lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3F54555D.18923.1C1D133B@localhost>
From: m.graf at firmenwelt.de (Marcus Graf)
Subject: Tracking a virus by logging infected machines

Richard M. Smith wrote:

> Not that I want to encourage virus writing, but I think it would be very
> helpful to gather infection statistics if a  virus were to keep a log of
> the IP addresses of all the machines it infected.  The log could be

I don't think that it would be very helpful. Many of the unsecured 
machines where the virus will be successful are private PCs with a 
dialup internet access and are changing their IPs in short intervals. 
IMHO your IP list would be worthless within some hours or even some 
minutes.

Ciao
  Marcus

-- 
Windows is not the answer.
Windows is the question and the answer is no.



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ