-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

'Lo Allie,

On  Sun, 27 Oct 2002 19:40:38 -0500 your time, you authored this:

ACM> For stopping harmless test files? I don't know how popular those
ACM> test files are apart from eicar.com which is well known (note that
ACM> eicar is picked up by most scanners)

<shakes  head>  Comon,  that  isn't the point and you well know it. The fact
that those test files are really harmless isn't the point, but the fact that
that  files  with  those  extensions  are  capable  of  causing  'harm'  is.
Therefore,  a scanner that can 'weed' out files that can be used as exploits
through  a vulnerable information exchange medium such as email is obviously
advantageous to end users.

ACM> This  has  already been implemented in TB! through its inbuilt filetype
ACM> restrictions.

Yes, I'm aware of that :)

ACM> That's a nice simple way of implementing what you're referring to.

No,  that's  not  in  context.  I  wasn't referring to that particularly, or
singularly,  but rather suggesting overall that I was happy to use a scanner
with  such  extra  features.  Personally  speaking, I like the fact that the
authors  of  the  software  are  covering  all bases, whether the extras are
considered  excessive  or not. Obviously in the case of the Kapersky authors
they don't :)

ACM> TB! also doesn't run HTML based scripts and Active X controls. As a TB!
ACM> user, you don't actually need the scanner to pass that test. :)

I  might  not  need it, but not everyone runs TB! and as AV packages are not
authored  solely  for  TB! I think it is a valid extra, even if redundant in
this instance.

ACM> Warnings should be issued by your e-mail client

Yeah,  but  we  are talking real world not ideals. OK, so some email clients
like  TB!  are  at  the forefront, providing client based protection, but it
isn't  a  matter  of what should be but rather what is, and the fact is that
not all clients do, so extra protection is warranted.

ACM> You  agree  with  me  here which is the very essence of the point I was
ACM> making that you responded to by saying that I missed the point.

I don't think so ;) In this instance I was happy to indicate some agreement,
but only to the extent that I was agreeing that any claims made by companies
pushing a product were usually exaggerated, or excessive, and most people of
course  seemed  to be aware of that. In other words, the fact that you found
the  'sell'  ridiculous  was  unexpected,  as  generally  speaking it's just
accepted  for  what  it is, and I shalln't say what 'it is' descriptively :)
So, there was no self-contradiction there at all, as you suggest.

ACM> What's the pointing of making an issue about .vbs filetypes

I  think  the  point is one of familiarity. Not every user is going to be as
familiar  with .vbs extensions, for example, as they are .com or .exe types.
Generally  speaking,  even  the  most  basic  of user gets to grips with the
dangers  of  running .com and .exe files, as they are commonplace extensions
on  a  Windows system, and so understand them as being executable files, but
as  other  executable  file  extensions  aren't  commonly  used  by the less
advanced  users they may be unfamiliar with what they are, what they can do,
and therefore the dangers they could pose. From your position I can see how
you can see that it's ridiculous though.

ACM> I'd  say that they have missed the point that it's the user that has to
ACM> be very careful about any of these files.

Again,  in  and ideal world that would be fine. But it aint, and users don't
and  won't  do  as they should always, and I don't think they deserve to get
infected  because  of  it.  Some  people  might  call  those types lamers or
whatever  -  a  term  I  hate - but it's not their fault that there is a war
against  Microsoft going on and they happened to get caught up in the middle
of  it.  I think that the more optional idiot-proof protections there are in
place  the better. It means that all levels of user are afforded protection,
not just those with plenty of air miles behind them.

ACM> Why not? Navigate to it and scan it.

I will. But see above para :)

ACM> It's  yet to be opened an then caught by the realtime scanner. It's yet
ACM> to  be  caught by the system wide scans that you may perform on a daily
ACM> basis.

That's  not  the  point.  The point is that an infected file is able to pass
through  initial  defences  and get stored on the disk by using a fragmented
email,  when it would obviously be preferable that it didn't. But that is an
ideal,  like some of yours I suppose :) I didn't say that it was a disaster,
but it is a vulnerability of sorts.

- --
Sl�n,

 Simon @ theycallmesimon.co.uk

_______________________________________
Faffing about with TB! v1.61 on W2K SP3

PGP Key: http://pgp.netbanger.com/

-----BEGIN PGP SIGNATURE-----
Comment: Privacy is freedom. Protect your privacy with PGP!
Comment: KeyID: 0x5C7E8966
Comment: Fingerprint: 851C F927 0296 FF1C 70A2  474F CB6E 6FFE 5C7E 8966

iQA/AwUBPbyYNctub/5cfolmEQK7FwCeLfH8cJOMNdXTiADwH4o7eMcT794AoPWZ
vddEnH8pqCl9HUTJ6ApOAMUS
=LFhv
-----END PGP SIGNATURE-----


________________________________________________
Current version is 1.61 | "Using TBUDL" information:
http://www.silverstones.com/thebat/TBUDLInfo.html

Reply via email to