Quoting Odhiambo Washington <[EMAIL PROTECTED]>:


Yes, you are right, too. But if I apply such a blacklist, I reduce the
chance for such "malware" to pass through (altough it will never be 100%
protection). Do you agree?

You are not alone in that thinking.

The IDS think tank at bleedingsnort.org has a project where they are cataloging the various user agents found in different types of spyware. The idea is to assemble a repository for filtering, etc:

http://www.bleedingsnort.com/cgi-bin/viewcvs.cgi/user-agents.tar.gz?root=Spyware-User-Agents&view=tar

to extend that function into the real world, they have corellated URL signatures found in various types of spyware and have put together a site to actively identify malware as it passes through the network.

http://www.bleedingsnort.com/staticpages/index.php?page=listeningpost

This is *not* a magic bullet that will make us all secure, but if it cuts out 60% of the bad stuff, that's pretty good. It's certainly more than most anti virus scanners catch these days.



jp

-------------------------------------------------
Email solutions, MS Exchange alternatives and extrication,
security services, systems integration.
Contact:    [EMAIL PROTECTED]


Reply via email to