On Friday 22 Oct 2004 7:27 am, Russell W. Behne wrote:
In that case, Mikkel, it's not a virus, what you're describing is a
trojan horse program.
Agreed. But 99% of mal-ware these days are not real viruses either. They
are called viruses by the unknowing because they don't know the
difference,
Yesterday at 23:31, Mikkel L. Ellertson wrote:
I think you did a great job of summing it up. But one thing I have
never seen talked about as a way to get a virus into a Linux system is
to include it in an RPM. Lets face it, how many people actualy check
the scripts that are run when an
On Friday 22 Oct 2004 05:31, Mikkel L. Ellertson wrote:
John Wilson wrote:
- snip
John,
I think you did a great job of summing it up. But one thing I have
never seen talked about as a way to get a virus into a Linux system is
to include it in an RPM. Lets
John,
I think you did a great job of summing it up. But one thing I have
never seen talked about as a way to get a virus into a Linux system is
to include it in an RPM. Lets face it, how many people actualy check
the scripts that are run when an rpm is installed? Do you check that
John Wilson wrote:
On October 21, 2004 04:11 pm, Elliot Somers wrote:
This is a pretty general question, I've heard it said by one party that
linux/unix is virus proof, other's say it's that virus authors go after the
big guys, so MS, wintel servers, etc. What I want to know is what's true
and
On Friday 22 Oct 2004 05:31, Mikkel L. Ellertson wrote:
John Wilson wrote:
- snip
John,
I think you did a great job of summing it up. But one thing I have
never seen talked about as a way to get a virus into a Linux system is
to include it in an RPM. Lets
On Friday 22 Oct 2004 14:42, cervixcouch wrote:
So how exactly does one safeguard against a trojan when installing an RPM?
You don't install rpms from sources that are not well-known to be reputable -
Mandrake mirrors, Sourceforge sites, PLF mirrors are OK, and there are
others. If you don't
Anne Wilson wrote:
On Friday 22 Oct 2004 14:42, cervixcouch wrote:
So how exactly does one safeguard against a trojan when installing an RPM?
You don't install rpms from sources that are not well-known to be reputable -
Mandrake mirrors, Sourceforge sites, PLF mirrors are OK, and there are
On Friday 22 October 2004 12:56, Brandon Rife wrote:
John Wilson wrote:
On October 21, 2004 04:11 pm, Elliot Somers wrote:
This is a pretty general question, I've heard it said by one party that
linux/unix is virus proof, other's say it's that virus authors go after
the big guys, so MS,
cervixcouch wrote:
So how exactly does one safeguard against a trojan when installing an RPM?
Check the signiture of the RPM, to be sure it is realy from the source
you think it is. You can also look at the file list, and the scripts
that are run when installing, removing, ect. I use Midnight
On October 22, 2004 10:54, Mikkel L. Ellertson wrote:
cervixcouch wrote:
So how exactly does one safeguard against a trojan when installing an
RPM?
Check the signiture of the RPM, to be sure it is realy from the source
you think it is. You can also look at the file list, and the scripts
On Friday 22 October 2004 23:27, Ron Hunter-Duvar wrote:
Of course, you have to trust that the key hasn't been tampered with as
well. The really paranoid among us rely on key signatures exchanged by some
other channel, such as telephone, to verify a key before installing it.
The really
This is a pretty general question, I've heard it said by one party that
linux/unix is virus proof, other's say it's that virus authors go after the
big guys, so MS, wintel servers, etc. What I want to know is what's true and
what's not. Also I'm curious not only if it is, or not, but why?
On October 21, 2004 04:11 pm, Elliot Somers wrote:
This is a pretty general question, I've heard it said by one party that
linux/unix is virus proof, other's say it's that virus authors go after the
big guys, so MS, wintel servers, etc. What I want to know is what's true
and what's not.
John Wilson wrote:
- snip
Now, Linux, in common with almost all POSIX compliant software also has an
administrators account and you can, if you want to, set up as insecure a
system as any old Windows box. Responsible Linux distributions will insist
that you have at
15 matches
Mail list logo