Skip to comments.
Why I should have the right to kill a malicious process on your machine
Security Focus Online (Via the register.uk) ^
| 1.14.03
| By Tim Mullen
Posted on 01/17/2003 10:15:03 AM PST by AdA$tra
click here to read article
Navigation: use the links below to view more comments.
first previous 1-20, 21-37 last
To: Southack
Who says that it is legal or illegal? Machines themselves have no rights.
If you own a machines, it's your property. And like a physical piece of property -- land, a house, etc -- you have the right to enjoy that property without having someone trespass upon it.
IF the owner of the machine claims a malicious process, then that owner would have the right for her machine to not be trespassed (and also would be a likely target for jail), but if the owner of the machine makes no such claim (the odds on favorite since making such a claim would send you to jail), then the rogue process in question has no legal owner.
If someone is trespassing on your property, you have the right to repel them from your property through legal means. You can't go into their house and shoot them simply because they trespass upon you.
21
posted on
01/17/2003 1:21:26 PM PST
by
Bush2000
To: TechJunkYard
You and I agree completely on this subject. If somebody is assaulting your box, there are technical means to isolate or ignore them. There's no need to logically or physically enter the machine to do it.
22
posted on
01/17/2003 1:23:18 PM PST
by
Bush2000
To: ShadowAce
To: Bush2000
I completely agree. I wouldn't want anybody invading my boxes and shutting stuff down without my knowledge or consent. If there's a problem, let me know, and I will take care of it.
To: jimt
This point will be missed by 95% of people reading the article.
25
posted on
01/17/2003 1:33:49 PM PST
by
zoyd
To: Bush2000
Dear God! I agree 100% with Bush2000 on something!
*sob*
I'm sliding down the slipperly slope to Microsoft shill! Please, someone help me. Terminate this malicious process, now!
*grin*
Seriously, though, you are exactly right on this one...
To: AdA$tra
I'm surprised nobody's brought up William Gibson yet. This sounds like the "ice" programs from the Sprawl books (Neuromancer et al.)
27
posted on
01/17/2003 1:40:19 PM PST
by
RichInOC
(...except those programs zotted the attacker, not just the attack...)
To: Karsus
Nothing, what cha got? lol
Sometimes I leave the sarcasm tag off, just to see who bites.
To: AdA$tra
If my neighbor's CB or HAM radio transmitter is out of spec, and interfering with my TV reception, do I have the right to direct a destructive EM pulse at his antenna?
29
posted on
01/17/2003 1:46:18 PM PST
by
tacticalogic
(This tagline is dedicated to SheLion and family until further notice.)
To: Melas
I was kidding, but Willie Green thinks it's about light rail, and TLBSHOW thinks it's about abortion, so you might be right.
To: tacticalogic
Um, buddy, wanna but an EM pulse? Straight from the factory, really.
To: Republic of Texas
Nah. I've got a whole box of 'em. My grandfather left them to me - said he got 'me from some guy named Tesla.
32
posted on
01/17/2003 1:52:45 PM PST
by
tacticalogic
(This tagline is dedicated to SheLion and family until further notice.)
To: Charles H. (The_r0nin)
Wait a minute ... I meant everybody's box ... except yours... ;-p
33
posted on
01/17/2003 1:59:28 PM PST
by
Bush2000
To: AdA$tra
, I believe you should have the right to neutralize a worm process running on someone else's infected system, if it's relentlessly attacking your network Just make a rule in your firewall that DROPS all packets originating from that network be it a 24bit, 16bit or even 8 bit network ID.
There someone hand me a prize for solving this WITHOUT new laws.
To: Centurion2000
Exactly. There are well-known ways (such as the one you just stated) that can cut off zombies...
35
posted on
01/17/2003 2:13:43 PM PST
by
Bush2000
To: AdA$tra
36
posted on
01/17/2003 3:02:53 PM PST
by
zoyd
To: AdA$tra
LaBrea is an old example of how a rougue process on a remote machine can be controlled (somewhat) without invading the remote machine's space. There are also stories about this on
The Reg and
Slashdot.
Navigation: use the links below to view more comments.
first previous 1-20, 21-37 last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson