Jump to content

urandom

Member
  • Posts

    331
  • Joined

  • Last visited

Posts posted by urandom

  1. OK you convinced me, OSX is 200% safe.

    Oh and this is what you call crap:

    The Common Vulnerabilities and Exposures or CVE system provides a reference-method for publicly known information-security vulnerabilities and exposures. MITRE Corporation maintains the system, with funding from the National Cyber Security Division of the United States Department of Homeland Security.[1] CVE is used by the Security Content Automation Protocol.

  2. The first 3 points are idiotic.

    That was funny, thanks :)

    The Coretext point is still in YOUR own hacker world describing what some hacker COULD do. Still, you haven't given 1 real life example as to how I'm going to get infected by this vulnerabilities with the current software I have here. ALl you're saying is, here is a list of all the vulnerabilities that have been found. You go and search. Have fun.

    Indeed, I have no intention to paste the 790 vulnerabilities (only for OSX) that proved you 790 times you were not 100% safe. Also, quite big news I know but 100% of the attacks in the computer world are because hackers could do them :D

    You seem to forget, I am running 10.8.2. This is not the year 2007.

    These are known, past vulnerabilities; good to hear they have been fixed. I wonder if it took them 3 months again to release the patches... Anyway, if they have been fixed in 2007, does it mean there won't be anymore in the future? Why do we have OSX CVEs in 2012 still?

    Right now. I'm watching YouTube, reading all this boloney you guys are posting, reading another forum, finishing up some Photoshop. Working on some spreadsheets for work. Later on I'll check facebook. How in the world am I getting infected?

    I haven't been hit by a car yesterday. Oh my god oh my god, I'm car accident proof :o

    • Like 1
  3. What are those links proving exactly? That someone can hack a system? All those links are either Safari before version 6 or iPhone vulnerabilities.

    These links are proving that exploits are common, that your machine is far from being 100% safe. First link is Safari related, second is OSX related.

    What I am asking you is, with Java disabled, how will you get a virus into a Mac? HOW? What you're showing me are vulnerabilities in SAFARI that a hacker can take advantage of. You're not talking about viruses in the wild that people get browsing the internet.

    Click code execution. Safari and OSX.

    If Safari has issues, then use another browser. Nothing to do with OSX. These are all Safari issues you're linking, not OSX issues.

    Again, check both links. OSX has been, probably is and will be vulnerable. Also you're saying your system is 100% safe but it's not safe and you can use something else. cool.

    I am talking about people browsing, checking their facebook, working on their documents, listening to music. Not pirating stuff or looking at porno. Just regular people using the computer everyday. If you disable Java for any browser in OSX, or disable it from the Java preferences, none of the Viruses out there for Mac would be able to infect your computer.

    Coretext, quicktime exploits, you'll find them all... You're just deluded and living in your own world.

  4. making the Mac 100% virus proof.

    Seriously...

    Well, yes. Seriously.

    Please tell us how, with Java disabled, these Mac viruses will infect a Mac?

    http://www.cvedetails.com/product/2935/Apple-Safari.html?vendor_id=49

    http://www.cvedetails.com/product/156/Apple-Mac-Os-X.html?vendor_id=49

    oh but you're lucky, sometimes you just have to wait two months only for apple to fix vulnerabilities...

    i build my own kernels (with grsec patches for my firewall/router box), i also use a hardened toolchain. even with this i would never say my machines are 100% safe because that's just not possible.

  5. Chromium appears to be stable at present.

    Following another advice that I found on Ubuntu community support, I moved back -as well- to the previous kernel...

    Frankly, I dont think that would be kernel related.

    Simple things you can do when you have recurring software crashes:

    start it from a terminal, you *may* get interesting information when it crashes

    start it with a fresh profile (i.e. backup your related dotfiles, chromium's are in ~/.config/chromium)

    start it without any plugins (e.g. flash)
    Just one more question for an Acer laptop I5 - 8gb ram - 64bits :

    Will it make a huge difference by installing a 64bits version instead of 32bits... for a "basic user" like me?

    No it won't make a huge difference but at least you won't use PAE anymore. IIRC it's enabled in ubuntu i686 stock kernel and PAE has a slight performance impact.

    /edit: typo

  6. i think i'm a bit confused right now. are you trying to create a ubuntu variant or you have it already and just want to distribute iso's? if it's about giving away iso's only then maybe you should not invest into CD's and packaging and all that stuff at first (BTW when i mentioned packagers, i was talking about applications packagers, just in case). why not starting with planning an install party at the uni, 2-3 CD's, a couple of USB drives and see how succesful this is.

  7. just my opinion but if you want to start a project like this and ask for volunteers, you may want have something to present to the crowd. not nececessarly code but at least a to do list, a time line, design goals, something... or i'm afraid nothing will happen. not trying to be rude or discouraging but things won't just happen "like this"...

  8. brands means not much, one has to look at what's inside the machine. also:

    Toshiba clearly states on their website they will not make Linux drivers for their products

    it's very unlikely that toshiba would release any driver anyway. {wireless,video,audio} chipset, mainboards manufacturers do.

  9. i couldnt find anything very clear WRT PUA.JS.Xored, except people saying it's most likely a false positive. you could always remove the extension... i'm still convinced running an anti-virus on linux is absolutely not necessary, except if you're serving files to windows machines.

  10. Hi,

    I have been using both Ubuntu and Mint on two of my laptops for the past 6 months. I'ved installed ClamAV on both. A week ago I ran a virus scan on my laptop with Ubuntu and it found 13 threats. Previous scans had found none.

    Greg

    would you mind posting the log just out of curiosity? TIA

  11. running xbmc on linux 64on32 here with a quite cheap nvidia 9400GT and vdpau (1-2% CPU usage with a c2d E8400 while playing 1080p), plugged into a samsung LED TV. I also have a cheap Xonar D1 in there that is *so*much*better* than onboard audio. I'm also using a mce IR remote (with lircd) and/or xbmc android remote. the machine is also used as a torrentbox/secured file server/build machine/ssh tunneling/jukebox.

×
×
  • Create New...