21.03.2013 Views

Problem - Kevin Tafuro

Problem - Kevin Tafuro

Problem - Kevin Tafuro

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Often, these commands will need to run with superuser privileges (for example,<br />

tcpdump). Depending on your threat model, such commands can possibly be more<br />

useful because they’re less subject to attacks from local users.<br />

This approach can be a reasonable way of collecting data from the network. However,<br />

note that attackers could possibly feed you packets in a predictable manner,<br />

designed to reduce the amount of entropy available from this source.<br />

See Also<br />

Recipes 1.7, 1.8, 11.19<br />

646 | Chapter 11: Random Numbers<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!