KE5EUP wrote:
>
>
> philip gentile wrote:
>> there is really no way possible to commercially develop a low cost 
>> operating system, such as windows, that allows third party software 
>> to run, etc., etc. without having it vulnerable to exploits. bugs and 
>> exploits in software, and hardware, are a fact of life in the product 
>> development world.
>>
>> putting a "rootkit" into any OS is really a no brainer and any person 
>> with a GED and malicious intent can trash any pc, regardless if it 
>> runs linux, mac, windows, or etc. especially when you employ no real 
>> means of prevention.
> [ Thats BS. it takes skill to reverse engineer a specific 
> driver-signing mechanism that is closed source and and code a specific 
> rootkit for it.I was not talking about script kiddies that copy code 
> from the web and run around wreaking havoc]
>> windows is vulnerable because it runs everything and all the various 
>> hooks, registery, and API functions are well documented. the same 
>> problem exists with windows server and most email server packages. in 
>> fact, there are several exploits to email servers that manifest 
>> themselves as window problems! people who run freeware virus 
>> protection like zone alarm are especially vulnerable as these program 
>> have exploits too.
>>
>> rootkits, viruses, and worms are a constant game for their authors 
>> and microsoft. once a month microsoft releases fixes and the spamers 
>> find new exploits and release new worms that day, sometimes the day 
>> before if the worm writer has an "in" at microsoft (that has 
>> happened) and worms come out the day before the exploit path 
>> exists!!. it will never end.
>
>> [zero day exploits have nothing to do with spammers a lot of good 
>> people make a living finding exploits and coding fixes for them]
>
>> as soon as linux and mac has a physical population that is attractive 
>> to spamers, they to will be compromised and exploited to, there is no 
>> doubt about that. saying that microsoft was embarrassed because 
>> someone can install a rootkit or worm on a new rev of software is 
>> akin to asking a bank robber why does he rob banks (i.e. that's where 
>> the money is!)
>>
>> (as a challenge to any black hat dude or spamer, i run snort 2.1, 
>> with my own rules set, inline on a dedicated and clean machine right 
>> off the lan side of my router. i challenge anyone to exploit my 
>> network here at home. everything they need to know is in this email 
>> if they want to try to give it a shot!)
>
>>   [The only secure computer has had a clean install and no drive 
>> access and is not attached to the internet. snort is a good tool but 
>> even with custom rules it is no match for someone with the prorwe 
>> skills to exploit your system. Thanks for your comments. My point was 
>> this was quite significant given the manhours and money MS spent on 
>> thier new driver signing scheme. Of couse you are right about the GED 
>> part most likely a 12 -15 year old will end up taking your system 
>> down. After all if someone wants in your system they will get in.]
> 73
> Al
>
> PS here is a link to her blog:
> http://theinvisiblethings.blogspot.com/
>>
>> i'm not sure if i ever saw a rootkit that was detectable as by nature 
>> it is part of the OS once it is loaded! i futzed around with a few 
>> different rootkits and tried cleaning them with McAfee and the only 
>> solution was to do a clean install. rootkits aren't worms so all the 
>> standard off the shelf virus software is pretty much useless against 
>> them. the cheapest way to protect your windows pc against rootkits is 
>> log on as a user without administrative priviledges.
>>
>> : )
>>
>> phil AB2JL
>>
>> ps - i'll be on 160 meters on the flex tonight! yeah! - top band and 
>> the best radio ever made! life is good.
>>
>>
>> ----- Original Message ----- From: "KE5EUP" <[EMAIL PROTECTED]>
>> To: "Flex Radio Reflector" <flexradio@flex-radio.biz>
>> Sent: Wednesday, January 03, 2007 5:27 PM
>> Subject: [Flexradio] [OT] One interesting Lady, Must have been 
>> another embarrsing day at Microsoft.
>>
>>
>>> Polish researcher Joanna Rutkowska also used the spotlight of the 2006
>>> Black Hat Briefings to showcase new research into rootkits and stealthy
>>> malware. In a standing-room-only presentation, she dismantled the new
>>> driver-signing mechanism in Windows Vista to plant a rootkit on the
>>> operating system <http://www.eweek.com/article2/0,1895,2078362,00.asp#>
>>> and also introduced the world to "Blue Pill," a virtual machine rootkit
>>> <http://www.eweek.com/article2/0,1895,1983037,00.asp> that remains "100
>>> percent undetectable," even on Windows Vista x64 systems.
>>>
>>> _______________________________________________
>>> FlexRadio mailing list
>>> FlexRadio@flex-radio.biz
>>> http://mail.flex-radio.biz/mailman/listinfo/flexradio_flex-radio.biz
>>> Archive Link: http://www.mail-archive.com/flexradio%40flex-radio.biz/
>>> FlexRadio Homepage: http://www.flex-radio.com/
>>>
>>> FlexRadio Knowledge Base: http://kb.flex-radio.com/ 
>>
>>
>>
>

_______________________________________________
FlexRadio mailing list
FlexRadio@flex-radio.biz
http://mail.flex-radio.biz/mailman/listinfo/flexradio_flex-radio.biz
Archive Link: http://www.mail-archive.com/flexradio%40flex-radio.biz/
FlexRadio Homepage: http://www.flex-radio.com/

FlexRadio Knowledge Base: http://kb.flex-radio.com/

Reply via email to