lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <05f001c4dc89$b6f2eb20$0e3eac18@MLANDE>
From: mlande at bellsouth.net (Mary Landesman)
Subject: A suggestion to all AV vendors... 

Trend Micro's PC-cillin Internet Security 2005 already has a vulnerability
assessment feature that lists missing patches and needed updates.

It also scans for spyware via the system registry.

> The A/V vendors have known for several years now exactly how not to
> send "a virus was cleaned from your email by ShinyAV" spam, but they keep
> doing it anyhow, just to get brainshare for ShinyAV.

The alerting feature was put into place long before email spoofing became a
problem. The issue with the alerts - as annoying as they are - has much more
to do with clueless admins who turn them on and far less to do with the a/v
vendors (though there are a few instances of market-happy a/v vendors who do
it by default).

It's an unfortunate reality that the masses expect the antivirus vendors to
step up to the plate and cure whatever ails their PC. Even user-invited
spyware has been added to the list, along with spam, phishing scams, and now
patch management. And despite their attempts to service this demanding
market, it seems many enjoy bashing the antivirus vendors second only to
bashing Microsoft.

-- Mary


----- Original Message ----- 
From: <Valdis.Kletnieks@...edu>
To: "bipin gautam" <visitbipin@...oo.com>
Cc: <full-disclosure@...ts.netsys.com>
Sent: Tuesday, December 07, 2004 10:50 AM
Subject: Re: [Full-Disclosure] A suggestion to all AV vendors...



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ