On Tue 21 Feb 2006 (08:45 -0500), John Curran wrote:
>
> At 7:45 AM -0500 2/21/06, John Curran wrote:
> >
> >From the web site: "Only a selected set of web sites will remain available,
> >for example Microsoft update and the websites of several anti-virus software
> >companies. The quarantine s
Jess Kitchen wrote:
On Tue, 21 Feb 2006, Gadi Evron wrote:
Hi Simon, this is indeed a Windows problem due to Microsoft being a
mono-culture in our desktop world. Still, there are botnets
constructed from other OS's as well. Also, C&C servers are mostly *nix
machines.
Does 'mostly *nix' h
On Tue, 21 Feb 2006, Gadi Evron wrote:
Hi Simon, this is indeed a Windows problem due to Microsoft being a
mono-culture in our desktop world. Still, there are botnets constructed from
other OS's as well. Also, C&C servers are mostly *nix machines.
Does 'mostly *nix' hold true of the fast-flu
At 7:45 AM -0500 2/21/06, John Curran wrote:
>
>From the web site: "Only a selected set of web sites will remain available,
>for example Microsoft update and the websites of several anti-virus software
>companies. The quarantine server tells users what is going on and how this
>problem can be r
At 12:26 PM +0100 2/21/06, Jim Segrave wrote:
>
> > The philosophical discussion aside (latest one can be found under "zotob
>> port 445 nanog" on Google), presenting some new technologies that shows
>> this *can* be done changes the picture.
>
>http://www.quarantainenet.nl/
>From the web site: "
Simon Waters wrote:
I've seen 95% quoted - certainly my experience if you go looking for malware
in recent Windows desktop machines using IE and Outlook it is pretty much a
certainty you'll find it. Most of these tools I was using didn't detect the
Sony Rootkit, or other malware, so this will
On Tue 21 Feb 2006 (04:15 +0200), Gadi Evron wrote:
>
> Christopher L. Morrow wrote:
> >it's also not just a 'i got infected over the net' problem... where is
> >that sean when you need his nifty stats :) Something about no matter what
> >you filter grandpa-jones will find a way to click on the n
On Tuesday 21 Feb 2006 06:41, you wrote:
>
> I've seen more than one estimate that most computers *are* infected by at
> least one piece of malware/spyware/etc, (including numbers as high as 90%)
I've seen 95% quoted - certainly my experience if you go looking for malware
in recent Windows deskt
On Mon, 20 Feb 2006 23:54:38 EST, Sean Donelan said:
> On the other hand, the number of infected computers never seems to spiral
> out of control. I've been wondering, instead of trying to figure out why
> some computers get infected, should we be trying to figure out why most
> computers don't bec
Hey, Bill.
The vast majority of what I see is based on financial gain.
Popping a web+database server, installing a rootkit, and
transferring off the day's business transactions is a lot more
certain than popping 10K Windows boxes and hoping the users go
shopping. Yep, seen it more than once. Ch
On Tue, Feb 21, 2006 at 12:04:17AM -0600, Rob Thomas wrote:
> ] true enough. but "auntie jane" doesn't have linux/unix web server(s)
> ] or router(s) (other than the one provided by her ISP and managed by
> them)
> ] and has zero clue about overly permissive machines.
>
> Agreed.
[EMAIL PROTECTED] wrote:
On Mon, Feb 20, 2006 at 07:49:04PM -0600, Rob Thomas wrote:
Hey, Bill.
] wht is the mean-time-to-infection for a stock windows XP system
] when plugged intot he net?... 2-5minutes? you can't get patches
] down that fast.
The same case can be made f
] true enough. but "auntie jane" doesn't have linux/unix web server(s)
] or router(s) (other than the one provided by her ISP and managed by
them)
] and has zero clue about overly permissive machines.
Agreed. Instead all of her financial records are on those
unix web/databas
On Mon, Feb 20, 2006 at 07:49:04PM -0600, Rob Thomas wrote:
>
> Hey, Bill.
>
> ] wht is the mean-time-to-infection for a stock windows XP system
> ] when plugged intot he net?... 2-5minutes? you can't get patches
> ] down that fast.
>
> The same case can be made for Linux and Unix-
Sean Donelan wrote:
On Tue, 21 Feb 2006, Christopher L. Morrow wrote:
it's also not just a 'i got infected over the net' problem... where is
that sean when you need his nifty stats :) Something about no matter what
you filter grandpa-jones will find a way to click on the nekkid jiffs of
Anna K
On Tue, 21 Feb 2006, Christopher L. Morrow wrote:
> it's also not just a 'i got infected over the net' problem... where is
> that sean when you need his nifty stats :) Something about no matter what
> you filter grandpa-jones will find a way to click on the nekkid jiffs of
> Anna Kournikova again
On Tue, 21 Feb 2006 04:15:25 +0200, Gadi Evron said:
> The philosophical discussion aside (latest one can be found under "zotob
> port 445 nanog" on Google), presenting some new technologies that shows
> this *can* be done changes the picture.
OK. The tech exists, or can be made to exist. The u
Christopher L. Morrow wrote:
it's also not just a 'i got infected over the net' problem... where is
that sean when you need his nifty stats :) Something about no matter what
you filter grandpa-jones will find a way to click on the nekkid jiffs of
Anna Kournikova again :(
anyway, someone mention
On Mon, 20 Feb 2006, Rob Thomas wrote:
>
> Hey, Bill.
>
> ] wht is the mean-time-to-infection for a stock windows XP system
> ] when plugged intot he net?... 2-5minutes? you can't get patches
> ] down that fast.
>
> The same case can be made for Linux and Unix-based web servers with
Hey, Bill.
] wht is the mean-time-to-infection for a stock windows XP system
] when plugged intot he net?... 2-5minutes? you can't get patches
] down that fast.
The same case can be made for Linux and Unix-based web servers with
vulnerable PHP-based tools. There's also a larg
> Edward W. Ray wrote:
> >IMHO, a user should have to demonstrate a minimum amount of expertise and
> >have a up-to-date AV, anti-spyware and firewall solution for their PCs.
>
> The mostly-user ISP's will have to eventually do something or end up
> being either regulated, spending more and more
Edward W. Ray wrote:
IMHO, a user should have to demonstrate a minimum amount of expertise and
have a up-to-date AV, anti-spyware and firewall solution for their PCs.
That is why we have hundreds of millions of bots in the wild.
The mostly-user ISP's will have to eventually do something or en
22 matches
Mail list logo