home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!ivgate!Wes.Perkhiser
- From: Wes.Perkhiser@ivgate.omahug.org (Wes Perkhiser)
- Newsgroups: comp.org.eff.talk
- Subject: Good virus/Bad virus
- Message-ID: <75.2b43488f@ivgate>
- Date: 31 Dec 92 09:22:49 CST
- Reply-To: wes.perkhiser@ivgate.omahug.org
- Organization:
- Sender: news@ivgate.omahug.org (UUscan 1.10)
- Followup-To: comp.org.eff.talk
- Lines: 31
-
- In a message of <Dec 28 12:35>, David Douthitt writes:
- DD>(From: rat@ruth.UUCP (David Douthitt))
- DD>(Organization: Network XXIII - +1 608 222 9253)
-
- DD>What about a virus that showed up on your system, and said "Hi!
- DD>I used
- DD>security hole x, but I fixed it!" Imagine what would have
- DD>happened
- DD>(with appropriate warnings and so on) if a virus was written
- DD>(very similar
- DD>to what rtm did), but instead it closed up the security holes
- DD>that rtm
- DD>eventually used.
-
- I would *almost* be willing to accept a virus/worm/whatever that broke
- into my computer and said "Hi! I used security hole x, but I have not
- changed a thing. If you need help to close hole x, contact y at z."
-
- That way, I can do all the things I need to verify that nothing
- was in fact changed (checksums, etc.), and then I would be a
- little more willing to trust the virus.
-
- Once *anything* tries to change a file without my knowledge/consent,
- though, it looses any respect I ever had for it. There have been
- far too many problems fixing bugs from stuff that I did trust to be
- willing to take some worm writer's word for his program's ability to
- fix the hole and not break something else.
-
- Wes
-
-
-