Interview with a Ninja, Part I

Mick chats with a highly skilled, highly ethical system cracker.
To Be Continued

Dear readers, at this point in the interview, I've got good news and bad news. The bad news is, I'm out of space for this month's column and will have to wait for next time to share the rest of this fascinating and fun conversation with you.

The good news is, in Part II, you'll learn about Ninja G's opinions on the role of firewalls, the corrupting influence of hacking skills, the importance of responsible disclosure and his predictable yet surprising answer to the eternal question of who is more elite, pirates or ninjas. I hope you look forward to it!

Mick Bauer (darth.elmo@wiremonkeys.org) is Network Security Architect for one of the US's largest banks. He is the author of the O'Reilly book Linux Server Security, 2nd edition (formerly called Building Secure Servers With Linux), an occasional presenter at information security conferences and composer of the “Network Engineering Polka”.

______________________

Comments

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

Wew

earlan's picture

Wew, absolutely amazing :D
"By saying “neutering root completely” are you referring to SELinux and other role-based approaches to security? The “root is omnipotent” aspect of Linux's security model has always been its soft spot, hasn't it? "

Geek Guide
The DevOps Toolbox

Tools and Technologies for Scale and Reliability
by Linux Journal Editor Bill Childers

Get your free copy today

Sponsored by IBM

Webcast
8 Signs You're Beyond Cron

Scheduling Crontabs With an Enterprise Scheduler
On Demand
Moderated by Linux Journal Contributor Mike Diehl

Sign up and watch now

Sponsored by Skybot