In Micro$oft's defense, I think a more "balanced view" would be to provide a list of exploits for each platform.
Now if a virus relies on social engineering to spread itself, that can't really be controlled except by education. However, a virus or worm that relies on a bug or feature (Outlook and other Office macros), would of course be an exploit. But your typical run me and then I spread myself rampantly throughout your system would not qualify. Of course, I suppose one could take the stance that Windows inherent lack of security (or at least the default install's lack thereof) is a fundamental design flaw that most all viruses exploit. Though generally, one would argue that only code exploits really qualify as exploits. Else what is the difference between a code exploit, a design exploit and a social engineering exploit? Oh well... So much for my defense! ;-) On second thought, perhaps a list of security holes and the mean time to patches for them would be the best approach. Josh p.s. - It's viruses. > -----Original Message----- > From: Adam Augustine [mailto:[EMAIL PROTECTED] > Sent: Saturday, 14 February, 2004 08:52 > To: BYU Unix Users Group > Subject: Re: [uug] Ironic Twist > > > I think a simple list of all the viruses (virii? virueese? > viroose?) in > the last n years with a big banner that says "QUALITY"[1] > would be very > compelling. > > If we wanted to present a "balanced view", we could provide a list of > all the Linux viruses ever[2]. > > Adam Augustine > > [1] Dilbert reference, can't find the actual cartoon > [2] > http://www.viruslist.com/eng/viruslistfind.asp?findWhere=011&f > indTxt=linux > and not all of those are even linux > > > Matthew J. Probst wrote: > > I'm there. Someone want to come up with a catchy flier? > > > > > > -matt > > > > On Fri, 13 Feb 2004, Evan McNabb wrote: > > > > > >>When I went to get the auditorium for our event they told me that > >>someone else had reserved the room from 6:30pm to 8:00pm. > That's why we > >>had to move the meeting to 8pm. I just found out who has > the auditorium > >>before the Samba presentation: > >> > >>---------------------------------------- > >>"Testing Software At Microsoft" > >>John Overbaugh, Lead Tester at Microsoft > >>6:30 - 8pm > >>---------------------------------------- > >> > >>What are the chances of us randomly getting the same room on campus > >>right after Microsoft's big recruiting meeting?!?! > >> > >>I think we should get a group together around 7:30 or so to hand out > >>fliers and talk to people as they leave (and invite them to > stay to the > >>Samba meeting). Anyone with me? > >> > >>-Evan > >> > >>-- > >>/*********************************************************** > *********\ > >> Evan McNabb: <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> > >> http://evan.mcnabbs.org > >> System Administrator, CS Department, BYU > >> GnuPG Fingerprint: 53B5 EDCA 5543 A27A E0E1 2B2F 6776 8F9C > 6A35 6EA5 > >>\*********************************************************** > *********/ > >> > > > > > > ____________________ > > BYU Unix Users Group > > http://uug.byu.edu/ > > ___________________________________________________________________ > > List Info: http://uug.byu.edu/cgi-bin/mailman/listinfo/uug-list > > ____________________ > BYU Unix Users Group > http://uug.byu.edu/ > ___________________________________________________________________ > List Info: http://uug.byu.edu/cgi-bin/mailman/listinfo/uug-list > > ____________________ BYU Unix Users Group http://uug.byu.edu/ ___________________________________________________________________ List Info: http://uug.byu.edu/cgi-bin/mailman/listinfo/uug-list
