Re: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-12 Thread Steve Friedl
On Sat, Aug 13, 2005 at 04:49:45AM +, Jason Coombs wrote: > Anyone presumptuous enough to arbitrarily define technical terms without > considerable careful thought and then publish the arbitrary text and call > it a 'dictionary' should be shot. Might it not be a bit more tolerant of other view

Re: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-12 Thread Jason Coombs
J.A. Terranson wrote: > SANS is a for profit corp., > and was run as such even when > they were playing possum as a > non-profit. > They are *not* a "disinterested > third party" any more than the > anti-virus firms are - and not > many people would use *them* > as an authoritative reference To dr

Re: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-11 Thread Nick FitzGerald
Jason Coombs to J.A. Terranson: > > The simple fact of the matter is that > > "what matters" *IS* the definition, > > and you full well know it. What > > happened here is you slipped and > > fell, and rather than admitting it > > you're crying foul - shame on you! > > I didn't disagree that the

Re: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-11 Thread Erik Kamerling
sophistry On Thursday 11 August 2005 22:39, Jason Coombs wrote: > My conclusion is that I slipped and fell because the definition has changed > and computer dictionaries haven't caught up yet. > > As for whether or not you'd roast me in front of the judge, > > 'Your honor, the evidence shows that

Re: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-11 Thread Valdis . Kletnieks
On Fri, 12 Aug 2005 02:39:37 -, Jason Coombs said: > Who roasts who at trial? It depends on the evidence If it just depended on the evidence, we wouldn't need expert witnesses, would we? If the opposing expert witnesses were auto mechanics, and one doesn't know that every other mechanic in

Re: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-11 Thread Jason Coombs
J.A. Terranson wrote: > The simple fact of the matter is that > "what matters" *IS* the definition, > and you full well know it. What > happened here is you slipped and > fell, and rather than admitting it > you're crying foul - shame on you! I didn't disagree that the broader definition of Troja

Re: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-11 Thread J.A. Terranson
On Wed, 10 Aug 2005, Jason Coombs wrote: > Chuck Fullerton wrote: > > "A Trojan horse is a program that appears to have some useful or benign > > purpose, but really masks some hidden malicious functionality." > > > > "A Backdoor is a program that allows attackers to bypass normal security > > co

Re: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-11 Thread Brian Anderson
How many of you are lawyers back to what seemed to be the original point: Data on a drive is just data, unless you can prove how it was created. And generally the data in question can't prove itself, external factors have to be considered. -- * Brian L. An

Re: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-11 Thread ASB
Hey Jason, you really have to make up your mind about whether the old definition is archaic and thus obsolete, or if we should be using the original definition from Homer.  You can't keep flopping back and forth like you're running for a major political office.   A trojan is well-understood (by ev

RE: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-10 Thread Chuck Fullerton
alf Of Jason Coombs Sent: Wednesday, August 10, 2005 9:34 PM To: James Tucker Cc: Full-Disclosure Subject: Re: [Full-disclosure] Re: Help put a stop to incompetent computerforensics James Tucker wrote: > Sorry, how many programs which you class as "Trojans" add what you > define as

Re: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-10 Thread Jason Coombs
Chuck Fullerton wrote: "A Trojan horse is a program that appears to have some useful or benign purpose, but really masks some hidden malicious functionality." "A Backdoor is a program that allows attackers to bypass normal security controls on a system, gaining access on the attacker's own terms

RE: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-10 Thread Chuck Fullerton
r. Does this clear it up at all? Chuck Fullerton CEH, OPST, CISSP -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Jason Coombs Sent: Wednesday, August 10, 2005 8:59 PM To: Donald J. Ankney Cc: Full-Disclosure Subject: Re: [Full-disclosure] Re: Help put

RE: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-10 Thread hummer
Can we agree that in the world of computer security the Trojan horse is a malicious program disguised as a legitimate software and let it go at that?   Thanks   Hummer Marchand, GCIH,CISSP CompTIA Security+ -Original Message-From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED