On Nov 17, 2006, at 6:36 PM, Marc CASTEELS wrote:

In my opinion, a user workstation should have
zero / NIL server functionality onboard.  It should not have any thing
that reacts on the data it receives.  So no PUSH style processes.

That means no personal file sharing of your local hard drive. You would have to have a dedicated server that everyone connects to.

It also means no acting as a host for non networkable printers.

No Remote Desktop either, so for support, you better be ready to hike to whatever location needs you to personally interact with the computer.


No, there are lots and lots and lots of reasons a workstation OS should have the ability to have server processes running. However, that is the ABILITY to have it. I do agree that there should never be ANY server processes turned on by default on any workstation class OS. And hey, what do you know... that is in fact the exact way OS X is setup. Lots of under the hood abilities waiting and ready, but they all need to explicitly be turned on.

And with the newer INTEL processors and Windows Vista .. I was told that there are certain 'Virtual PCs' running without us knowing, and the only
way to show their presence it by showing that some CPU time is lost.

This is untrue at the basic level. That is, if you are using BootCamp, at no time is there ever any windows "virtual pc" stuff running when using OS X. They are 100% separate bootable operating systems and the two have no way to interact.

When using Parallels, the same may not hold true... however, even going back to Virtual PC, these "virtual machines" are run in a jail, there is no code that can "leap out" and get into OS X. There are distinct processes that allow the Mac OS to send or control data going on in the virtual environment, and there are a few distinct paths for the virtual environment to send data out, but in both cases they are specific and regulated. On the outbound side, there has never been an exploit even shown on a proof of concept. On the inbound, at least with later versions of Virtual PC, I can think of some ways you can make a trojan horse on OS X (or even OS 9) that can do bad things to the virtual machine (later versions of Virtual PC had very powerful Applescript abilities). So although there was never even a proof of concept made known, I can say that it should in theory be possible going inbound.

They are Virtual processes hiding at the hardware/firmware level.

I think what you may be thinking of here is how the Intel chipset support "virtualization" in the processor. But that is entirely different then having a virtual environment running without your knowledge. What that is, is the chipset understands the concept of virtual environments, and has special functions that better allow virtual environments to get at time slices and access to specific shared hardware. This is one of the reasons Parallels runs Windows in darn near native speed. But the key is, you still need something like Parallels to unlock those virtualization abilities and make use of them. They aren't sitting there doing things without you knowing.

Civil
Liberties people have a lot of work and they are damn necessary.

This I can't argue with. There are still processes running that Apple (or others) have put in there to monitor what is going on. I can't speak off the top of my head about things in OS X client, but in OS X Server there is a specific process that monitors the serial number of the server, and can disable the server if it detects a known pirate number. So far I'm not aware that Apple has that process reaching out to them, but there is nothing stopping them from doing so.

On the Mac side of things, so far, Apple seems to be pretty honest when it comes to spying on the OS (the same can NOT be said for iTunes, nor for many Mac software vendors). On the Windows side, MS is regularly, and arrogantly spying on OS users (just check out the whole Windows Genuine Advantage fiasco that MS made into a "mandatory" update, and then had it collect a large amount of personally identifiable information about your machine, and send it all back to MS headquarters. And if it happened to decide, correctly or not as there were a massive number of incorrect flagings, that you had a pirate version of Windows, it not only collected all that IDable info, it also phoned home every time you used the computer and told them things like where you where, how long you were on the machine, and in some cases, what you were doing with the machine!) And we need not breach the level of spyware present in just about every Windows application, from MS or from others (Adobe is another big offender).

I am convinced that nearly ALL of the misery we currently have with SPAM
and viruses, is because manufacturers were primarily thinking about
themselves, rather than the users/customers.

Actually there are two reasons we have the massive virus issues (which should not be confused with spam). 1: MS was lazy and arrogant and didn't give a damn about security until very recently. So their software was riddled with security holes. and 2: Windows users are dumb, stupid, moronic, idiots who can't learn from their mistakes... these people would burn their hands by touching a hot stove, scream in pain, and when someone asked them what was wrong, they would show them by touching the hot stove again. Windows users don't care enough to learn how to actually use their computer, so they don't bother taking simple steps to massively reduce their virus risk. And on top of it, they are easily duped into CHOOSING to run obvious trojan horses.

Spam on the other hand, is simple mass marketing. There is huge amounts of money to be made by spamming, and if there is money to be made, people will do whatever they can to get at it. Think about the level of junk postal mail you get. I'd guess everyone here averages 6-10 pieces of junk postal mail a day (I know I get at least one Capitol One credit card offer EACH DAY). And this level is maintained while the sender has to pay per peice they mail. Now enter spam, where you don't pay per piece, rather, for almost free, you can hit millions of people in a single shot. If junk postal mail senders didn't have to pay per piece like spammers get away with, how much junk postal mail do you think you would get per day!

I may sound like a fundamentalist these days when I advise all my
customers to disallow HTML in emails, but I do mean it.
Do you know that we get pricelists and quotations from distributors and
vendors, and because the pricing data in there are variables from the
vendor's database the prices are changing AFTER we received it.  There
are many indecent practises, and it is so popular to run with the masses
all in the direction of Outlook Entourage etc...

Actually, you just listed a legitimate use for HTML email. The problems with HTML come in with the spammers who use uniquely named graphics files in their HTML email, so when they are referenced off their server when you display the email, you just told them they sent to an active email address, and one that is owned by someone that looks at the spam. That makes you gold to them, and you are sure to get bumped to the top of the list of good addresses ready to get more spam.

By the way, this trick does not work with Mail.app by default. The default setting in Mail is to NOT load images from a remote server. You have to either turn it on to always load them (a dumb idea), or you have to click a button in the email telling it to load them (a good idea, as that lets you selectively override it for emails that you want to see the images, such as advertisements from trusted sources)

Other problems with HTML email (that are lessened these days as even Outlook and Outlook express now stop this by default), is when viri are hidden in scripts in the HTML code that cause either the virus to be run as soon as you open the email, or in some other way download or compromise your computer as soon as the email is displayed and the HTML is rendered. This was a HUGE problem years ago, because most HTML email clients also are set to auto display any message that is selected in the message list. So you delete the message you were reading, and the next one down becomes auto selected, in turn becomes auto opened and displayed, rendering the HTML, and executing the virus.

Again, so far, this has not be exploited in OS X, and although it was very common on Windows, any current versions of email clients for Windows I believe now guard against this. However, that only reduces its occurrence on Windows, as large LARGE numbers of users have not upgraded to current versions of their email clients.

People should stop thinking that virus technology is used only for things
that do straight-forward damage such as wiping a disk or making files
corrupted.

Most current viri is there either to act as spyware and popup providers (to generate ad income to some dirtbag) or to zombifiy a computer to act as a spam sending source (to generate ad income to some diftbag), or even to do both.

Gone are the days of a virus being usually harmless and there only to stroke the ego of some kid, or the days of a virus being there to do harm because some misguided dick thinks it somehow is fitting revenge. Nope, like everything else related to computers these days, even the viri are all about making money.

I
seriously want to know if the more recent versions of Acrobat send
information back to then sender of the document or Adobe.

I use Acrobat, and I am unaware of anything in PDFs that automatically returns any information to anyone. Adobe does (on the PC versions) phone home during the install to "activate" the software. This is done to help against piracy. I'm not sure if the latest Mac version is now doing that as well (since OS X can create PDFs directly, I haven't upgraded from Acrobat 6 yet, and v6 did not phone home during the install... v7 might as v7 is part of Adobe Creative Suite 2, and I've heard rumor that as of CS 2, Adobe is now doing the same activation on the Mac as they have been doing for a while on the PC).

I am a systems administrator and we have certain ISP equipment running
across the (small) country.  I see clearly that certain waves of SPAM
result out of certain application usage.

If you use any Windows "Shareware" you can almost bet it installed some kind of spyware with it. I have stopped using Windows shareware because that market has become so freaking dirty. Even almost all the freeware is actually shareware/spyware that the author has simply lied about in order to get someone to download it. I've resorted to almost exclusively using either commercial software, or simply writing my own. The few apps on Windows that I use that aren't either self written or commercial, are ones that are very clear about how the shareware or freeware works (ie: they are released by reputable companies or developers and spell out everything up front).

I'm of the personal opinion that windows software piracy is as bad as it is because of the fact that no one can trust windows shareware and freeware any more. So they all do the same as me, stick to commercial... and if they can't afford it, and lack the skills to write their own, they pirate commercial software instead, because it is less risky then installing shareware!

And we are tracking and analyzing to find out the relation between app
versions and certain SPAM behavior.

I'd actually be very interested in seeing your results. I'd love to see statistical evidence against certain apps... that way I know what to avoid myself (and potentially come up with better ways of stopping spam from getting to my servers)

-chris
<www.mythtech.net>


___________________________________________________________________________
To unsubscribe send a mail message with a SUBJECT line of "unsubscribe" to
<[EMAIL PROTECTED]>  or  <[EMAIL PROTECTED]>

Reply via email to