Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Golden Eagle
It might, but what's the point, if you're in their inbox you're in their inbox.

You originally wrote:

For this thing to be the primary exploit method, users would be surfing infested websites.

I was simply pointing out that surfing a website isn't necessary. The link can be delivered in email.

You should at least read your own posting that I responded to, so that you'll understand the point I was trying to make.

There's a lot of holes in that theory. From dial in clients? Behind firewalls? Forget those working in your scheme right off the bat.

The current Novarg/Mydoom worm is affected in a similar way: the backdoor installed on port 3127 also isn't accessible under the circumstances that you describe. But you're right, it would limit the propagation.

It would be interesting to know the percentage of broadband clients that have an effective firewall. Since Microsoft is finally enabling their firewall by default (in the next service pack of XP), that percentage will hopefully start to increase.

It may be technically classified by some as a worm because of it's complexity, but it's still at it's heart an e-mail virus that requires user interaction to propogate.

It's classified as a worm by:

It's classified as a virus by:

Symantec provides the most concise explanation of the difference:

Virus: A program or code that replicates; that is, infects another program, boot sector, partition sector, or document that supports macros, by inserting itself or attaching itself to that medium. Most viruses only replicate, though, many do a large amount of damage as well.

Worm: A program that makes copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive in the form of a joke program or software of some sort.

91 posted on 01/29/2004 8:02:56 AM PST by justlurking
[ Post Reply | Private Reply | To 89 | View Replies ]


To: justlurking; Salo
I was simply pointing out that surfing a website isn't necessary. The link can be delivered in email.

You're talking in circles again, what? You're going to need a host, to link to, and if you haven't already rooted the client your only other option is your own server, which would be like robbing a bank but leaving your driver's license. There's simply not much way this can be exploited, despite the obvious attempt of the author to distract from the Linux virus debacle.

120 posted on 01/29/2004 6:20:09 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 91 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson