On Sat, Aug 13, 2005 at 04:49:45AM +, Jason Coombs wrote:
> Anyone presumptuous enough to arbitrarily define technical terms without
> considerable careful thought and then publish the arbitrary text and call
> it a 'dictionary' should be shot.
Might it not be a bit more tolerant of other view
J.A. Terranson wrote:
> SANS is a for profit corp.,
> and was run as such even when
> they were playing possum as a
> non-profit.
> They are *not* a "disinterested
> third party" any more than the
> anti-virus firms are - and not
> many people would use *them*
> as an authoritative reference
To dr
Jason Coombs to J.A. Terranson:
> > The simple fact of the matter is that
> > "what matters" *IS* the definition,
> > and you full well know it. What
> > happened here is you slipped and
> > fell, and rather than admitting it
> > you're crying foul - shame on you!
>
> I didn't disagree that the
sophistry
On Thursday 11 August 2005 22:39, Jason Coombs wrote:
> My conclusion is that I slipped and fell because the definition has changed
> and computer dictionaries haven't caught up yet.
>
> As for whether or not you'd roast me in front of the judge,
>
> 'Your honor, the evidence shows that
On Fri, 12 Aug 2005 02:39:37 -, Jason Coombs said:
> Who roasts who at trial? It depends on the evidence
If it just depended on the evidence, we wouldn't need expert witnesses, would
we?
If the opposing expert witnesses were auto mechanics, and one doesn't
know that every other mechanic in
J.A. Terranson wrote:
> The simple fact of the matter is that
> "what matters" *IS* the definition,
> and you full well know it. What
> happened here is you slipped and
> fell, and rather than admitting it
> you're crying foul - shame on you!
I didn't disagree that the broader definition of Troja
On Wed, 10 Aug 2005, Jason Coombs wrote:
> Chuck Fullerton wrote:
> > "A Trojan horse is a program that appears to have some useful or benign
> > purpose, but really masks some hidden malicious functionality."
> >
> > "A Backdoor is a program that allows attackers to bypass normal security
> > co
How many of you are lawyers
back to what seemed to be the original point:
Data on a drive is just data, unless you can prove how it was created. And
generally the data in question can't prove itself, external factors have to be
considered.
--
*
Brian L. An
Hey Jason, you really have to make up your mind about whether the old definition is archaic and thus obsolete, or if we should be using the original definition from Homer. You can't keep flopping back and forth like you're running for a major political office.
A trojan is well-understood (by ev
alf Of Jason Coombs
Sent: Wednesday, August 10, 2005 9:34 PM
To: James Tucker
Cc: Full-Disclosure
Subject: Re: [Full-disclosure] Re: Help put a stop to incompetent
computerforensics
James Tucker wrote:
> Sorry, how many programs which you class as "Trojans" add what you
> define as
Chuck Fullerton wrote:
"A Trojan horse is a program that appears to have some useful or benign
purpose, but really masks some hidden malicious functionality."
"A Backdoor is a program that allows attackers to bypass normal security
controls on a system, gaining access on the attacker's own terms
r.
Does this clear it up at all?
Chuck Fullerton
CEH, OPST, CISSP
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Jason Coombs
Sent: Wednesday, August 10, 2005 8:59 PM
To: Donald J. Ankney
Cc: Full-Disclosure
Subject: Re: [Full-disclosure] Re: Help put
Can we
agree that in the world of computer security the Trojan horse is a
malicious program disguised as a legitimate software and let it go at
that?
Thanks
Hummer Marchand, GCIH,CISSP CompTIA Security+
-Original Message-From:
[EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED
13 matches
Mail list logo