User Tag List

Thanks useful information Thanks useful information:  0
Page 2 of 2 FirstFirst 12
Results 21 to 33 of 33

Thread: a wifi hypothetical .. ??

  1. #21
    It's all about the Light!
    Tech Admin
    Kym's Avatar
    Join Date
    15 Jun 2008
    Location
    Modbury, Adelaide
    Posts
    9,632
    Mentioned
    23 Post(s)
    Tagged
    0 Thread(s)
    Quote Originally Posted by MarkW View Post
    Kym are you a PC or Mac user (or both) - Them words sound pretty much like a dedicated PC user

    Leopard OSX actually comes with its own firewall but nobody uses it. I'm a member of Mactalk, an Australian Mac users forum and this issue of security comes up again and again and again (I wish people would do a search first). Nobody uses firewalls or virus scans or anti-maliscious (sp?) software. The only way for you to get "infected" is for you to download the file and in windoze speak "execute it". To execute a file will involve you entering your permission password and no other way, its just not automatically vunerable like a PC. I look long and hard for any file asking for permission and always have a system backup when adding new apps.

    On the other side of this fence is the legality of using somebody elses bandwidth, whether its a commercial entity or a private user. If caught, it is akin to theft and a number of cases in the US has set presidence. In this country I'm not sure but my aging memory seems to recall something about using a "Starbucks" or similar but can't confirm this.
    Use Mac's in the past - use PC's for work - use Linux for a bunch of server work.

    Most personal computer (any flavour) attacks happen from executing something bad.

    But - there are other attacks. Eg. buffer overruns attacking web servers.
    IIS and MS SQL Server had a run of these a few years ago.
    Apache has had a few over the years as well.
    Various softwares have had these vulnerabilities as well. phpBB as a good example.

    So just because a particular platform is difficult to attack (Mac or Linux) does not mean it cant or wont be attacked.

    Having written the web server security architecture for a Govt department a few years ago (previous job) - I do have clue in this space. (and that was for mainly *nix systems)

    With security it is not that you are paranoid - but are you paranoid enough?
    Defence in depth is a very important concept.

    One day (when not if) there will be a hole in Mac or Linux security and some bugga will let loose an attack and many will lose data etc.
    Only those with a multi layer defence and good backups will be ok.

    The good thing is MS platforms are used widely and are relatively easy to attack so the malicious people (being generally lazy and after a quick $) will focus on the MS platforms and leave the better platforms alone.
    regards, Kym Gallery Honest & Direct Constructive Critique Appreciated! ©
    Digital & film, Bits of glass covering 10mm to 500mm, and other stuff



  2. #22
    Member
    Threadstarter

    Join Date
    13 Dec 2008
    Location
    Sydney
    Posts
    2,048
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Quote Originally Posted by Kym View Post
    The good thing is MS platforms are used widely and are relatively easy to attack so the malicious people (being generally lazy and after a quick $) will focus on the MS platforms and leave the better platforms alone.
    i know very little when it comes to the tech stuff .. but that seems a good enough reason for me to not use windows at all
    Hi Im Darren

    www.darrengrayphotography.com

    SONY A850 (FF)] + GRIP | SONY A350 (APS-C) + GRIP | SONY NEX-5 +16 2.8 + 18-55 E-MOUNT LENSES | CZ 85 1.4 | 50 1.4 | 28-75 2.8 | 70-200 2.8 | 2 x 42AMs | 24" imac | LR | CS4 | + loads of other junk


  3. #23
    It's all about the Light!
    Tech Admin
    Kym's Avatar
    Join Date
    15 Jun 2008
    Location
    Modbury, Adelaide
    Posts
    9,632
    Mentioned
    23 Post(s)
    Tagged
    0 Thread(s)
    Quote Originally Posted by bigdazzler View Post
    i know very little when it comes to the tech stuff .. but that seems a good enough reason for me to not use windows at all
    Well yes.
    But Windoze is the lowest common denominator and we have to live with it.
    Not all the software I need is on the other platforms (and vice versa - some stuff I want for Windows is Linux only).

    But if lets say Apple suddenly halves their prices and open the HW platform and everybody jumps from Windoze to MacOS...
    then the malicious people would go after the biggest platform simple because of the percentage game they play.
    Why do you think you keep getting 419 emails (Nigerian scams)? Coz they only need a few suckers out of millions of people.

  4. #24
    Member
    Join Date
    28 Aug 2008
    Location
    Adelaide
    Posts
    1,905
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    i spoke to a security analyst in IT for the SA state government a while ago

    he actually said that the more defences you put up, the more attention u will attract from hackers, they will be very curious at the layered defences u have - and wonder whats behind that. Curiosity killed the cat.

    concluding that sometimes, going naked is a safer choice. I agree with what he says in many ways.

  5. #25
    It's all about the Light!
    Tech Admin
    Kym's Avatar
    Join Date
    15 Jun 2008
    Location
    Modbury, Adelaide
    Posts
    9,632
    Mentioned
    23 Post(s)
    Tagged
    0 Thread(s)
    Quote Originally Posted by JM Tran View Post
    i spoke to a security analyst in IT for the SA state government a while ago
    he actually said that the more defences you put up, the more attention u will attract from hackers, they will be very curious at the layered defences u have - and wonder whats behind that. Curiosity killed the cat.
    concluding that sometimes, going naked is a safer choice. I agree with what he says in many ways.
    Defence in depth for serious apps looks like... (assuming Java EE)
    - outer firewall (router)
    - DMZ reverse proxy server with intrusion detection, NAT
    - inner firewall (router private IP addresses)
    - web server / container
    - EJB container (proxy DB user to access stored procs)
    - database firewall (router - only EJB server can access)
    - database stored procs
    - database tables/views <<< this is what is being protected

    So from the outside you just see a web server (aka reverse proxy). It also limits internal access to the transactional database. Given that more attacks occur from internal networks.

    The above model is used by banks etc. Fairly standard in the corporate space.

    Naked is not genuine option.

  6. #26
    Member
    Threadstarter

    Join Date
    13 Dec 2008
    Location
    Sydney
    Posts
    2,048
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Quote Originally Posted by Kym View Post
    Defence in depth for serious apps looks like... (assuming Java EE)
    - outer firewall (router)
    - DMZ reverse proxy server with intrusion detection, NAT
    - inner firewall (router private IP addresses)
    - web server / container
    - EJB container (proxy DB user to access stored procs)
    - database firewall (router - only EJB server can access)
    - database stored procs
    - database tables/views <<< this is what is being protected

    So from the outside you just see a web server (aka reverse proxy). It also limits internal access to the transactional database. Given that more attacks occur from internal networks.

    The above model is used by banks etc. Fairly standard in the corporate space.

    Naked is not genuine option.
    you gotta get out more mate ..

  7. #27
    It's all about the Light!
    Tech Admin
    Kym's Avatar
    Join Date
    15 Jun 2008
    Location
    Modbury, Adelaide
    Posts
    9,632
    Mentioned
    23 Post(s)
    Tagged
    0 Thread(s)
    Quote Originally Posted by bigdazzler View Post
    you gotta get out more mate ..
    Have to do something to pay for the camera gear

  8. #28
    Amor fati!
    Join Date
    28 Jun 2007
    Location
    St Helens Park
    Posts
    7,272
    Mentioned
    2 Post(s)
    Tagged
    0 Thread(s)
    not an awful lot could happen to the thief, but one has to look at the moral implications... it is theft... much like stealing petrol out of someones car.

    mt wireles network at home is secure... cause there are plenty of scum out there that like to steal stuff.

  9. #29
    Site Rules Breach - Permanent Ban
    Join Date
    14 Feb 2007
    Location
    Western Sydney
    Posts
    352
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Quote Originally Posted by ving View Post
    not an awful lot could happen to the thief, but

    Unless you reside in the US where the thief actually did time - do the crime do the time

  10. #30
    Member
    Join Date
    22 May 2009
    Location
    Ipswich
    Posts
    388
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    So, to sum it all up .... turn your wireless off when your at the airport

  11. #31
    Site Rules Breach - Permanent Ban
    Join Date
    14 Feb 2007
    Location
    Western Sydney
    Posts
    352
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Quote Originally Posted by milspec View Post
    So, to sum it all up .... turn your wireless off when your at the airport

    Huh ????

    In the US it was proven that the thief was aware that the WiFi was only for the use of their customers due to previous attandance and since he had not purchased any goods from the supplier then he wasn't entitled to use the WiFi usage.

    As for the airport, the only one I have been able to get is Qantas where its $5 per hour password secured as I don't have Qantas Club. Thats what you get for flying cattle class.

  12. #32
    Member
    Join Date
    28 Aug 2008
    Location
    Adelaide
    Posts
    1,905
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Quote Originally Posted by Kym View Post
    Defence in depth for serious apps looks like... (assuming Java EE)
    - outer firewall (router)
    - DMZ reverse proxy server with intrusion detection, NAT
    - inner firewall (router private IP addresses)
    - web server / container
    - EJB container (proxy DB user to access stored procs)
    - database firewall (router - only EJB server can access)
    - database stored procs
    - database tables/views <<< this is what is being protected

    So from the outside you just see a web server (aka reverse proxy). It also limits internal access to the transactional database. Given that more attacks occur from internal networks.

    The above model is used by banks etc. Fairly standard in the corporate space.

    Naked is not genuine option.
    I have almost zero idea of anything u just mentioned up there LOL

  13. #33
    Member
    Threadstarter

    Join Date
    13 Dec 2008
    Location
    Sydney
    Posts
    2,048
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Just to clarify .. when i said airport , i meant "AirPort" - Apples wireless network connection utility , not "the airport" - as in where you might board an aeroplane ..

Page 2 of 2 FirstFirst 12

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •