Peter Wu wrote:

Well, some of the recent worms are activated by end users open an attachment, which could be an vbs or an executable. It is the executable that infects the system as most Windows users log in as an Administrator role.

Fine, if it is a problem of the last windblowz version, I say OK, but AFAIK it's a problem of all M$hit versions ... Do you know, *.DOC file can contain any executable ? It is executed if "text" file is opened ... Do u know about something more stupid/dangerous ?

Guy, tell me why unix users don't do that ? (working as root)


What if root on a Linux box open an attachment to a mail he receives today
and that attachment happens to be some executable that can ruin the
system?

Let's try it, and u'll see it's easy to say, but hard to do.


If u open infected attachement in good written application
nothing happens. If u save it to file, u have to set up
exec permissions before running it. Do you thing, some diletant
is able to make it ? I think not.

U must be pretty skilled admin to setup everything let
some virus in attachement is activated by opening the email.

(FYI on qmail root have no maildir/mbox.)



I really doubt switching to Linux can stop virii from spreading.



Ok Tom, how many viruses have been infecting your linux box ? I only read about them.

noro


-- [EMAIL PROTECTED] mailing list



Reply via email to