hack attempt - what to do
Scott Elcomb
Scott.Elcomb-iRg7kjdsKiH3fQ9qLvQP4Q at public.gmane.org
Sat Aug 7 19:21:32 UTC 2004
I've had a similar thought of using viral-like infections as an an
anti-virus and/or real-time cracking prevention scheme a few times.
The biggest problem though (I think) is that in an age where the public
lives in constant fear of spam and viruses, would it be accepted
socially?
While I don't hold out much hope for a yes to the above question, I do
have a technical question:
Would it be possible to solidly identify the worm by it's actions -
while it's attempting it's break-and-enter?
Thanks for the heads up. I agree totally with Maddison - the TLUG list
is great!
On Sat, 2004-08-07 at 14:09, Tom Legrady wrote:
> So maybe someone can write a disinfecting virus that spots these
> attacks, infects the attacking machine and disinfects it, then spreads
> from there.
--
https://sourceforge.net/projects/avalonweb/
PGP Public Key:
1024D/98125E76 2004-03-21 Scott Elcomb (dL33T) <Scott.Elcomb-iRg7kjdsKiH3fQ9qLvQP4Q at public.gmane.org>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
URL: <http://gtalug.org/pipermail/legacy/attachments/20040807/da3de1fb/attachment.sig>
More information about the Legacy
mailing list