lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <4048EE3F.1080704@onryou.com> From: lists2 at onryou.com (Cael Abal) Subject: Re: E-Mail viruses -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > Methinks you misunderstand. Only the proprietary extension, i.e. .inc > or .xyz or .whatever, would be allowed through, and since virus > writers would never use this extension, it would eliminate ALL viruses > at the gateway. The nice thing about this approach is that it > completely eliminates the need for any anti-virus on the mail server > since all virus attachments are automatically dropped without the need > for scanning. Quite a simple, yet elegant solution, if I do say so > myself. Curt, Interesting idea, provided your org is not specifically targeted -- although admittedly none of the currently-touted solutions would do much against a direct attack. Personally I'd dispute this solution's elegance, anything which requires substantial user behaviour change (and doesn't drastically improve the virus/worm situation across the board) is an ugly kludge. Cael -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (MingW32) iD8DBQFASO4+R2vQ2HfQHfsRAsGgAJ9H6YmejXCkIcV216qGWo+i+aqIDQCffHRv Ht7Ccmlw++aAEcQu9Lw6Fzo= =QhDq -----END PGP SIGNATURE-----
Powered by blists - more mailing lists