lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <200403052003.i25K3QF3016348@turing-police.cc.vt.edu> From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu) Subject: [inbox] Re: Re: E-Mail viruses On Fri, 05 Mar 2004 13:36:10 CST, Curt Purdy said: > Ah, I wish... An alternative is to allow only a proprietary extension > through, like .inc Legitimate senders would rename the file, be it .exe > .doc .jpg, indicate in the body of the message what the true extension is, > and the receiver merely renames it. A little trouble yes, but it virtually > eliminates email propagated viruses from the corporation. So let's see.. the same bozos who read the text part of the virus, get the password, and use that to unzip the rest of the virus won't read the text part, get the rename to do, and..... Color me dubious.... -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 226 bytes Desc: not available Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040305/21933829/attachment.bin
Powered by blists - more mailing lists