lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <11573469EE363D488E4D0F551D731E8901DCF472@NTCAUE01>
Date: Thu Aug 11 23:44:40 2005
From: ccozad at cosco.com.au (cozadc/Cozad, Chris)
Subject: Re: Help put a stop to
	incompetentcomputerforensics

Jason (and the rest of the list),

 

I have been reading this list for a few years now, and very rarely
contribute. Generally a lot of the posts are not relevant to my
business, but it is good to read about other technologies, and different
ways of thinking.

 

BUT....

 

This playing with semantics is just foolish. I think there are 2
different terms in use in this argument.

 

The first use of the word Trojan explains the installation of software,
with another piece of software being installed in the background,
unknown to the user. This second piece of software could be a backdoor,
could be a virus, hell - it could install some lottery software! The
term Trojan is used to describe the unintentional installation of the
software by the user.

 

Jason' use of the word comes into play after the software is installed.
He seems to be using the words Backdoor and Trojan interchangeably. The
antivirus vendors tend to use this type of terminology. If it contains a
Backdoor, it is a Trojan. This is after the fact though, so describes a
slightly different thing to what everyone is shooting him down for. It
is the word the media would use to describe a backdoor, and that most
non-IT people would understand, so it is not wrong.

 

In my mind (and please remember, I am just some dude with email access,
so take what I say with a grain of salt...) software can contain a
Trojan Horse, and that Trojan could be a Backdoor.

 

Two sentences spring to mind:

 

"That software contains a Trojan" - general meaning - "That software
contains another program"

"Someone has Trojan'ed my PC" - Jasons meaning - "Someone has a backdoor
into my PC"

 

Both are acceptable, and everyone on this list would know the difference
if it was put to them like that.

 

Chris Cozad

Network Engineer

 

Five Star Shipping & Agency Company Pty. Ltd.

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050812/5a97cae3/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ