Skip to Content
2-17-2008 @ 3:04PM
[quote]Naix said...So explain to us how a Mac won't keep you safe from spyware and keyloggers. Could it be that darwin (the core operating system of OSX) does not support windows executables? Or perhaps the fact that Unix (In this case OSX) is built with security in mind rather than an after thought. I like for you to educate us on this matter.[/quote] Simple, scan, exploit, compile rootkit, hide rootkit, alter connection logs, alter bash logs, insert backdoor ( preferably a portknocking one that doesnt listen all the time but waits for specially crafted tcp or icmp flags in packets ), hide backdoor traces, Pwned.
First time? A confirmation email will be sent to you after submitting.
Members enter your username and password.
Enter your AOL or AIM screenname and password.
Please keep your comments relevant to this blog entry. Email addresses are never displayed, but they are required to confirm your comments.
When you enter your name and email address, you'll be sent a link to confirm your comment, and a password. To leave another comment, just use that password.
To create a live link, simply type the URL (including http://) or email address and we will make it a live link for you. You can put up to 3 URLs in your comments. Line breaks and paragraphs are automatically converted — no need to use <p> or <br /> tags.