Am Donnerstag, 23. August 2007 16:18 schrieb James Knott:
> Please note, I'm
> not claiming it's perfect, just far more secure, even for a newbie user.
That's exactly my point, sure it's far more secure(first of all it's secure by
design, that's an important point), but more secure dosen't mean in
Michael Skiba wrote:
Am Donnerstag, 23. August 2007 10:41 schrieb Joachim Schrod:
But, as you can read from the other answers to my post, these
results are obvioulsy dreamed by me and my customers pay for
nothing, because "every linux/unix/*ix box on the planet is not
owned by hackers and spa
Am Donnerstag, 23. August 2007 10:41 schrieb Joachim Schrod:
> But, as you can read from the other answers to my post, these
> results are obvioulsy dreamed by me and my customers pay for
> nothing, because "every linux/unix/*ix box on the planet is not
> owned by hackers and spammers while so many
John E. Perry wrote:
Joachim Schrod wrote:
...
Let me propose another hilarious 5-step process:
1. Read the LWN.net security page.
OK, so I did.
2. Detect how many exploits are based on data files, and not
on executables. just last week: ...
Not a single exploit listed. Many vulnerabi
On Wednesday 2007-08-22 11:16, Joachim Schrod wrote:
> Sloan wrote:
> > It seems to be essentially one of the "honor system" viruses for unix,
> > you know the drill:
> >
> > 1. download the hostile executable
> > 2. save the save the hostile executable somewhere appropriate
> > 3. change the file
On Wednesday 22 August 2007 10:08, John E. Perry wrote:
> Joachim Schrod wrote:
> > ...
> > Let me propose another hilarious 5-step process:
> >
> > 1. Read the LWN.net security page.
>
> OK, so I did.
>
> > 2. Detect how many exploits are based on data files, and not
> >on executables. just la
> "FMQ" == Federico Mena Quintero <[EMAIL PROTECTED]> writes:
FMQ> On Wed, 2007-08-22 at 17:16 +0200, Joachim Schrod wrote:
FMQ> Hi, Joachim,
>> It depends on your intelligence if you need to follow this through
>> to the end or if you realize soon enough that from "downloading and
>> runni
Joachim Schrod wrote:
> ...
> Let me propose another hilarious 5-step process:
>
> 1. Read the LWN.net security page.
>
OK, so I did.
> 2. Detect how many exploits are based on data files, and not
>on executables. just last week: ...
>
Not a single exploit listed. Many vulnerabilities, a
On Wed, 2007-08-22 at 17:16 +0200, Joachim Schrod wrote:
Hi, Joachim,
> It depends on your intelligence if you need to follow this through
> to the end or if you realize soon enough that from "downloading and
> running executables is not a relevant attack vector for Linux" does
> *NOT* follow
2007/8/22, Joachim Schrod <[EMAIL PROTECTED]>:
> Sloan wrote:
> >
> > It seems to be essentially one of the "honor system" viruses for unix,
> > you know the drill:
> >
> > 1. download the hostile executable
> > 2. save the save the hostile executable somewhere appropriate
> > 3. change the file mo
Joachim Schrod wrote:
> Sloan wrote:
>>
>> It seems to be essentially one of the "honor system" viruses for unix,
>> you know the drill:
>>
>> 1. download the hostile executable
>> 2. save the save the hostile executable somewhere appropriate
>> 3. change the file mode to make it executable.
>> 4
Sloan wrote:
It seems to be essentially one of the "honor system" viruses for unix,
you know the drill:
1. download the hostile executable
2. save the save the hostile executable somewhere appropriate
3. change the file mode to make it executable.
4. execute it with the command ./
5. hilarity e
Pete Connolly wrote:
> For a real life example of a linux infecting site, Bruce Schneier
> blogged this article:
> http://www.schneier.com/blog/archives/2007/08/how_a_linux_ser.html which
> mentioned the location of an infection site at:
>
> http://83.19.148.250/~matys/pliki/
>
> I'm afraid it's st
Hans Witvliet wrote:
> On Wed, 2007-08-08 at 14:59 +0200, Joachim Schrod wrote:
>
>> James Knott wrote:
>>
>>> Hans van der Merwe wrote:
>>>
Why is this not an issue with anyone? Deleting a normal users data is a
big thing. They consider the PC broken if their files disap
On Wed, 2007-08-08 at 14:59 +0200, Joachim Schrod wrote:
> James Knott wrote:
> > Hans van der Merwe wrote:
> >>
> >> Why is this not an issue with anyone? Deleting a normal users data is a
> >> big thing. They consider the PC broken if their files disappear.
> >>
> >
> > That's a minor issue
Joachim Schrod wrote:
I shudder when I think about the perceived security of private users.
But obviously this real-life experience and the untold man-hours that
were needed for cleanup can not happen because they must not happen.
It's amazing what some people think. I have a friend, who runs
On 08/08/2007 08:59 PM, Joachim Schrod wrote:
> As the CEO of a company that does security consulting, I can confirm
> that malware is not restricted to Windows in its effectivity. Windows
> malware volume is larger, but it's frightening to see the mindset
> "we're safe because we run Unix/Linux/Ma
James Knott wrote:
Hans van der Merwe wrote:
Why is this not an issue with anyone? Deleting a normal users data is a
big thing. They consider the PC broken if their files disappear.
That's a minor issue, compared to some of the other things malware can
do. Stuff such as stealing passwo
Could somebody please scan Suse distribution and find if bitdefender
found "real" viruses?
Cheers,
Jimmy
PS MicroWorld Technologies Inc. resells AV for Linux
http://www.mwti.net/linux/linux_products.asp
--
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTE
On Wed, 2007-08-08 at 04:01 -0400, [EMAIL PROTECTED] wrote:
> On Tue August 7 2007, Cristian Rodriguez R. scratched these words onto a
> coconut shell, hoping for an answer:
> > Registration Account escribió:
> > > Phishing.Heuristics.emal.spoofedDomain virus's.
> >
> > http://bofhinc.com/images/c
On Tue August 7 2007, Cristian Rodriguez R. scratched these words onto a
coconut shell, hoping for an answer:
> Registration Account escribió:
> > Phishing.Heuristics.emal.spoofedDomain virus's.
>
> http://bofhinc.com/images/cluepon.jpg
And don't you just love the MS "fanboys" who insist that sin
Registration Account escribió:
> Phishing.Heuristics.emal.spoofedDomain virus's.
http://bofhinc.com/images/cluepon.jpg
--
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
22 matches
Mail list logo