Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Worm bait?



> None of the specifics you give here conflict with the general definition
> I gave above.  In fact your first line is a simple re-statement of
> exactly what I said. Your merely describe more of what "might" be done by a
> trojan or how a trojan might be created.  Backdoors are another function
> frequently generated by worms/virii.

Your definition implied that a trojan horse must also be a virus or worm.
I do not believe that is correct.  Both viruses and worms try to propagate
themselves, trojans do not have to.  I also do not believe that they require
an attempt at escalating privileged, as others have claimed, or that
they necessarily are trying to trick privileged users.  

> When/if that happens, malware producers will return to
> using the more subtle methods pioneered for attacks on UNIX-Like systems,

I do not think malware developers that can use such techniques ever stopped.
Those that can or will not learn (or, at least, haven't yet) to use such
techniques develop email and macro malware.  And each step down the IQ
food chain in an order of magnitude larger....

Hunter




BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org