On Sun, 19 Sep 2010, Georgi Guninski wrote:
> On Sun, Sep 19, 2010 at 06:21:35PM +0200, Pavel Kankovsky wrote:
> > On the other hand, It is possible to "detect all bad programs" if it is
> > allowed to err on the safe side and mistake some good programs for bad
> > programs. An extreme example is
News flash: Computers are just not secure enough for us to use.
But, I don't use computers ... only non-deterministic Turing machines ;)
--
But, for my own part, it was Greek to me. -- William
Shakespeare, "Julius Caesar
___
Full-Disclosu
Nowadays most vendors interferes and alters *a lot* in your operating system,
from hooking Win32 API functions to modification of the IAT.
It's only a question of who came first, the malware or the protection program.
On Sun, Sep 19, 2010 at 00:30, Giuseppe Fuggiano
wrote:
> On Sat, 2010-09-18 a
On Mon, 20 Sep 2010 01:03:21 PDT, Hurgel Bumpf said:
> The solution could be a virtualized operating system, which has a control
> layer between the operating system and the hardware abstraction layer. Changes
> to data could be non-persistent in the first step, and only written to
> the hdd after
On Mon, Sep 20, 2010 at 01:03:21AM -0700, Hurgel Bumpf wrote:
> The solution could be a virtualized operating system, which has a control
> layer between the operating system and the hardware abstraction layer.
> Changes to data could be non-persistent in the first step, and only written
> to th
Von: Georgi Guninski
> Betreff: [Full-disclosure] Gödel and kernel backdoors
> An: full-disclosure@lists.grok.org.uk
> Datum: Samstag, 18. September, 2010 15:51 Uhr
> http://plus.maths.org/content/goumldel-and-limits-logic
> Gödel and the limits of logic
>
> Quote:
>
> An
"i doubt this can be remotely implemented in practice because of
dynamic code like |eval| and mobile code."
Because we all shout at and blacklist browsers when a website gets
hacked and starts monitoring users' actions.
On a more serious note, try a program, like Comodo's Firewall. You can
ch
nevermind the fact that a "good" program in your list may contain as yet
unknown vulnerabilities which mean it's actually bad.
On Sep 19, 2010 7:08 PM, "Georgi Guninski" wrote:
> On Sun, Sep 19, 2010 at 06:21:35PM +0200, Pavel Kankovsky wrote:
>> On the other hand, It is possible to "detect all ba
On Sun, Sep 19, 2010 at 06:21:35PM +0200, Pavel Kankovsky wrote:
> On the other hand, It is possible to "detect all bad programs" if it is
> allowed to err on the safe side and mistake some good programs for bad
> programs. An extreme example is to call all programs bad unless their
> exact code ap
On Sat, 18 Sep 2010, Georgi Guninski wrote:
> Another result that derives from Gödel's ideas is the demonstration that
> no program that does not alter a computer's operating system can detect
> all programs that do.
What is impossible is reliable and perfect discrimination between "good"
and "ba
On Sat, Sep 18, 2010 at 3:30 PM, Giuseppe Fuggiano
wrote:
> On Sat, 2010-09-18 at 22:51 +0300, Georgi Guninski wrote:
>> all programs that do. In other words, no program can find all the
>> viruses on your computer, unless it interferes with *and alters* the
>> operating system.
>
> Interesting,
On Sat, 2010-09-18 at 22:51 +0300, Georgi Guninski wrote:
> http://plus.maths.org/content/goumldel-and-limits-logic
> Gödel and the limits of logic
>
> Quote:
>
> Another result that derives from Gödel's ideas is the demonstration that
> no program that does not alter a computer's operating syst
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 18/09/2010 20:51, Georgi Guninski wrote:
> http://plus.maths.org/content/goumldel-and-limits-logic
> Gödel and the limits of logic
>
> Quote:
>
> Another result that derives from Gödel's ideas is the demonstration that
> no program that does not
http://plus.maths.org/content/goumldel-and-limits-logic
Gödel and the limits of logic
Quote:
Another result that derives from Gödel's ideas is the demonstration that
no program that does not alter a computer's operating system can detect
all programs that do. In other words, no program can find
14 matches
Mail list logo