Mailing List Archive
tlug.jp Mailing List tlug archive tlug Mailing List Archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]Re: [tlug] Ubuntu 10.04 - kernel update snafu
- Date: Thu, 19 Jun 2014 10:19:45 +0900
- From: "Stephen J. Turnbull" <stephen@example.com>
- Subject: Re: [tlug] Ubuntu 10.04 - kernel update snafu
- References: <CABHGxq578Vh4zFgTRRc2JKtWz=ua74J5bdJULNQeTzyeD6hkxQ@mail.gmail.com> <53A1726F.5030500@imaginatorium.org> <8738f2jkwy.fsf@uwakimon.sk.tsukuba.ac.jp> <53A1B350.4050700@imaginatorium.org> <53A22593.8030807@extellisys.com>
Travis Cardwell writes: > [1] Running arbitrary executables with privileged access is bad practice, > IMHO. You mean arbitrary executables like apt or yum? If you habitually run Plan 9, I'll take that seriously, otherwise, I think you're just kidding yourself. Sure, "arbitrary" executables that contain viruses or are trojans are an obvious threat, and I have a *very* short list of sources I trust install software on my machines. Still, any installer whether depending on preinstalled software (such as apt) or a self-extracting executable (like the Memsource .run file) is a vector.
- References:
- [tlug] Ubuntu 10.04 - kernel update snafu
- From: Jim Breen
- Re: [tlug] Ubuntu 10.04 - kernel update snafu
- From: Brian Chandler
- Re: [tlug] Ubuntu 10.04 - kernel update snafu
- From: Stephen J. Turnbull
- Re: [tlug] Ubuntu 10.04 - kernel update snafu
- From: Brian Chandler
- Re: [tlug] Ubuntu 10.04 - kernel update snafu
- From: Travis Cardwell
Home | Main Index | Thread Index
- Prev by Date: [tlug] Editing XML
- Next by Date: Re: [tlug] Ubuntu 10.04 - kernel update snafu
- Previous by thread: Re: [tlug] Ubuntu 10.04 - kernel update snafu
- Next by thread: Re: [tlug] Ubuntu 10.04 - kernel update snafu
- Index(es):
Home Page Mailing List Linux and Japan TLUG Members Links