On Friday, 02 December 2005, at 21:49:02 (+0100),
Martin Geisler wrote:

> I agree that one should apply all security measures possible, but
> removing read permissions on stock binaries isn't one of them, IMHO.
> Be paranoid, but apply it with some reason :-)

Being able to read an executable allows one to disassemble it.  This
can make formulating attacks against it easier.

Michael

-- 
Michael Jennings (a.k.a. KainX)  http://www.kainx.org/  <[EMAIL PROTECTED]>
n + 1, Inc., http://www.nplus1.net/       Author, Eterm (www.eterm.org)
-----------------------------------------------------------------------
 "Somehow through the lonely night, I will leave a light in the dark.
  Let it lead you to my heart."  
                 -- Michael W. Smith & Amy Grant, "Somewhere, Somehow"


-------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc. Do you grep through log files
for problems?  Stop!  Download the new AJAX search engine that makes
searching your log files as easy as surfing the  web.  DOWNLOAD SPLUNK!
http://ads.osdn.com/?ad_id=7637&alloc_id=16865&op=click
_______________________________________________
enlightenment-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/enlightenment-users

Reply via email to