lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <542157049.20050811002623@Sniff-em.com>
Date: Wed Aug 10 23:26:43 2005
From: Thierry at sniff-em.com (Thierry Zoller)
Subject: Re: Help put a stop to incompetent computer
	forensics

Dear Jason Coombs,

JC> Interesting. What dictionary are you reading this definition from?
10 years security industry, AV experience, Whatis, and so on.

JC> Whether or not the malware does other things as well, everyone I know
JC> considers a Trojan to be a type of malware that allows an intruder to
JC> gain entry to a system through the front door once the malware has
JC> gained entry through some other means such as tricking the user into
JC> installing it, forcing itself to install a la spyware, or exploiting one
JC> of the many vulnerabilities in Internet Explorer that enable Web sites
JC> to plant and execute arbitrary code.

That's the brainwashed mashup media definition, we should pay
attention they don't suceed too much. Hacker, cracker, whitehat,
blackhat, "they are all alike".

JC> If your proposed definition is the correct one
I don't propose, it's an industry standard, ask kaspersky
and other AV vendors, look at how they categorise these items.

JC> own understanding of this term. But you're going to have to offer some
JC> proof that other people agree with you.
No proof from me here accept pure logic.

JC> Somehow I suspect that Homer would disagree with you, and he is the
JC> proper definitive authority on this subject.
Actually it is that exact definition.

JC> See the story of the fall
JC> of Troy through the use of a Trojan Horse that enabled the whole Greek
JC> army to gain entry through the front gates because of the actions of the
JC> hidden package within the horse.

The industry definition is perfectly within Homers defintion of a Trojan
horse. Did they trojan horse allow them to remotely control them? No,
the trojan horse was something else it pretended. It pretented to be
a present in form of an art piece. What is really was was a hollow
sculpture filled with armed soldiers.

JC> http://classics.mit.edu/Homer/iliad.html



-- 
Mit freundlichen Gr??en
Thierry Zoller
mailto:Thierry@...ff-em.com


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ