[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1056644384.32765.59.camel@localhost.localdomain>
From: simon at snosoft.com (ATD)
Subject: A worm...
I agree with you 100% but you do realize that the challenge is to
educate executives that do not understand, or care to understand
security. They just "want it to work". Being an executive myself, I
understand that mentality, but I also understand the value of knowledge.
On Thu, 2003-06-26 at 10:59, Nexus wrote:
> ----- Original Message -----
> From: "Peter Kruse" <kruse@...sesecurity.dk>
> To: <full-disclosure@...ts.netsys.com>
> Sent: Thursday, June 26, 2003 1:57 PM
> Subject: SV: [Full-Disclosure] A worm...
>
> [snip]
>
> > malicious code inside the new rar format and spread it. I suppose it?s
> > fairly easy to write a worm that packs itself with a random password and
> > inserts this into a e-mail sent to the victim. This way it will pass
> > most AV-gateway scanners since they won't have access to scan inside the
> > zipe archive.
>
> In that case [the content analysis engine] should automatically quarantine
> the attachment and await human intervention.
> Otherwise, why bother with them at all ? It's an odd world when the
> preferred solution is an application rather than user edumacation.
>
> Cheers.
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030626/674d80ff/attachment.bin
Powered by blists - more mailing lists