>>57977580

You better call that number op, I think google might be compromised.

Other urls found in this thread:

owasp.org/index.php/Heartbleed_Bug
cyberciti.biz/faq/understanding-etcshadow-file/
yourownlinux.com/2015/08/etc-shadow-file-format-in-linux-explained.html?m=1
cyberciti.biz/tips/recovering-deleted-etcshadow-password-file.html
theverge.com/2013/7/17/4517480/nsa-spying-prism-surveillance-cheat-sheet
vocativ.com/295204/nsa-prism/
theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data
selinuxproject.org/page/NB_AL
cyberciti.biz/tips/selinux-vs-apparmor-vs-grsecurity.html
falkvinge.net/2013/11/17/nsa-asked-linus-torvalds-to-install-backdoors-into-gnulinux/
twitter.com/NSFWRedditGif

>exploit
>requires direct access to filesystem to execute
Wow, it's fucking nothing

Linux shills at full force today

In their defence this doesn't happen on Linux desktops because nobody really uses them.

So, you'd rather have an unpatchable system vulnerability and not know if it ever really got patched because you're using a proprietary operating system? Doesn't seem like a secure OS to me.

>unpatchable system vulnerability
Hey Linux foundation! You have unpatchable system vulnerability I can delete /etc/shadow and gain access to root acount! PATCH THIS RIGHT NOWWWWWWWWWWW!!!!!!!!!!!!!!

You're just jealous that Richard Stallman personally pays me to shill for Linux on Sup Forums

I'd rather have 5 million lines of code nobody reviews except for people with intentions of harm and have a heartbleed bug.

You're a retard, just be quiet.

owasp.org/index.php/Heartbleed_Bug
>Below is the revised code from Github:
hbtype = *p++; n2s(p, payload); if (1 + 2 + payload + 16 > s->s3->rrec.length) return 0; /* silently discard per RFC 6520 sec. 4 */ pl = p;
cyberciti.biz/faq/understanding-etcshadow-file/
yourownlinux.com/2015/08/etc-shadow-file-format-in-linux-explained.html?m=1

Ad hominem are surely going to make Microsoft patch system vulnerabilities.

Ad hominem attacks*

>MICROSOFT IS FINISHED & BANKRUPT

Microsoft could completely sever and consolidate their entire consumer operating system development and still be just fine.

Do you NEETs not realize that the vast majority of their revenue comes from enterprise licensing (Server, Active Directory, SQL Server, Exchange, etc.) and Azure cloud services?

>yourownlinux.com/2015/08/etc-shadow-file-format-in-linux-explained.html?m=1

Nothing here stops someone with file access deleting the file. LiveCD, mount and chroot = full root access.
When are they going to fix this disgusting security issue? Seems like something the NSA would plant whilst convincing idiots that it is secure.

I'd just like to interject for moment. First, the FSF will never pay you anything, you cant even shill properly. Second, what you're refering to as Linux, is in fact, GNU/Linux, or as I've recently taken to calling it, GNU plus Linux. Linux is not an operating system unto itself, but rather another free component of a fully functioning GNU system made useful by the GNU corelibs, shell utilities and vital system components comprising a full OS as defined by POSIX.

Many computer users run a modified version of the GNU system every day, without realizing it. Through a peculiar turn of events, the version of GNU which is widely used today is often called Linux, and many of its users are not aware that it is basically the GNU system, developed by the GNU Project.

There really is a Linux, and these people are using it, but it is just a part of the system they use. Linux is the kernel: the program in the system that allocates the machine's resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. All the so-called Linux distributions are really distributions of GNU/Linux!

Provide an example where this has negatively impacted a company. I'd really like to see that.

Exactly.

That's why I refuse to use Linux. It's simply full of unpatchable system vulnerabilities

Just like nothing stops someone with LiveCD and NTFS support to delete whichever files Windows stores its registry entries in.

If I has access to the entire worlds crime reports I probably could do, not difficult to steal shit and use a live cd to reset passwd and have full access to the whole disk.

Same, the fact these paid NSA shills try to defend such sloppy security without feeling any shame for what they are doing really makes you think about the quality of the gene pool at this point in time.

cyberciti.biz/tips/recovering-deleted-etcshadow-password-file.html
Oh, really? Where are all those changelogs for Microsoft's supposed patches? There are numerous examples of Linux zero-day exploits being patched in a single day across distributions. And you can actually see what has been changed in the source code.

>If I has access to the entire worlds crime reports I probably could do, not difficult to steal shit and use a live cd to reset passwd and have full access to the whole disk.
I'm waiting for your proof of how /etc/shadow bug has negatively impacted a company. I've provided links with manual fixes for the exploit.

>how /etc/shadow bug
Nigga you are dumb as fuck.
I don't give a shit about your shadow bug, chroot the disk you can just change the root passwd you do not need a bug... it is designed like this. you are claiming nobody has ever used chroot to reset root passwd and gain access to someone else's shit? Get fucking real.

They must be paying you very well to just act as retarded as this to muddy the waters to try cover this up.

It happened in my local courthouse actually. Attacker booted from live CD, deleted /etc/shadow and overridden the alarm, so he could bypass CGI network driver through the open-source SMTP cross-platform ATP array

>Same, the fact these paid NSA shills try to defend such sloppy security without feeling any shame for what they are doing really makes you think about the quality of the gene pool at this point in time.
Are you being willingly ignorant of the fact that Microsoft has been a participant of NSA's PRISM project since 09/11/2007?
theverge.com/2013/7/17/4517480/nsa-spying-prism-surveillance-cheat-sheet
vocativ.com/295204/nsa-prism/
theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data
It's true that SELinux is developed by the NSA, but there have been numerous audits proving that there are no backdoors in it.
selinuxproject.org/page/NB_AL
cyberciti.biz/tips/selinux-vs-apparmor-vs-grsecurity.html
And here's Linus Torvalds denying NSA's request to insert backdoors into his kernel:
falkvinge.net/2013/11/17/nsa-asked-linus-torvalds-to-install-backdoors-into-gnulinux/
I'm sure that was covered by local news. Can I see the article?
Yes, start your argument with an ad hominem attack. It really helps your credibility. Who's paying me exactly and what for? I've literally provided a link to an interview in which Linus Torvalds denies the NSA's request for inserting backdoors into the kernel. You're also making a appeal to futility fallacy. Someone got hacked and therefore we should cease using encryption and secure operating systems.

>I'm sure that was covered by local news. Can I see the article?
Real talk, are you legally retarded?

Great. More ad hominem attacks. You sure proved me wrong now.

Moron, seriously just shut up.

...

Great arguments! Keep it up!