Hi Julian,
On Fri, 14 Jun 2002 11:02:39 +0100, you wrote:

> Hello tbudl,
> 
> Following the discussion earlier this week about whether .jpg files
> could carry a viral payload, the following article has appeared!
> 
> http://www.theregister.co.uk/content/56/25718.html

Interesting... now I'm going to have to track down Sub7 again, just to try it
out.  Using Sub7 as an example, technically it doesn't 'infect' the jpg file, it
puts an executable wrapper around the file, leaving the extension as is... when
windows goes to open the file using your default image viewer, the wrapper
forces windows to run a shellexecute, then run the infected code.  I cannot
remember if it then opens the original image or not... So technically we could
both be right... .jpg's as themselves cannot be executed, but .jpg files can be
infected, and a wrapper placed around them ;)  I'm always willing to stand
corrected though :)

-- 
Jonathan Angliss
([EMAIL PROTECTED])

________________________________________________________
Current Ver: 1.60q
FAQ        : http://faq.thebat.dutaint.com 
Unsubscribe: mailto:[EMAIL PROTECTED]
Archives   : http://tbudl.thebat.dutaint.com
Moderators : mailto:[EMAIL PROTECTED]
TBTech List: mailto:[EMAIL PROTECTED]
Bug Reports: https://bt.ritlabs.com

Reply via email to