, 18.9.2010:
Von: Georgi Guninski gunin...@guninski.com
Betreff: [Full-disclosure] Gödel and kernel backdoors
An: full-disclosure@lists.grok.org.uk
Datum: Samstag, 18. September, 2010 15:51 Uhr
http://plus.maths.org/content/goumldel-and-limits-logic
Gödel and the limits of logic
Quote
On Mon, Sep 20, 2010 at 01:03:21AM -0700, Hurgel Bumpf wrote:
The solution could be a virtualized operating system, which has a control
layer between the operating system and the hardware abstraction layer.
Changes to data could be non-persistent in the first step, and only written
to the
On Mon, 20 Sep 2010 01:03:21 PDT, Hurgel Bumpf said:
The solution could be a virtualized operating system, which has a control
layer between the operating system and the hardware abstraction layer. Changes
to data could be non-persistent in the first step, and only written to
the hdd after a
Nowadays most vendors interferes and alters *a lot* in your operating system,
from hooking Win32 API functions to modification of the IAT.
It's only a question of who came first, the malware or the protection program.
On Sun, Sep 19, 2010 at 00:30, Giuseppe Fuggiano
giuseppe.fuggi...@gmail.com
News flash: Computers are just not secure enough for us to use.
But, I don't use computers ... only non-deterministic Turing machines ;)
--
But, for my own part, it was Greek to me. -- William
Shakespeare, Julius Caesar
___
On Sat, 18 Sep 2010, Georgi Guninski wrote:
Another result that derives from Gödel's ideas is the demonstration that
no program that does not alter a computer's operating system can detect
all programs that do.
What is impossible is reliable and perfect discrimination between good
and bad
On Sun, Sep 19, 2010 at 06:21:35PM +0200, Pavel Kankovsky wrote:
On the other hand, It is possible to detect all bad programs if it is
allowed to err on the safe side and mistake some good programs for bad
programs. An extreme example is to call all programs bad unless their
exact code appears
nevermind the fact that a good program in your list may contain as yet
unknown vulnerabilities which mean it's actually bad.
On Sep 19, 2010 7:08 PM, Georgi Guninski gunin...@guninski.com wrote:
On Sun, Sep 19, 2010 at 06:21:35PM +0200, Pavel Kankovsky wrote:
On the other hand, It is possible to
i doubt this can be remotely implemented in practice because of
dynamic code like |eval| and mobile code.
Because we all shout at and blacklist browsers when a website gets
hacked and starts monitoring users' actions.
On a more serious note, try a program, like Comodo's Firewall. You can
http://plus.maths.org/content/goumldel-and-limits-logic
Gödel and the limits of logic
Quote:
Another result that derives from Gödel's ideas is the demonstration that
no program that does not alter a computer's operating system can detect
all programs that do. In other words, no program can find
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 18/09/2010 20:51, Georgi Guninski wrote:
http://plus.maths.org/content/goumldel-and-limits-logic
Gödel and the limits of logic
Quote:
Another result that derives from Gödel's ideas is the demonstration that
no program that does not alter
On Sat, 2010-09-18 at 22:51 +0300, Georgi Guninski wrote:
http://plus.maths.org/content/goumldel-and-limits-logic
Gödel and the limits of logic
Quote:
Another result that derives from Gödel's ideas is the demonstration that
no program that does not alter a computer's operating system can
On Sat, Sep 18, 2010 at 3:30 PM, Giuseppe Fuggiano
giuseppe.fuggi...@gmail.com wrote:
On Sat, 2010-09-18 at 22:51 +0300, Georgi Guninski wrote:
all programs that do. In other words, no program can find all the
viruses on your computer, unless it interferes with *and alters* the
operating
13 matches
Mail list logo