home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.sys.next.sysadmin
- Path: sparky!uunet!wupost!gumby!destroyer!ubc-cs!fornax!oneill
- From: oneill@cs.sfu.ca (Richard O'Neill)
- Subject: Re: Virus via mail
- Message-ID: <1992Aug20.044150.26359@cs.sfu.ca>
- Keywords: Is it possible?
- Organization: CSS, Simon Fraser University, Burnaby, B.C., Canada
- References: <1992Aug19.145655.8372@magnus.acs.ohio-state.edu> <1992Aug19.232002.17662@reed.edu>
- Date: Thu, 20 Aug 1992 04:41:50 GMT
- Lines: 29
-
- Heiji Horde <horde@reed.edu> writes:
- >In article [...] szatezal@magnus.acs.ohio-state.edu (Shane M Zatezalo) writes:
- >> Would it be possible for someone to spread a virus via NeXTMail?
- >
- > There have also been rumours of people working on Postscript viruses.
-
- Well, I don't know of people *working* on them, but I'm sure they *are*
- possible. I've explained how I think they can be done in a previous
- posting, so I won't bother saying again this time.
-
- > But those would only work if you are a public window server (I think).
-
- Wrong (from what I can tell).
-
- You can really do easy damage if someone has re-enabled the file operators
- by typing 'dwrite Mail _NXBypassNSC YES' in a terminal window, but this
- has nothing to do with "Public Window Server".
-
- "Public Window Server" controls who can access the window server. Since
- the EPS mail-bomb is run by mail with your user-id, this has 'security
- feature' has preventative effect on mail-bombs.
-
- Regards,
-
- Richard.
- --
- Composing a suitably apt and witty | richard@smaug.questor.wimsey.bc.ca
- signature and disclaimer is left | oneill@fornax.UUCP | NeXTmail OK, but
- as an exercise for the reader. | oneill@cs.sfu.ca | not >100K OK!
-