• ARRSE have partnered with Armadillo Merino to bring you an ARRSE exclusive, generous discount offer on their full price range.
    To keep you warm with the best of Merino gear, visit www.armadillomerino.co.uk and use the code: NEWARRSE40 at the checkout to get 40% off!
    This superb deal has been generously offered to us by Armadillo Merino and is valid until midnight on the the 28th of February.

Cadets Trade the Trenches for Firewalls

#1
A team of Army cadets spent four days at West Point last week struggling around the clock to keep a computer network operating while hackers from the National Security Agency tried to infiltrate it with methods that an enemy might use. The NSA made the cadets' task more difficult by planting viruses on some of the equipment, just as real-world hackers have done on millions of computers around the world. The competition was a final exam for computer science and information technology majors, who competed against teams from the Navy, Air Force, Coast Guard and Merchant Marine as well as the Naval Postgraduate Academy and the Air Force Institute of Technology. Ideally, the teams would be allowed to attack other schools' networks while also defending their own but only the NSA, with its arsenal of waivers, loopholes, special authorizations is allowed to take down a US network. NSA tailored its attacks to be just 'a little too hard for the strongest undergraduate team to deal with, so that we could distinguish the strongest teams from the weaker ones.' The winning West Point team used Linux, instead of relying on proprietary products from big-name companies like Microsoft or Sun Microsystems."

http://www.nytimes.com/2009/05/11/technology/11cybergames.html
 
#2
FTFA:

It [Linux] is also much easier to secure because “you can tweak it for everything you need” and there are not as many known ways to attack it, he said.
Lets hope they don't actually believe that, PR puffing aside.
 
#3
BV_Technician said:
FTFA:

It [Linux] is also much easier to secure because “you can tweak it for everything you need” and there are not as many known ways to attack it, he said.
Lets hope they don't actually believe that, PR puffing aside.
In what way?
 
#4
In the way of "Operating system X is more secure because of Y".
It's much more a case of understanding both the operating system and what you are doing than any specific OS; they are all vulnerable in some way or another and to suggest otherwise will just result in pain further down the line.

I've broken into a wide variety of networks that used all sorts of OS's and technologies. What type they are doesn't really matter to me, how they have been designed and implemented, very much does.

Edit: And that phrase "not as many ways known to attack it" is painfully naive. :twisted:
 

Latest Threads