!" as a password. 2 Caps, 2 special characters, 1 number, 1 non dictionary based word. That is a solid P@ssWord!
please do at least do 10 seconds of research before you post false information. OS X is based on freebsd, with a different (micro)kernel.sanjuro said:Unix systems are secure because sys admins and researchers make it secure. Windows are rife with security issues, but many PC owners are clueless to how to secure their systems, hence the huge market for security programs.
Macs probably do not have the same base of security researchers as the other unix flavors do because of the short history of os10. On the other hand, Mac users are probably even more clueless than PC owners about security, because they never had to be.
I am not an OS/10 expert, but I have 15 years of Unix experience to draw upon.Toshi said:please do at least do 10 seconds of research before you post false information. OS X is based on freebsd, with a different (micro)kernel.
http://developer.apple.com/opensource/index.html
unfortunately there is is a good deal of *nix admins out there giving *nix a bad name because they are too lazy to stay up to date with security updates. Things like Ubuntu have made it easy for joe shmoe to get a linux server up and running.sanjuro said:Unix systems are secure because sys admins and researchers make it secure. Windows are rife with security issues, but many PC owners are clueless to how to secure their systems, hence the huge market for security programs.
I thought they were actually running as the admin user, but they are using sudo to make sure you have the ability to run the programs as the admin user.Toshi said:especially since most os x apps do not require being run as an admin or root (unlike the case on windows).
what is "they"?dfinn said:I thought they were actually running as the admin user, but they are using sudo to make sure you have the ability to run the programs as the admin user.
osx appsToshi said:especially since most os x apps do not require being run as an admin or root (unlike the case on windows).
I'm having a really hard time making sense of that. Is there a point to it?jimmydean said:sudo is what seperates the machines from the toys.
To set access level on an application basis is half the battle. With that, you can run in user mode without leaving you machine open unless you open it. Unlike Windows that wants you to run as all or nothing.dfinn said:I'm having a really hard time making sense of that. Is there a point to it?
sudo is basically an ACL to see if a certain user is allowed to run a command as another user, and if that user is allowed to do that it runs the command as the requested user.execute a command as another user
The applications written for OS/X are only a few years old, and have not been throughly poked and prodded like BIND or apache (which have had major security flaws which have been fixed over the years).Toshi said:thanks for explaining what a buffer overflow is. please note that with protected memory such a simple exploit shouldn't work to escalate privileges, especially since most os x apps do not require being run as an admin or root (unlike the case on windows). also, this does not address your original, incorrect implication that OS X has more security holes by being a unix with a "short history".
most apps do not require running as root. maybe they do to install updates to them, but not when you run them day to day:dfinn said:osx apps
so how do you account for the presence of rsync, automount, and perl on that list?sanjuro said:The applications written for OS/X are only a few years old, and have not been throughly poked and prodded like BIND or apache (which have had major security flaws which have been fixed over the years).
sorry for the confusion. I was talking about during the install specifically, but I re-read your post and realized you were talking about running these apps once they are installed.most apps do not require running as root. maybe they do to install updates to them, but not when you run them day to day:
They suck, and don't use them!!!Toshi said:so how do you account for the presence of rsync, automount, and perl on that list?
BigMike said:I don't understand why thats funny...........?
in order for ANYTHING to be installed, you have to enter your password. period.
In Windoze, your registry can be edited by most any program without your permission, and usually knowledge. QUOTE]
Actually on win XP. if you follow the recomended way to setup your users, you will have to have the Main users PW to be able to install anything. Thats how mine is set, Turn on the machine, it boots up, Its duel OS so i have to select my OS,<One for gaming one for all other> Then i select what user i want to be in and enter ther PW. If your logged into any other user than teh Main, it wont even let you start the Install program. From there you still have to retype the PW. So in reality Mac and PC are only as secure as teh operator wants them to be.