[e-gold-list] RE: escalating attack sequences....

2001-05-24 Thread Samuel Mc Kee
Yeah, but if a trojan is written to send everything back to the thief, it will certainly be noticed. The user's computer will only run HALF as fast and the thief will be overloaded with data. If I were to turn to the dark side, I'd write a Trojan horse that just logs the stuff locally and

[e-gold-list] RE: escalating attack sequences....

2001-05-24 Thread C. Cormier - Ormetal Inc.
On 24 May 2001, at 2:07, Viking Coder wrote: Instead of restricting where you can't go, the firewall would restrict where you can go. Well I didn't know that some firewalls were doing that. Mine does not restrict on the destination, but put a restriction on the origin. In other words, I

[e-gold-list] RE: escalating attack sequences....

2001-05-23 Thread jpm
If they can sniff keyboard strokes they can sniff anything in the input stream, including mouse clicks... Sidd. Certainly true - however the idea I supposed would be to temporarily win an escalating war. Not really. In fact, it might be more work to write a sniffer that records only

[e-gold-list] RE: escalating attack sequences....

2001-05-23 Thread SnowDog
Not really. In fact, it might be more work to write a sniffer that records only keyboard events instead of just logging all Windoze messages. I think it's safe to assume that any sniffer knows everything you do with your computer. The only protection is not to install a sniffer. OK, how

[e-gold-list] RE: escalating attack sequences....

2001-05-23 Thread Viking Coder
OK, how about a website which sent back an image to the user's browser, which had a visible keypad to which the user was to 'mouse-click' the passphrase? Now, imagine that the browser sent back a picture of a gif, generated 'on-the-fly', with the keypad in different locations, and with the

[e-gold-list] RE: escalating attack sequences....

2001-05-23 Thread C. Cormier - Ormetal Inc.
On 24 May 2001, at 0:53, Viking Coder wrote: OK, how about a website which sent back an image to the user's browser, which had a visible keypad to which the user was to 'mouse-click' the passphrase? Now, imagine that the browser sent back a picture of a gif, generated 'on-the-fly', with

[e-gold-list] RE: escalating attack sequences....

2001-05-23 Thread Viking Coder
Good... until two weeks later when somebody writes a trojan virus that intercepts anything, and everything, at the browser-level before it leaves the computer. The trojan then sends out the gathered info to it's recipient without the mark even knowing anything has happened. Viking,