Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU |
On Tue, Aug 19, 2003 at 09:05:15PM -0400, Johannes B. Ullrich wrote: > > > Terminology question. What's a 'worm' vs. 'virus' vs. 'trojan horse' > > Worm: self propagating malware which does not require user interaction Yep. That's what I would say too. > Virus: Malware that uses e-mail to propagate and usually requires at > least that you as a user load it into your MUA. Does not always require > 'opening'. But for example, it will not propagate if you keep it sitting > on your mail server. I wouldn't restrict the definition to 'email'. The 'requires user intervention' part is what I think of. > Trojan Horse: Program that escalates privilaeges by tricking a > privileged user into executing it. > Backdoor: non-standard remote admin method :-/ I would say a trojan horse always contains a backdoor. A trojan horse is a backdoor in disguise. I like your backdoor definition. :) > Bot: IRC controlled backdoor Would a bot require IRC? > Auto Rooter: software that uses an exploit and installs backdoor without > user interaction. New to me. So your definition is now authoritative in my book! -- Ron Peterson -o) 87 Taylor Street /\\ Granby, MA 01033 _\_v https://www.yellowbank.com/ ---- -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 232 bytes Desc: not available URL: <http://lists.blu.org/pipermail/discuss/attachments/20030819/aeb65c8d/attachment.sig>
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |