lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <4046A6E2.9040704@cs.curtin.edu.au> From: maclenna at cs.curtin.edu.au (Alexander MacLennan) Subject: Backdoor not recognized by Kaspersky rm -rf / that should do it Nick FitzGerald wrote: > Ron DuFresne <dufresne@...ternet.com> wrote: > > >>>how about the smtp server simply rejecting mail from spoofed hosts ? >>>as all the viruses generate spoofed hosts and it is very easy for any >>>smtp server to do a dns lookup on the sending server, if the hostname >>>/ ip address do not match reject the message. >> >>Finally some sanity marks this thread! > > > "sanity"?? > > Care to define the "nearly foolproof" "spoofed hosts detection" > algorithm that will not have an unbearably high false-positive > rejection rate?? > > > Regards, > > Nick FitzGerald > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html > > > > !DSPAM:4046a529202801981333611! > > >
Powered by blists - more mailing lists