What happens in the copy centre is  not my concern.  They use xerox equipment 
that have built-in processors and which are not online.  When I have to fax a 
signed non disclosure agreement and my fax machine (on VOIP) is having 
transmission problems , or when there is a rare network problem occurance, the 
copy center is it.

As for burning out printers, I am in a small 3 company office (we split the 
costs for rent), and the printer/fax is not kept powered on unless needed. We 
hardly do any printing. And when we do, I use a duplex printer and print 2 up 
on each page.  100 pages of document consumes 25 sheets of paper.  More than 2 
up per page is too difficult to read and to use  a highlighter.  

I can read printed copy while travelling on the metro or bus.


 
------------------


Regards

 Leslie

Mr. Leslie Satenstein
50 years in IT and going strong.
Yesterday was a good day, today is a better day,
and tomorrow will be even better.
 
 




>________________________________
> From: Sorin Toma <[email protected]>
>To: Montreal Linux Users Group <[email protected]> 
>Sent: Wednesday, December 7, 2011 8:31 PM
>Subject: Re: [MLUG] Millions of printers open to devastating hack attack, 
>researchers say
> 
>
>On 12/07/2011 02:30 PM, Leslie S Satenstein wrote: 
>I hand write all my critical stuff, and I go to copycentre to get otherstuff 
>scanned or faxed.  
>>:) then you are smarter than 98% of the rest of us (I've just pull that 
>>number from the hat), but what makes you think the copycentre can't suffer 
>>from the same problem we are discussing here?
> 
>
>>
>>Brother companyt just sent me a patch for their printer's wifi connection. I 
>>really don't know if the patch addresses security concerns, but I suspect 
>>that it does.
>>
>>
>- wireless has nothing to do with the vuln. described. As long as some 
>computer has "only print" access (read: able to reach port 9100 (jd) or 
>510(lpd) or 631(ipp) of the printer) and AFAIK there are no firewalls between 
>printers and the rest of the LAN in any normal network, I repeat, the printers 
>are vulnerable from any internal connection. FCS, even if you connect your 
>mobile phone on an AP and get access to the local LAN, then you can infect all 
>the printers from that LAN using only your phone (ok, it has to be a good 
>smart phone, running some specially crafted software on it), there is no need 
>for a malicious hacker to get access to the mighty print server :)
> 
>This action may force printer manufacturers to make a richer bios, where the 
>only acceptable data would be html5 or equivalent. 
>>- any update has to be digitally signed and in any case there should not be 
>>possible to send a firmware update using the same mechanism
>as normal printing... (at least it should use a web interface
        with auth, or some ftp mechanism)
>
>
>And now let's not panic: From what I can see, there is no way to
        make an "universal virus" - each printer model has a different
        firmware, running on different hardware (more or less), so
        making a real virus is not an easy task (on the contrary, if you
        want just to destroy a bunch of machines, that's easy: just
        write a firmware full of nulls) - I presume we might see (there
        are already on the wild some of them) "targeted" attacks - If we
        need to get into a company like Google let's say, we will
        investigate what kind of printers Google uses internally and
        we'll prepare a special firmware for those models. Again, this
        is not trivial, but an organization with resources can and will
        do it, it's just that an amateur security researcher like me
        will not be able to do it in his spare 2 hrs time (or maybe I am
        just not that good at it, why not?).
> A different, more sneaky, approach would be to download each printer's 
> firmware on the "infection spreading machine" and patch that firmware on the 
> spot - that will keep the firmware version and all the functions identical in 
> the printer, adding the "extra code" will be almost invisible - who check the 
> md5's of his printer firmware dump? (this is more from spy movies that from 
> the real world, but after we saw Stuxnet nothing seems impossible, ain't it?)
>Lastly, just by curiosity, try to run a scan on a random /16 of
        the internet for open ports 9100, 515 or 631 - it's amazing how
        many people put their printers directly on the internet!
>
>
>
>-- 
>Best Regards, 
>Sorin Toma 
>_______________________________________________
>mlug mailing list
>[email protected]
>https://listes.koumbit.net/cgi-bin/mailman/listinfo/mlug-listserv.mlug.ca
>
>
>
_______________________________________________
mlug mailing list
[email protected]
https://listes.koumbit.net/cgi-bin/mailman/listinfo/mlug-listserv.mlug.ca

Reply via email to