On Fri, 19 Nov 2004, Danny wrote:

> Well, it sure does help the anti-virus (anti-malware) and security
> consulting business, but besides that... is it not safe to say that:
> 
> 1) A hell of a lot of viruses/worms/trojans use IRC to wreck further havoc?
> 2) A considerable amount of "script kiddies" originate and grow through IRC?
> 3) A wee bit of software piracy occurs?
> 4) That many organized DoS attacks through PC zombies are initiated through 
> IRC?
> 5) The anonymity of the whole thing helps to foster all the illegal
> and malicious activity that occurs?
> The list goes on and on...
> 
> Sorry to offend those that use IRC legitimately (LOL - find something
> else to chat with your buddies), but why the hell are we not pushing
> to sunset IRC?

Are you really serious ? Is it a joke ?

This remind me some stupid article I read on nytime :
http://www.nytimes.com/2004/05/06/technology/circuits/06chat.html
(account required, if you don't have one try ptramo/ptramo)

Read it, this is quite funny, they tell us that most of the bad things
on the internet come from IRC. Here are some quotes :
<<
In a room called Prime-Tyme-Movies, users offered free pirated downloads
of "The Passion of the Christ'' and "Kill Bill Vol. 2.''
[...]
And in a far less obtrusive channel, a hacker may well have been
checking his progress of hacking into the computers of unsuspecting
Internet users.
[...]
Yet that pirated copy of Microsoft Office or Norton Utilities that turns
up on a home-burned CD-ROM may well have originated on I.R.C. And the
Internet viruses and "denial of service'' attacks that periodically make
news generally get their start there, too. This week, the network's chat
rooms were abuzz with what seemed like informed chatter about the Sasser
worm, which infected hundreds of thousands of computers over the
weekend.
[...]
There seem to be I.R.C. channels dedicated to every sexual fetish, and
I.R.C. users speculate that terrorists also use the networks to
communicate in relative obscurity.
[...]
Some Internet experts believe that child pornography rings sometimes use
their own private, password-protected I.R.C. servers. Particularly wary
users can try to hide their identity by logging in to I.R.C. servers
only through intermediary computers.
[...]
But perhaps the most disruptive use of I.R.C. is as a haven and
communications medium for those who release viruses or try to disable
Web sites and other Internet servers.
>>

-- 
gpg fp: 8a7e 9719 b38d 97c6 6af0  d345 12a0 3708 2c8c 3c11
http://boklm.mars-attacks.org/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to