lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: simon at snosoft.com (ATD)
Subject: A worm...

I agree with you 100% but you do realize that the challenge is to
educate executives that do not understand, or care to understand
security.  They just "want it to work".  Being an executive myself, I
understand that mentality, but I also understand the value of knowledge.


On Thu, 2003-06-26 at 10:59, Nexus wrote:
> ----- Original Message ----- 
> From: "Peter Kruse" <kruse@...sesecurity.dk>
> To: <full-disclosure@...ts.netsys.com>
> Sent: Thursday, June 26, 2003 1:57 PM
> Subject: SV: [Full-Disclosure] A worm...
> 
> [snip]
> 
> > malicious code inside the new rar format and spread it. I suppose it?s
> > fairly easy to write a worm that packs itself with a random password and
> > inserts this into a e-mail sent to the victim. This way it will pass
> > most AV-gateway scanners since they won't have access to scan inside the
> > zipe archive.
> 
> In that case [the content analysis engine] should automatically quarantine
> the attachment and await human intervention.
> Otherwise, why bother with them at all ?   It's an odd world when the
> preferred solution is an application rather than user edumacation.
> 
> Cheers.
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030626/674d80ff/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ