On Friday, 02 December 2005, at 21:49:02 (+0100), Martin Geisler wrote: > I agree that one should apply all security measures possible, but > removing read permissions on stock binaries isn't one of them, IMHO. > Be paranoid, but apply it with some reason :-)
Being able to read an executable allows one to disassemble it. This can make formulating attacks against it easier. Michael -- Michael Jennings (a.k.a. KainX) http://www.kainx.org/ <[EMAIL PROTECTED]> n + 1, Inc., http://www.nplus1.net/ Author, Eterm (www.eterm.org) ----------------------------------------------------------------------- "Somehow through the lonely night, I will leave a light in the dark. Let it lead you to my heart." -- Michael W. Smith & Amy Grant, "Somewhere, Somehow" ------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Do you grep through log files for problems? Stop! Download the new AJAX search engine that makes searching your log files as easy as surfing the web. DOWNLOAD SPLUNK! http://ads.osdn.com/?ad_id=7637&alloc_id=16865&op=click _______________________________________________ enlightenment-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/enlightenment-users
