Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Banks eye bootable Linux CDs
ZDNet Australia ^ | 20050324 | Renai LeMay

Posted on 03/24/2005 7:15:21 AM PST by N3WBI3

Australian company Cybersource says it's currently talking to two domestic banks about providing Linux-based bootable CDs to consumers to ensure Internet banking security.

The company yesterday released information about its Online Banking Coastguard solution. Coastguard is based upon Knoppix, a Linux distribution which boots entirely from CD and is known for its automatic hardware detection features. Cybersource has included Mozilla Firefox as the sole browser for Internet banking.

"We've brought it to the attention of several banks, and are in reasonably serious discussions with two of them," said Rohan Tronson, Cybersource's Coastguard product manager. Although he wouldn't say which companies were involved, Tronson acknowledged his company was talking to both national and regional players.

"One of them has considered the technology, but has already made a commitment to another technology, which is tokens. While it's [Coastguard] not incompatible with tokens, they've already made certain agreements with a certain company involved with those tokens. They've chosen at this stage not to make it something that they'll carry as a major product," Tronson said.

(Excerpt) Read more at zdnet.com.au ...


TOPICS: Business/Economy; Miscellaneous; Technical
KEYWORDS: knoppix; linux
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-96 next last
To: Golden Eagle
We have both been doing that, we are having a hypothetical discussion because neither of us knows the systems they set up.

I am saying if Linux respects NTFS ACL's on files and the user reading the mail is not mapped to someone who has the rights on those ACL's youre pretty safe..

61 posted on 03/24/2005 8:56:47 PM PST by N3WBI3
[ Post Reply | Private Reply | To 60 | View Replies]

To: BearWash
Micro-VAX = Ultimate PC!!!
62 posted on 03/24/2005 9:00:39 PM PST by Chode (American Hedonist ©®)
[ Post Reply | Private Reply | To 58 | View Replies]

To: N3WBI3

If, If, If, sure if you setup enough qualifiers, you can be safe with anything. Problem is, too many guys like Rifleman above, who swear by the security of Unix/Linux, but don't provide anything concrete like I did with the latest Homeland Security report, which actually showed it riddled with holes. That's where I start to have a problem, too much false and misleading info about how secure Linux supposedly is.


63 posted on 03/24/2005 9:02:15 PM PST by Golden Eagle (Team America)
[ Post Reply | Private Reply | To 61 | View Replies]

To: N3WBI3
Yeah, that's what I want to do - reboot my entire system (typically running about a dozen apps simultaneously) into an alien OS, to do online banking.

Why not just require us to stand on our heads, too?

64 posted on 03/24/2005 9:04:56 PM PST by Hank Rearden (Never allow anyone who could only get a government job attempt to tell you how to run your life.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Golden Eagle

Ah, but I can say "No magnetic media will be used". It's all under the engineer's control, and how freakish paranoid he wants the system to be. And freakish paranoid sounds just fine for banking.


65 posted on 03/24/2005 9:25:10 PM PST by Codename - Ron Benjamin ("Forbidden fruit? We have forbidden fruit? Hey Eve... we have forbidden fruit!!!!!")
[ Post Reply | Private Reply | To 55 | View Replies]

To: Chode
I love Linux/Unix, but wonder how many years it will be before PC operating systems catch up to OpenVMS. VMS was always designed for big iron and then scaled down instead of scaling up a CP/M toy. Linux has a disadvantage having to run on PC architectures even if the software is first rate.

Last week I had a horrible partition table nightmare on the Windows side after replacing a PC drive and motherboard at the same time. Everything conceivably went wrong that could including flaky backups that inexplicably failed to include a few files. The only thing that stopped it from being a complete disaster was DiskDrake, the built-in partitioning software in Mandrake, along with an old backup tape I found in the shed.

With OpenVMS, if you had an image backup and a good hard drive, you were always back in business within two hours.

66 posted on 03/24/2005 10:18:21 PM PST by steve86
[ Post Reply | Private Reply | To 62 | View Replies]

To: Golden Eagle; N3WBI3
Once the local magnetic drive is mounted, ...

There's the rub, guys. Knoppix does not automatically mount the local media. So clueless users would not be exposing their systems.

Knoppix does allow you to mount drives, but it requires an overt action on the part of the user.

67 posted on 03/25/2005 5:15:51 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 57 | View Replies]

To: BearWash
Linux has a disadvantage having to run on PC architectures even if the software is first rate.

No Linux also will run on a mainframe

68 posted on 03/25/2005 6:06:49 AM PST by N3WBI3
[ Post Reply | Private Reply | To 66 | View Replies]

To: BearWash
i've still got TK-50 images laying around from the 80's... 8^)
69 posted on 03/25/2005 7:23:04 AM PST by Chode (American Hedonist ©®)
[ Post Reply | Private Reply | To 66 | View Replies]

To: Golden Eagle
Call whatever you want. I have used MS OS's since DOS 2.1 and Linux since Yggdrasil (also several other *nix's and VMS, a bit) on hundreds of PC's and have had exactly one Linux box compromised (I found a root kit and an ftp server running on a kitchen sink installation of, as I recall Slackware, in 1996). I have seen hundreds of owned Windows boxes in that time.

Now, WXPSP2 is _much_ more secure than its predecessors and Gates and Co are working hard to clean up their act. But until PC's were shipping with XPSP2 a consumer could not even download the needed updates quickly enough to avoid being hag-ridden. And yes, I know it could be done and I know how to do it but a consumer could not.

That link you posted:

http://www.us-cert.gov/cas/bulletins/SB05-082.html

is a list of "current", whatever that means, vulnerabilities. Most of them, Windows and otherwise, seem to be in applications, some obscure, not the core OS. No mention is made of the hundreds of thousands (millions?) of unpatched Windows PC's that exist as zombies spewing spam and worms and stealing their owner's personal data. The few rooted L/Unix machines are mostly warez ftp and chat servers .

In any case, I have a challenge, build a Windows PC with all the current patches and a Linux PC with current security settings and updates, put 'em outside the firewall and see how long they last. It has been months since I tried that, I would be interested to know the results.

When I did it, the WXP PC was infected within hours and the Linux PC never was. I ran them for about 6 weeks, reinstalling WXP several times. It was fun to watch the worms hammer away on WXP and the script kiddies chip at Linux's locked door. By the way, this test gives Windows a huge head start, as you will not be exposing IE to the world by browsing with it.
70 posted on 03/25/2005 7:24:12 AM PST by Rifleman
[ Post Reply | Private Reply | To 53 | View Replies]

To: N3WBI3
Linux has a disadvantage having to run on PC architectures even if the software is first rate.
No Linux also will run on a mainframe

I know that. Was at an introduction when IBM announced Linux would run on a mainframe series. My point stands. Linux has to have the capability of running on PC architectures which compromises it.

71 posted on 03/25/2005 8:14:44 AM PST by steve86
[ Post Reply | Private Reply | To 68 | View Replies]

To: BearWash
having to run on PC architectures

Ehem... you know that the code for PC architecture is not used when compiling for other platforms, right? And that architecture specific code is independent from each other and from arch-independent?

Computer code is an abstraction of the hardware. Nothing more. Designing directly for a particular hardware is old school; now one designs for needs, not hardware. If there's a capability only big iron chips can handle, it can be implemented in big iron, and other platforms either get a "sorry not implemented" or, if not too expensive, some emulation.

In short I see no reason why PC support would detriment from supporting other architectures.

72 posted on 03/25/2005 9:24:58 AM PST by Codename - Ron Benjamin ("Forbidden fruit? We have forbidden fruit? Hey Eve... we have forbidden fruit!!!!!")
[ Post Reply | Private Reply | To 66 | View Replies]

To: Rifleman
have had exactly one Linux box compromised (I found a root kit and an ftp server running on a kitchen sink installation of, as I recall Slackware, in 1996). I have seen hundreds of owned Windows boxes in that time.

Yeah, that's probably about the right ratio of Windows systems to Linux ones.

Now, WXPSP2 is _much_ more secure than its predecessors and Gates and Co are working hard to clean up their act. But until PC's were shipping with XPSP2...

Now you're being more reasonable. And in the past, there wasn't enough Linux machines anywhere for anyone to care to find holes in them. As you can see from the Homeland Security report though, times are a changin'.

That link you posted is a list of "current", whatever that means, vulnerabilities.

Yep, a list of current vulnerabilities, compiled by host O/S every week by Homeland Security. If you have a different reputable source that compares the two platforms ina similar manner, I'd be interested in seeing it. But for now, this is the best there is.

In any case, I have a challenge, build a Windows PC with all the current patches and a Linux PC with current security settings and updates, put 'em outside the firewall and see how long they last.

Well if they have all the latest patches, they should both last for quite a long while. Nowhere near a difference to compare one to a cardboard box, and the other to a safe.

When I did it, the WXP PC was infected within hours and the Linux PC never was.

Now you're making questionable statements to support your position. You're claiming you patched a box with all the latest available security upgrades, then put it on the internet, and even with all the latest patches installed, within 6 hours it was compromised?

Sounds like horsesh!t to me, Mr. Rifleman. Either that, or your network has an unusual amount of malware running on it with no patches available to stop it. I suggest you contact Microsoft and numerous other security firms, I'm sure they'd like to know more about all these zero day exploits floating around your network, with no patches available anywhere to stop them.

73 posted on 03/25/2005 10:24:57 AM PST by Golden Eagle (Team America)
[ Post Reply | Private Reply | To 70 | View Replies]

To: Codename - Ron Benjamin
Ehem... you know that the code for PC architecture is not used when compiling for other platforms, right?

Actually, you and I don't disagree. I should have made myself clearer. I'm not suggesting that non-Intel architecture-specific code, say IBM System 370 code, is in any way diminished or compromised by the architecture specific code of the Intel/AMD versions. I didn't ever mean to imply that. But the PC family code is necessarily written differently than it would be if supporting PC-type interrupts and DMA and ISA derivatives and FAT-32 filesystems and partition schemes weren't such a major goal. Very clearly these legacy aspects of the PC do influence PC Linux ports -- how else could it be?

I know it is considered "old-school" to design for specific hardware. However, do not make the mistake of thinking that old school is necessarily bad and cutting edge fads are always the way to go. You'll be bleeding profusely in several areas of your life if that is your consistent philosophy. There are a lot of positive things to be said for an integrated, proprietary system architecture. Cost, of course, isn't one of them.

74 posted on 03/25/2005 11:09:19 AM PST by steve86
[ Post Reply | Private Reply | To 72 | View Replies]

To: BearWash
But the PC family code...

Ok, we agree then in that PC design, even for the same kernel source tree, doesn't influence the other architectures and won't, by itself, make the "Linux System 370" port less robust. The System 370 will simply ignore FAT, ISA, DMA... and use their own way.

Now, about "old school", I concede using the term was not necessary. I didn't had any intention to start a "old times, new times" debate.

There are a lot of positive things to be said for an integrated, proprietary system architecture.

Agreed. Still, I probably won't be able to perceive any real engineering difference (the non-PC branch almost got it anyway), and the saved time and reused code will easily make up for it.

75 posted on 03/25/2005 12:39:24 PM PST by Codename - Ron Benjamin ("Forbidden fruit? We have forbidden fruit? Hey Eve... we have forbidden fruit!!!!!")
[ Post Reply | Private Reply | To 74 | View Replies]

To: Golden Eagle
Did you read what I wrote? The pcs were each patched, windows via MS update, Linux via apt-get with the latest (at the time) updates. They were both placed _outside_ my firewall (so how would the state of my internal network have anything to do with this test?)

The xp machine was comprimised within hours (if it had not been behind the firewall while dling the umpty megabytes of MS updates, it would have been infected in minutes. Do you deny that pcs were shipping this way before SP2 started shipping?). The Linux machine never was.

No day zero exploits, just typical MS.

You know, I have never denied that MS is getting better or claimed that Linux/Unix is perfect, but you have been ignoring the points that your opponents make, setting up strawmen and making claims that just are not so re the security problems of windows for long enough to exhaust my patience.

Windows sucks less than it used to but is still a dangerous mess in the hands of a less than technically skilled user. MS makes mediocre software but is brilliant at locking its users into its line with proprietary data formats,effective advertising and predatory marketing practices. I make probably 30% of my income fixing the security, virus and malware problems of desparate windows users. It is dull and unrewarding (except for the cash) and I long for a day when I can work on better products. I wouldn't even mind if MS sold them.
76 posted on 03/25/2005 4:50:22 PM PST by Rifleman
[ Post Reply | Private Reply | To 73 | View Replies]

To: E. Pluribus Unum
"This would solve all virus issues. Every time you boot up, you boot with a clean install."

BartPE and WinPE Give You CD-Bootable Windows

77 posted on 03/25/2005 5:01:08 PM PST by Southack (Media Bias means that Castro won't be punished for Cuban war crimes against Black Angolans in Africa)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Southack

I'd heard of people making bootable Windows CDs, but I hadn't seen it. Thanks.


78 posted on 03/25/2005 5:26:52 PM PST by E. Pluribus Unum (Drug prohibition laws help fund terrorism.)
[ Post Reply | Private Reply | To 77 | View Replies]

To: Codename - Ron Benjamin

Yep, I think my original message was written about midnight after a full day of writing Terri posts and it wasn't very clear.


79 posted on 03/25/2005 7:04:47 PM PST by steve86
[ Post Reply | Private Reply | To 75 | View Replies]

To: N3WBI3

What the hell is a modem?


80 posted on 03/25/2005 7:06:27 PM PST by July 4th (A vacant lot cancelled out my vote for Bush.)
[ Post Reply | Private Reply | To 7 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-96 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson