| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: what to do when malware already has administrative control |
From: "Rich"
This is a multi-part message in MIME format.
------=_NextPart_000_015B_01C5BA45.C517D3B0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
You still miss the point as your whole complicated scenario is =
pointless. You start with the premise that the computer is already = under
the control of the malware. Your attempts to make the scenario = sillier
or more complex don't change anything. Pointless encryption = doesn't
change anything either.
Rich
"Geo" wrote in message
news:432a29e5{at}w3.nls.net...
"Rich" wrote in message news:4329a65e{at}w3.nls.net...
>> Encryption when the keys to encrypt and decrypt are available is =
not
encryption.
Call it whatever you like, the fact that you have to get the key, =
write a
decryption/encryption routine, all mean that it's harder to do and =
that it's
more likely IDS and AV systems can key in on the exploit code.
Or explain to me why NT doesn't store passwords in clear text in the
registry?
Geo.
------=_NextPart_000_015B_01C5BA45.C517D3B0
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
You still
miss the point =
as your whole=20
complicated scenario is pointless. You start with the premise that = the=20
computer is already under the control of the malware. Your = attempts to=20
make the scenario sillier or more complex don't change anything.
= Pointless=20
encryption doesn't change anything either.
Rich
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 270 5030/786 @PATH: 379/45 1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.