GENERAL WARNING
Carl Edman
cedman at lynx.ps.uci.edu
Thu Sep 27 14:48:27 AEST 1990
In article <1990Sep26.234214.338 at ibmpcug.co.uk> demon at ibmpcug.co.uk (Cliff Stanford) writes:
cedman at lynx.ps.uci.edu (Carl Edman) writes:
> Now, really: It is very easy to change particularily a programm like
> a shell to f.e. put the name of a non-backtraceable account into the
> .rhosts file and then send mail to it to inform the hacker that
> he has just gotten a new account. Maybe even a su account ?
You mean that if that were included in the source to a
large program (ELM, for instance) you'd notice it was there
before compiling it? I doubt I would.
Regards,
Cliff.
Yes, I think would have a good chance of noticing such a thing
(even if for no other reason that I have to tinker around with
every programm for a few hours before it compiles anyway :-).
Secondly and possibly more importantly: Someone would notice, and
fast. I dare say that if some source is available via anonymous
ftp and is not completely unpopular, no virus would go undetected
for more than one or two weeks, at most. And when it is detected
the sources WILL be removed, there will be an outcry and emergency
broadcasts on all usenet-channels (:-), and the author (or whoever
put the sources there) will be in deep trouble.
A virus in binary form , on the other hand, is hard to spot or
to trace (if it is intelligently done, of course). It may take
months before someone notices effects, and after that it can
take many more months before someone can trace this virus back
to this particular piece of software.
Regards,
Carl Edman
Theorectial Physicist,N.:A physicist whose | Send mail
existence is postulated, to make the numbers | to
balance but who is never actually observed | cedman at golem.ps.uci.edu
in the laboratory. | edmanc at uciph0.ps.uci.edu
More information about the Alt.sources
mailing list