View Single Post
Old 03-11-2012, 07:56 PM   #18
geekmaster
Carpe diem, c'est la vie.
geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.
 
geekmaster's Avatar
 
Posts: 6,433
Karma: 10773670
Join Date: Nov 2011
Location: Multiverse 6627A
Device: K1 to PW3
And more misleading info: http://all.net/books/iw/iwardoc.html

Here is an excerpt:

The Thompson `C' compiler designed for the NSA with an embedded login attack is a classic. This early Unix compiler was designed to allow Thompson to login to any Unix system, regardless of changes to the password file, by recognizing and placing a Trojan horse in the login program at compile-time. In addition, the C-compiler was set to propagate this bug in itself whenever it was compiled. Please note that virtually every existing C compiler was compiled either directly or indirectly by a Thompson C compiler, and that bug could be present in Unix systems currently being fielded.

Last edited by geekmaster; 03-11-2012 at 08:10 PM.
geekmaster is offline   Reply With Quote