From: "Rich"
This is a multi-part message in MIME format.
------=_NextPart_000_0174_01C5BA96.26DC7510
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Actually it is easier to perform decyption in script, an =
intentionally supported capability, then to get administrative control. =
Now maybe you know something about adobe pdf javascript that you =
described as the source than I do. I think though that this is just = more
pointless complexity as you try to make your scenario source less = silly
to yourself.
Rich
"Geo" wrote in message
news:432a9c6c$1{at}w3.nls.net...
No rich, I don't start with that premise I start with the premise that =
you might have some limited way to get at scripting which might make it =
possible to change a plain text setting but would be infinitely more =
difficult to write a decryption engine in...
Geo.
"Rich" wrote in message news:432a598e{at}w3.nls.net...
You still miss the point as your whole complicated scenario is =
pointless. You start with the premise that the computer is already = under
the control of the malware. Your attempts to make the scenario = sillier
or more complex don't change anything. Pointless encryption = doesn't
change anything either.
Rich
"Geo" wrote in message =
news:432a29e5{at}w3.nls.net...
"Rich" wrote in message news:4329a65e{at}w3.nls.net...
>> Encryption when the keys to encrypt and decrypt are available =
is not
encryption.
Call it whatever you like, the fact that you have to get the key, =
write a
decryption/encryption routine, all mean that it's harder to do and =
that it's
more likely IDS and AV systems can key in on the exploit code.
Or explain to me why NT doesn't store passwords in clear text in =
the
registry?
Geo.
------=_NextPart_000_0174_01C5BA96.26DC7510
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Actually
it is easier to =
perform=20
decyption in script, an intentionally supported capability, then to get=20
administrative control. Now maybe you know something about adobe
= pdf=20
javascript that you described as the source than I do. I think =
though that=20
this is just more pointless complexity as you try to make your scenario = source=20
less silly to yourself.
Rich
"Geo" <georger{at}nls.net>">mailto:georger{at}nls.net">georger{at}nls.net>
wrote=20
in message news:432a9c6c$1{at}w3.nls.net...
No rich, I don't start with that =
premise I start=20
with the premise that you might have some limited way to get at =
scripting=20
which might make it possible to change a plain text setting but would =
be=20
infinitely more difficult to write a decryption engine =
in...
Geo.
"Rich" <{at}> wrote in message news:432a598e{at}w3.nls.net...
You
still miss the =
point as your=20
whole complicated scenario is pointless. You start with the =
premise=20
that the computer is already under the control of the malware. =
Your=20
attempts to make the scenario sillier or more complex don't change=20
anything. Pointless encryption doesn't change anything=20
either.
Rich
"Geo" <georger{at}nls.net>=20">mailto:georger{at}nls.net">georger{at}nls.net>=20
wrote in message news:432a29e5{at}w3.nls.net..."R=
ich"=20
<{at}> wrote in message news:4329a65e{at}w3.nls.net...=
>> =20
Encryption when the keys to encrypt and decrypt are available is=20
notencryption.Call it whatever you
like, the fact that =
you=20
have to get the key, write adecryption/encryption routine, all =
mean=20
that it's harder to do and that it'smore likely IDS and AV =
systems can=20
key in on the exploit code.Or explain to me why
NT doesn't =
store=20
passwords in clear text in=20
=
theregistry?Geo.
------=_NextPart_000_0174_01C5BA96.26DC7510--
--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267
|