In Micro$oft's defense, I think a more "balanced view" would be to
provide a list of exploits for each platform.

Now if a virus relies on social engineering to spread itself, that
can't really be controlled except by education.  However, a virus or
worm that relies on a bug or feature (Outlook and other Office macros),
would of course be an exploit.  But your typical run me and then I
spread myself rampantly throughout your system would not qualify.

Of course, I suppose one could take the stance that Windows inherent
lack of security (or at least the default install's lack thereof) is a
fundamental design flaw that most all viruses exploit.  Though
generally, one would argue that only code exploits really qualify as
exploits.  Else what is the difference between a code exploit, a design
exploit and a social engineering exploit?

Oh well... So much for my defense! ;-)

On second thought, perhaps a list of security holes and the mean time
to patches for them would be the best approach.

Josh

p.s. - It's viruses.

> -----Original Message-----
> From: Adam Augustine [mailto:[EMAIL PROTECTED] 
> Sent: Saturday, 14 February, 2004 08:52
> To: BYU Unix Users Group
> Subject: Re: [uug] Ironic Twist
> 
> 
> I think a simple list of all the viruses (virii? virueese? 
> viroose?) in 
> the last n years with a big banner that says "QUALITY"[1] 
> would be very 
> compelling.
> 
> If we wanted to present a "balanced view", we could provide a list of 
> all the Linux viruses ever[2].
> 
> Adam Augustine
> 
> [1] Dilbert reference, can't find the actual cartoon
> [2] 
> http://www.viruslist.com/eng/viruslistfind.asp?findWhere=011&f
> indTxt=linux
> and not all of those are even linux
> 
> 
> Matthew J. Probst wrote:
> > I'm there.  Someone want to come up with a catchy flier?
> > 
> > 
> > -matt
> > 
> > On Fri, 13 Feb 2004, Evan McNabb wrote:
> > 
> > 
> >>When I went to get the auditorium for our event they told me that
> >>someone else had reserved the room from 6:30pm to 8:00pm. 
> That's why we
> >>had to move the meeting to 8pm. I just found out who has 
> the auditorium
> >>before the Samba presentation:
> >>
> >>----------------------------------------
> >>"Testing Software At Microsoft"
> >>John Overbaugh, Lead Tester at Microsoft
> >>6:30 - 8pm
> >>----------------------------------------
> >>
> >>What are the chances of us randomly getting the same room on campus
> >>right after Microsoft's big recruiting meeting?!?!
> >>
> >>I think we should get a group together around 7:30 or so to hand out
> >>fliers and talk to people as they leave (and invite them to 
> stay to the
> >>Samba meeting). Anyone with me?
> >>
> >>-Evan
> >>
> >>--
> >>/***********************************************************
> *********\
> >>       Evan McNabb: <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>
> >>                 http://evan.mcnabbs.org
> >>             System Administrator, CS Department, BYU
> >> GnuPG Fingerprint: 53B5 EDCA 5543 A27A E0E1 2B2F 6776 8F9C 
> 6A35 6EA5
> >>\***********************************************************
> *********/
> >>
> > 
> > 
> > ____________________
> > BYU Unix Users Group 
> > http://uug.byu.edu/ 
> > ___________________________________________________________________
> > List Info: http://uug.byu.edu/cgi-bin/mailman/listinfo/uug-list
> 
> ____________________
> BYU Unix Users Group 
> http://uug.byu.edu/ 
> ___________________________________________________________________
> List Info: http://uug.byu.edu/cgi-bin/mailman/listinfo/uug-list
> 
> 



____________________
BYU Unix Users Group 
http://uug.byu.edu/ 
___________________________________________________________________
List Info: http://uug.byu.edu/cgi-bin/mailman/listinfo/uug-list

Reply via email to