True, but it is common virus technique to execute machine code by utilizing
buffer overflows in a scripting language, and as such bypassing the
limitations that are imposed by the scripting language.

Jan Jaeger

From: John Summerfield <[EMAIL PROTECTED]>
Reply-To: Linux on 390 Port <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Re: Probably the first published shell code example for Linux/390
Date: Sat, 2 Nov 2002 15:25:52 +0800

On Fri, 1 Nov 2002 22:50, you wrote:
> When we are talking about storing (ie overlaying) programs (trojans) on
the

Maybe I'm being picky, but trojans are always present by invitation. A user
us
sucked into installing a program that (maybe) does what's claimed of it,
but
also does something you might not like.


--
Cheers
John Summerfield


Microsoft's most solid OS: http://www.geocities.com/rcwoolley/
Join the "Linux Support by Small Businesses" list at
http://mail.computerdatasafe.com.au/mailman/listinfo/lssb

_________________________________________________________________
Surf voor nieuws, filenieuws & entertainment naar MSN.nl
http://www.msn.nl/default.asp

Reply via email to