lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030820183523.GA30039@diamond.madduck.net>
From: madduck at madduck.net (martin f krafft)
Subject: Re: Administrivia: Testing Emergency Virus Filter..

also sprach Thor Larholm <lists.netsys.com@...ript.dk> [2003.08.20.0038 +0200]:
> The problem with virii such as this is not the software but the
> wetware - the bewildered enduser who fails to use his machine in
> a secure manner responsible to his community.

Only partially right, the other part is bugs in software and
automation techniques that make viruses much easier and effective.
Moreover, it's operating system design. If I caught a virus on my
UNIX system, I might be sending it on if the virus is smart enough
to figure out a way to get into control and to execute sendmail.
However, it won't be able to infest the system and other local
users.

-- 
martin;              (greetings from the heart of the sun.)
  \____ echo mailto: !#^."<*>"|tr "<*> mailto:" net@...duck
 
invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver!
 
printer not ready.
could be a fatal error.
have a pen handy?
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030820/170dabdd/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ