robespierre wrote:viruses as a technology are simply more applicable to a 1980s scenario where people share programs via floppy disks. they have been supplanted as an active security threat by more advanced tools that can spread through the network, like worms, rootkits, shellcode, etc. not in any way related to binary formats.
mia wrote:Or do not expose it directly to the internet, I use a proxy (a linux box) myself, which I hardened pretty good. But again, IRIX has never claimed to be about security, even "trusted IRIX" doesn't give more security, just compartimentation and other few things the military needs. I've ran it for a few, it's not all useful really.
Your use of the Internet security vulnerability profiling services on this site constitutes your FORMAL PERMISSION for us to conduct these tests and requests our transmission of Internet packets to your computer. ShieldsUP!! benignly probes the target computer at your location. Since these probings must travel from our server to your computer, you should be certain to have administrative right-of-way to conduct probative protocol tests through any and all equipment located between your computer and the Internet.
Users browsing this forum: No registered users and 2 guests