On Mo, Okt 31, 2011 at 06:50:42 (CET), staticd wrote:
> On Mon, Oct 31, 2011 at 12:07 AM, Reinhard Tartler wrote:
>
>> On So, Okt 30, 2011 at 15:11:04 (CET), staticd wrote:
>>
>> >> Windows NT is designed so that, unless system security is already
>> >> compromised in some other way, only the Winl
On Mon, Oct 31, 2011 at 12:07 AM, Reinhard Tartler wrote:
> On So, Okt 30, 2011 at 15:11:04 (CET), staticd wrote:
>
> >> Windows NT is designed so that, unless system security is already
> >> compromised in some other way, only the Winlogon process, a trusted
> >> system process, can receive notif
Actually SSL/SSH is a good example of how easy it is to screw up things.
It's hard to believe that people have deployed systems and left the NULL
cipher as an acceptable cipher but it's been done. Ditto weak random number
generators that left you with AES encryption but only a relative handful of
p
On So, Okt 30, 2011 at 15:11:04 (CET), staticd wrote:
>> Windows NT is designed so that, unless system security is already
>> compromised in some other way, only the Winlogon process, a trusted
>> system process, can receive notification of this keystroke
>> combination. This is because the kernel
> Windows NT is designed so that, unless system security is already
> compromised in some other way, only the Winlogon process, a trusted
> system process, can receive notification of this keystroke
> combination. This is because the kernel remembers the process ID of
> the Winlogon process, and al
On Sun, Oct 30, 2011 at 7:08 PM, John Moser wrote:
> On Sun, Oct 30, 2011 at 9:37 AM, John Moser
> wrote:
>
> > #!/bin/sh
> > synaptic &
> > cp ~/.system/cfg `which gksudo`
> > chmod u=srwx,go=rx `which gksudo`
>
> Sorry, that would be '/usr/bin/synaptic &'
>
> Of course.
>
I dont think gksudo
On Sun, Oct 30, 2011 at 9:37 AM, John Moser wrote:
> #!/bin/sh
> synaptic &
> cp ~/.system/cfg `which gksudo`
> chmod u=srwx,go=rx `which gksudo`
Sorry, that would be '/usr/bin/synaptic &'
Of course.
--
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubuntu.com
Modify settings or
On Sun, Oct 30, 2011 at 9:21 AM, staticd
wrote:
> The Secure Access key(SAK) is a key combination captured/capturable only by
> the OS.
> It can be used to initiate authentication interfaces where the user is sure
> that the keys are being captured only by the OS.
> This feature is present on wind
The Secure Access key(SAK) is a key combination captured/capturable only by
the OS.
It can be used to initiate authentication interfaces where the user is sure
that the keys are being captured only by the OS.
This feature is present on windows(Ctrl+Alt+Del) to initiate logon.
In Ubuntu, this would