Consider disabling SELinux and auditing. We recommend to leave SELinux on, for security reasons, but truth be told you can save 100ms of your boot if you disable it. Use selinux=0 on the kernel cmdline.
-- Lennart Poettering
I operate a ~10k botnet using a ZeuS software I modified myself, including
IRC, DDoS and bitcoin mining (13GH/s - 20GH/s atm). Everything operating
tru TOR hidden service so no feds will take my servers down. (Don't worry,
traffic intensive stuff is not tru TOR and the bots work as relays too,
enchancing your TOR experience!)
in a reddit "Ask me anything"
When I got to the orthopedist’s office a few days later, I gave the receptionist the CD, which she promptly read into the medical records computer and returned to me. It occurred to me that the risk taken in reading a CD or other media from an unknown source is pretty substantial, something we’ve known in the security world for decades but has not filtered well into other fields. On the other hand, every time I’m on a conference program committee I open PDFs from people I may never have heard of, so it’s not as if I’m immune from this risk myself.
When I got home, I read the CD on my Mac laptop, and discovered that it has an autorun.INF file to start the application that reads the x-ray data files. I don’t know whether the doctor’s office disables AutoRun on their computers; undoubtedly some doctors do and others don’t.
And even if the doctors’ computers have disabled AutoRun and don’t use the software on the CD to view the test results, how secure are they against data-driven attacks, such as we saw a number of years ago against JPEG files in browsers?
-- Jeremy Epstein
to post comments)