I'm doing research about professionalism in our industry. I'd like to
hear your thoughts.
Please take 5 minutes to answer this simple survey:
http://tr.im/IeWf
Thanks!
Tom Limoncelli
http://everythingsysadmin.com
The Practice of System and Network Administration
Time Management for System Admini
So I never expected myself to do a 180 on this one, but .
Viruses, malware, etc come in one of two forms:
1) Involuntary exploits. Something that takes advantage of system
vulnerabilities. Every system everywhere is susceptible to this sort of
attack.
2) Voluntary exploits. Somet
Edward Ned Harvey wrote:
>2) Voluntary exploits. Something that tricks users into running
>something voluntarily, that they didn't know would be harmful.
> ...
>So why wouldn't a "bad guy" just sign their apps and bypass the prompts?
>Surely sometimes they will, but the process requires prov
> Or a bad guy can infect the origin machine of the signed app and alter
> the binary before its signed.
>
> Personally, I don't like letting ANYone run ANY code on my machine
> without my explicit permission. That includes HTML email.
Nobody said anything about running code without your permissi
I'm told that the short URL isn't working for some. Please try:
https://spreadsheets.google.com/a/whatexit.org/viewform?hl=en&formkey=dHM3TTlnamRMZWN6UjRPak1qOHE3UkE6MA
On Mon, Dec 21, 2009 at 8:53 AM, Tom Limoncelli wrote:
> I'm doing research about professionalism in our industry. I'd like to