From mboxrd@z Thu Jan 1 00:00:00 1970 Date: Sun, 8 May 2005 15:07:52 +0100 From: Ralph Corderoy Message-Id: <200505081407.j48E7q006578@blake.inputplus.co.uk> To: 9fans@cse.psu.edu Subject: Re: [9fans] ISP filtering - update (fwd) In-Reply-To: References: <2889.3f7d9e85.4e7aa@blake.inputplus.co.uk> Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="=64541=--" Cc: Topicbox-Message-UUID: 467d7458-ead0-11e9-9d60-3106f5b1d025 --=64541=-- Content-Type: text/plain [Replace this with your comments.] --=64541=-- Content-Type: message/rfc822 Path: blake.inputplus.co.uk!news.theplanet.net!diablo.theplanet.net!newsfeed.esat.net!feeder.news.heanet.ie!feed4.jnfs.ja.net!feed1.jnfs.ja.net!jnfs.ja.net!bath.ac.uk!ccsdhd Newsgroups: comp.os.plan9 From: Ralph Corderoy Subject: Re: [9fans] ISP filtering - update Approved: plan9mod@bath.ac.uk X-Newsreader: trn 4.0-test76 (Apr 2, 2001) X-Complaints-To: abuse@theplanet.net Sender: ccsdhd@bath.ac.uk (Dennis Davis) Nntp-Posting-Date: 23 Apr 2005 22:11:33 GMT NNTP-Posting-Host: 81.78.72.116 Organization: University of Bath Computing Services, UK X-Date: Sat, 23 Apr 2005 22:11:18 GMT Originator: ralph@inputplus.co.uk (Ralph Corderoy) Message-ID: References: <2889.3f7d9e85.4e7aa@blake.inputplus.co.uk> X-Trace: newsg2.svr.pol.co.uk 1114294293 25352 81.78.72.116 (23 Apr 2005 22:11:33 GMT) Date: Mon, 25 Apr 2005 08:59:53 GMT Bytes: 838 Lines: 25 Xref: blake.inputplus.co.uk comp.os.plan9:22700 Hi, Presotto wrote: > I wrote: > > What I don't understand is why the worms don't trigger some harm at > > some point in the future, like setting the hard drive password to a > > random string. Requiring the `master' password from the drive > > manufacturer or OEM would cause enourmous amounts of hassle. The > > worm would have meanwhile re-produced elsewhere so its not `shooting > > itself in the head'. > > I didn't even realize that there were hardware enforced passwords on > disks. I just looked up ata specs and found a whole slew of security > cruft I never knew about. Thanks. c't have recently published an article covering the potential misuse of the ATA security functions so perhaps we'll start seeing some exploits of it now. http://www.heise.de/ct/english/05/08/172/ Cheers, Ralph. --=64541=----