You are not logged in. Login Now
 0-24   20-44   45-69   70-94   95-119   120-122     
 
Author Message
25 new of 122 responses total.
keesan
response 45 of 122: Mark Unseen   Dec 19 16:37 UTC 2006

I seem to need root privileges to do much of anything so I have been running
as root for four years with no problems.  'user' could not use zgv, and when
I typed mutt (telnetted with Windows to linux) I got very loud noise.
ball
response 46 of 122: Mark Unseen   Dec 19 17:04 UTC 2006

Literally a loud noise? I think the only noise you're likely
to hear from a telnet session is the bell, but perhaps if
the speakers were cranked up, that might be surprising.  If
you have to be root all the time, then your unix is broken.
gull
response 47 of 122: Mark Unseen   Dec 19 20:20 UTC 2006

Re resp:43: Some of the PCI adapters sold for use with wireless cards 
are not actually generic PCMCIA slots, but rather adapters specially 
designed for that company's cards.
keesan
response 48 of 122: Mark Unseen   Dec 19 21:44 UTC 2006

The noise sounded like very loud static.  Windows seems to be set up to make
noises on that computer despite my checking off Mute - is there some place
to tell it not to make system noises?  My linux is designed to run as root.
svgalib has problems when used as user, so does Xvesa, then I would need
to give myself privileges to save files to various directories.  Most of the
time I spend doing administration (adding and modifying programs, compiling,
etc.).  
ball
response 49 of 122: Mark Unseen   Dec 19 23:10 UTC 2006

There is something wrong with the MS Windows machine (either
with the hardware, or with the driver software) if it is
making a loud hash noise while you have mute selected.  It
seems as though data that doesn't represent sound is somehow
finding its way to the digital-to-analogue convertor (DAC).

If your Linux is designed to run as root, then I consider
its design broken.
mcnally
response 50 of 122: Mark Unseen   Dec 19 23:19 UTC 2006

 That's the way "Linspire" (formerly "Lindows") is designed to run,
 though I doubt that's the distro she's using.

 I wouldn't want to run that way, but some people do.
ball
response 51 of 122: Mark Unseen   Dec 19 23:23 UTC 2006

/me shudders
keesan
response 52 of 122: Mark Unseen   Dec 20 01:41 UTC 2006

I have the same software on several machines and can easily restore it.  I
am root in DOS, why not in linux?  Win98 also played all the WIndows noises
at the library despite being muted.  How do I turn off Windows noises?  I can
turn off online Opera noises.
mcnally
response 53 of 122: Mark Unseen   Dec 20 02:06 UTC 2006

 >  I  am root in DOS, why not in linux?  

 For the very same reason you shouldn't be root in DOS (which, admittedly
 has no other options) or in Windows (which, nowadays at least, does) --
 that always running at the highest privilege level makes it trivially
 easy for a rogue program to corrupt the entire system.
nharmon
response 54 of 122: Mark Unseen   Dec 20 03:43 UTC 2006

Some of us who have to follow accepted security practices in our work
generally do the same at home because it keeps up our "A" game. On top
of that I consider a lot of the data I keep at home to be fairly
important and I like to see it protected against loss.
keesan
response 55 of 122: Mark Unseen   Dec 20 20:40 UTC 2006

But I don't have any rogue programs and have not had problems in four years
and if I did I would just copy back the software from one computer to another.

Today I am trying to figure out why udhcpc does not work with my small laptop
kernel but does with another, so I tried a third.  Stuck in a wireless card
in the kitchen, forgot to plug in the router, got an IP number and three dns
numbers from some network with signal strength -139dB (noise -156dB) but it
did not last long, went back to signal strength 1/48 to 17/48.  For the 20
seconds it lasted I could go online with two browsers, so all I need now is
to wait for the free county wireless signal, or take the linux computer to
the library instead of windows.  Victory!  (I still need to fix my laptop
kernel to use udhcpc).  I have detected four networks with iwconfig too.
cross
response 56 of 122: Mark Unseen   Dec 21 00:08 UTC 2006

Regarding #55; That you know of, you mean.

In general, running is root is considered bad form.  If you can get away with
it, then great; but don't be surprised if it bites you in the butt one day.
keesan
response 57 of 122: Mark Unseen   Dec 21 02:12 UTC 2006

Where would a rogue program come from and what is it?
cross
response 58 of 122: Mark Unseen   Dec 21 03:02 UTC 2006

It could come from anywhere.  The `rm' command, if used without caution as
root, could become a `rogue' program.
ball
response 59 of 122: Mark Unseen   Dec 21 03:09 UTC 2006

That's a good point:  Running as a user helps to protect you
not just from other systems or people with hostile intent,
but also from yourself.  rm * in the wrong directory is a
great example of that.
ball
response 60 of 122: Mark Unseen   Dec 21 03:22 UTC 2006

It also provides more protection from a userland application
that loses its mind.
keesan
response 61 of 122: Mark Unseen   Dec 21 04:18 UTC 2006

But I have an identical computer next to this one linked by ethernet cable.
And I could also just copy everything to another partition here.  It is a 10GB
drive and my linux fits fine in 1GB or less.  I keep what I have compiled at
a shell account.  
ball
response 62 of 122: Mark Unseen   Dec 21 05:03 UTC 2006

If they're separate partitions on the same disk, or even
seperate disk drives connected to the same computer, then
they provide no significant redundancy (since an errant
program, run as root can simply erase all connected disks).
Having an identical computer connected via a network cable
is a handy thing (I do something similar myself), but if
they're running the same system software, they're going to
share any vulnerabilities that it has.  In your case
replacing the data may be trivial, but for most people that
is probably not the case.  Besides, isn't it a bit like
saying "I don't lock my front door because I have home-
owner's insurance"?
maus
response 63 of 122: Mark Unseen   Dec 21 05:05 UTC 2006

Keesan, I have fat fingered a single "." into "..". The guy who hired me
at my current job has still never lived down a "chmod -R 600 .." instead
of "chmod -R 600 .", which made everything in the entire machine
unreadable by anyone except root and unexecutable by anyone including
root. Had he been running as his normal login, he would have done very
little damage, but because he was using the root login, he and a
colleague wound up having to reimage the server and restore settings and
data from backup, which is a royal P.I.T.A. 
cross
response 64 of 122: Mark Unseen   Dec 21 14:15 UTC 2006

Sindi, you can do what you want.  But like I said, it might bite you in the
ass.  If you don't care, then great, I really have *no* interest in trying
to convince you otherwise, but it is bad form.
keesan
response 65 of 122: Mark Unseen   Dec 21 16:38 UTC 2006

Most of what I do in linux is not doable by user.  The only damage I have done
is crashing things, and e2fsck fixed it all but once (when I think the drive
was bad).  I read email and browse mostly in DOS (kermit, lynx, pine).  And
replacing the contents of a house is a lot different from copying software
between computers, which I do every time I change drives anyway.

I don't want to have to change write permissions on a bunch of directories,
or write only to one directory with subdirectories, wastes time.

I discovered iwlist (on the card that supports it) shows 8 available
connections.  I need to compile a newer pcmcia module for the other card to
work with iwconfig.  I have the source code.  Do I uncompress it into the
pcmcia source code directory and make all again?  Can I make just the one
module and if so how?  I think udhcpc (a small dhcpc) can choose between
connections by address with -r .
ball
response 66 of 122: Mark Unseen   Dec 21 18:11 UTC 2006

I live inside my computer ;-)
gull
response 67 of 122: Mark Unseen   Dec 21 18:43 UTC 2006

Re resp:56: I learned not to run as root when I accidentally typed "rm 
-rf /usr" instead of "rm -rf ~/usr".
remmers
response 68 of 122: Mark Unseen   Dec 21 19:04 UTC 2006

I would be extremely nervous to run as root all the time.  On modern Unix 
and Linux systems, I find that the "sudo" command provides a rational 
middle ground, providing reasonable protection against unfortunate 
accidents while not requiring a full-blown root login every time I want to 
do something requiring administrative privileges.
cross
response 69 of 122: Mark Unseen   Dec 21 19:21 UTC 2006

Sudo has a lot of advantages: among them, it logs commands via syslog.  So
if someone does something mistakenly, there is at least a lot which one can
look at to see what happened.
 0-24   20-44   45-69   70-94   95-119   120-122     
Response Not Possible: You are Not Logged In
 

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss