-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

In <mid:15341266296.20021027233602@;theycallmesimon.co.uk>,
Simon [S] wrote:'

S> I don't think it is a question of, 'are they supposed to?', but
S> rather, 'can they?'.  And  of  course  Kapersky can, so to me it
S> simply means Kapersky is providing  more  prophylactic  power
S> than  AVG.

For stopping harmless test files? I don't know how popular those
test files are apart from eicar.com which is well known (note that
eicar is picked up by most scanners).

An A-V scanner that stops and weeds out files just based on their
file type isn't really a scanner. Why spend all those resources on
updating definitions? It's much simpler to just input the file types
to scan for and bring up a loud alert when one comes in. This is
what this website seems to be saying.

This has already been implemented in TB! through its inbuilt
filetype restrictions. That's a nice simple way of implementing what
you're referring to. TB! also doesn't run HTML based scripts and
Active X controls. As a TB! user, you don't actually need the
scanner to pass that test. :)

S> If the software safeguards against viruses and known exploits
S> then I'm pretty happy about that.

That's all an A-V Scanner should do. Not weed out files merely based
on file type. Warnings should be issued by your e-mail client. Of
course, Outlook is a different beast and it would seem that it does
need something to prevent these filetypes being downloaded to it at
all. But which application is lacking here? Is it the A-V Software
or is it Outlook?

ACM>> It could just mean that your virus scanner doesn't simply
ACM>> consider any file with a .vbs extension a virus.

S> :-/ Sorry, but I think you kind of miss the point really Allie.
S> Being as we are considering email file attachments; how do most
S> infections occur? Unprotected email users! I think it is a
S> prudent safeguard to treat any file with a vbs extension, or a
S> double extension ending in .vbs, being delivered by email, as
S> suspicious, and the fact that an AV scanner like Kapersky does is
S> all the better for the end user IMO. Put it this way, I'd rather
S> be notified than not!

ACM>> The statement above just seems ridiculous to me

S> Well of course, they are trying to sell you their product after
S> all, so what do you expect? <g>

You agree with me here which is the very essence of the point I was
making that you responded to by saying that I missed the point.

What's the pointing of making an issue about .vbs filetypes,
declaring your machine vulnerable to a .vbs test file when it's just
as vulnerable to .exe, .cmd and .com files. If you can run those
from the desktop, no problem, it would appear. However, if you can
run a .vbs file from the desktop, then you're vulnerable to attack.
Yeah,.. right!

I'd say that they have missed the point that it's the user that has
to be very careful about any of these files. Software cannot replace
this necessary ingredient without crippling the system. They're
trying all sorts of things and are slowly falling back to crippling
the system or shooting wide ... just catch any suspicious filetype.
Of course the user expecting the file shouts an angry foul and loses
faith in his scanner. It's getting in the darned way. After a while
he switches it off. Uh-oh .... not good.

S> *Although*, from my own experience in virus detection, Kapersky
S> has  always detected virii that AVG, AntVir, Norton, and McAfee
S> have not, so my  own confidence in the product is high, and
S> therefore I personally see no reason to have the two plugins
S> running successively.

Ok.

ACM>> Perhaps a vulnerability for Outlook users but not for you. ;)

S> True enough. But:

ACM>> ...if  you  store  your attachments with the message. If you don't then
ACM>> the file is already stored on the disk) ...

S> That means it's a vulnerability of course.

Your real-time scanner will prevent you from running it.

If your A-V Scanner doesn't pick it up with the real-time scanner,
it will not pick it up any other way, including through e-mail
scanning.

S> And I agree that TB! users should have protection in place to
S> scan attachment folders, but not everyone will have.

Why not? Navigate to it and scan it.

S> This means that the virus has for all intents and purposes passed
S> through any defenses without detection.

It's yet to be opened an then caught by the realtime scanner. It's
yet to be caught by the system wide scans that you may perform on a
daily basis.

- -- 
Allie C Martin     \      TB! v1.62/Beta7 & WinXP Pro (SP1)
 List Moderator    /   PGP Key - http://pub-key.ac-martin.com
 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (Win32) - GPGshell v2.60

iD8DBQE9vIeEV8nrYCsHF+IRAlYbAJ0V6vxFlPnUFtvLZVr4Zghe6rdkLwCeJjrQ
MpmjHI3cP6Hp+qvEwryWE1k=
=9W1R
-----END PGP SIGNATURE-----


________________________________________________
Current version is 1.61 | "Using TBUDL" information:
http://www.silverstones.com/thebat/TBUDLInfo.html

Reply via email to