The Cuckoo's Egg
Rate it:
Open Preview
6%
Flag icon
Collect raw data and throw away the expected. What remains challenges your theories.
7%
Flag icon
The daemons themselves are just programs that copy data from the outside world into the operating system—the eyes and ears of Unix. (The ancient Greek daemons were inferior divinities, midway between gods and men. In that sense, my daemons are midway between the god-like operating system and the world of terminals and disks.)
7%
Flag icon
The cuckoo lays her eggs in other birds’ nests. She is a nesting parasite: some other bird will raise her young cuckoos. The survival of cuckoo chicks depends on the ignorance of other species.
9%
Flag icon
The astronomer’s rule of thumb: if you don’t write it down, it didn’t happen.
15%
Flag icon
IOTTMCO.” Intuitively obvious to the most casual observer.
15%
Flag icon
everyone used the same version of the same operating system, a single security hole would let hackers into all the computers. Instead, there’s a multitude of operating systems: Berkeley Unix, AT&T Unix, DEC’s VMS, IBM’s TSO, VM, DOS, even Macintoshes and Ataris. This variety of software meant that no single attack could succeed against all systems. Just like genetic diversity, which prevents an epidemic from wiping out a whole species at once, diversity in software is a good thing.
23%
Flag icon
“Our software is fragile as well—if people built houses the way we write programs, the first woodpecker would wipe out civilization.”
33%
Flag icon
The hacker didn’t succeed through sophistication. Rather he poked at obvious places, trying to enter through unlocked doors. Persistence, not wizardry, let him through.
63%
Flag icon
The NSA listens rather than talks.”
72%
Flag icon
The place to booby-trap software is where it’s distributed. Slip a logic bomb into the development software; it’ll be copied along with the valid programs and shipped to the rest of the country. A year later, your treacherous code will infest hundreds of computers.
74%
Flag icon
“Any system can be insecure. All you have to do is stupidly manage it.”
79%
Flag icon
1. How was the penetrator tracked? 2. What auditing features exist? 3. How to audit someone with system-level privilege? 4. Supply technical details on how to penetrate computers. 5. How were passwords obtained for the Livermore Crays? 6. How were super-user privileges obtained? 7. Did the penetrator guard against detection?
90%
Flag icon
That’s the problem with talking about security problems. If you describe how to make a pipe bomb, the next kid that finds some charcoal and saltpeter will become a terrorist. Yet if you suppress the information, people won’t know the danger.