Results 1 to 10 of 10

Thread: Security Circus by Linux On GUI isolation

  1. #1
    Join Date
    Nov 2011
    Posts
    51

    Security Circus by Linux On GUI isolation

    I have many GUI isolation or you can say requisitions for example an OpenOffice word processor and simple Tetris game. Both of this grant access to my X server. There is hardly any isolation of application among these two applications. They are running or can run or different user account and the designed architecture of X server. So is there any possible way to for Security Circus On GUI isolation on Linux OS? Please help me!

  2. #2
    Join Date
    May 2011
    Posts
    398

    Re: Security Circus by Linux On GUI isolatio

    This kind of situation becomes difficult for the administrator to add GUI isolation among the application. I have read a scenario over the web about a professional who was a presenter of Black Hat in the year 2005 who later got famous on the Security virtualization field. I have followed the articles of the professional about this GUI isolation that is the Security circus but I failed to follow the hard steps. I guess its hardly possible for we users.

  3. #3
    Join Date
    Mar 2011
    Posts
    490

    Re: Security Circus by Linux On GUI isolatio

    Nonetheless, that being declared ; this is categorically nothing late. It is indicating that X11 was never intended to be mainstream, in any event not from a security perspective. I accept it gives a small demo in that piece, you are able to attempt it for yourself and see precisely what she is expounding on the subject of. By and by this is a cork for qubes OS . Its is indicating that disconnection in the middle of distinctive GUI requisitions is below average, in that they every single have acces to the same input/output mechanisms.

  4. #4
    Join Date
    May 2008
    Posts
    250

    re: Security Circus by Linux On GUI isolation

    One program or application can "spy" on an alternate one. This doubtlessly carries concerns for both security and security as banshee can look at what's event in firefox (you know where you're logging into your managing an account locale. She displays an elective in qubes in that basically the OS itself is only a hypervisor and each provision is virtualized inside its particular case, this is one go at to disconnecting the GUI applications access to one another, yet a rather asset escalated one.

  5. #5
    Join Date
    Jun 2011
    Posts
    383

    re: Security Circus by Linux On GUI isolation

    This is one explanation why I am positively looking send to Wayland. All however its my grasping that Wayland will be remarkably reliant on x-server at the outset. I doubt that the Wayland undertaking is mindful of this insight.

  6. #6
    Join Date
    Jul 2011
    Posts
    350

    re: Security Circus by Linux On GUI isolation

    Well its possible is that what they call an "exceptionally-made": noxious media document might create the honest to goodness form to in any event try to do the embodiment of a thing. That could be a quite particular scenario that not countless folks stand a possibility of needing to bargain with, however.

  7. #7
    Join Date
    Jul 2011
    Posts
    322

    re: Security Circus by Linux On GUI isolation

    There's an alternative ready now: equipment is moderately modest, and so delicate errands might be performed on discrete, devoted frameworks that are not utilized for anything favorable or enjoyment. That would be as likely as not as accurate in the adventure space, however for little-to-medium shops its still worth researching. It's cheaper than an operated utility, and as likely as not cheaper than an adventure permit for virtual desktop results.

  8. #8
    Join Date
    Aug 2011
    Posts
    418

    re: Security Circus by Linux On GUI isolation

    Injecting enter-strokes into a project, this is where things get more engaging, the idea being a browser would be able to be misused then utilized to infuse code into a different provision that is running. In any case as OpSecShellshock sharp out, from an assailant's outlook this doubtlessly isn't the best equipped track. That whole assault is dependent upon the chance that you are utilizing that net program, that is traded off at the careful instant you're moreover utilizing whatever requisition could be traded off by it.

  9. #9
    Join Date
    Aug 2011
    Posts
    397

    re: Security Circus by Linux On GUI isolation

    By opening malicious media record, and attempting to bargain a program, obviously in hypothesis you might actually have X server open the program or provision at that focus, then infuse code. That being declared I'm honestly sure any individual could ended up being a small something greater than suspicious about sparking a tune and suddenly their program opens, accidents and there is now system action that wasn't there.

  10. #10
    Join Date
    Jul 2011
    Posts
    235

    Re: Security Circus by Linux On GUI isolation

    Like all research its one of those. Hey gentlemen this can happen. Reasonably if you're agonized over this and don't have an option that is such as NoScript, than you're perhaps making a misguided choice in terms of things that are imaginable to happen to you.

Similar Threads

  1. Hotspot security for AP isolation
    By maheja in forum Networking & Security
    Replies: 5
    Last Post: 23-11-2010, 02:34 AM
  2. WRT54G AP Isolation
    By foraman in forum Networking & Security
    Replies: 4
    Last Post: 23-11-2010, 01:07 AM
  3. How Client Isolation or AP isolation work
    By arjun rantu in forum Networking & Security
    Replies: 4
    Last Post: 23-11-2010, 12:19 AM
  4. Isolation Levels in SQL
    By D_chapple in forum Software Development
    Replies: 5
    Last Post: 13-01-2010, 08:39 AM
  5. Torris isolation
    By strangist in forum Overclocking & Computer Modification
    Replies: 3
    Last Post: 01-12-2008, 04:45 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,711,676,445.25235 seconds with 17 queries