-----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Nick FitzGerald Sent: 3. december 2005 00:22 To: [email protected] Subject: RE: [Full-disclosure] Most common keystroke loggers?
Jan Nielsen to me to Jan: > >Obviously, then, your book does not include the phrase "Halting > >Problem"... > > Sorry, I don't follow you there, you mean that the scan would halt the > system ? fair enough, I don't think any method of scanning a target is > fool-proof, no matter how its done. >Ahh, no... > http://en.wikipedia.org/wiki/Halting_problem Good to know, i did not know that this dilemma had a name :-) >It would be _nice_ to do that, but it is an equally fraught problem. >After all, even if you could entirely reliably programmatically >determine that the users's system was compromised, you cannot trust any >response from the system, or that any message you try to send to them >to alert them to this will not be intercepted by some warez put on the >system as a result of the compromise... Good point, I guess I am glad I am not trying to design this system. > ... a > textmessage/SMS might be wiser. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
