TIP: Click on subject to list as thread! ANSI
echo: aust_avtech
to: John Tserkezis
from: Bob Lawrence
date: 2004-04-18 22:06:10
subject: Locking Windows

JT> It doesn't work like that. It's just stored data, all that
JT> happens, is that data is returned to the original sender, if
JT> the original sender asks for it. All it does is prove that
JT> you've been there before. This is where the ethics can get a
JT> little into the grey area.

 I know what a *real* cookie does... what worries me is what a virus
masquerading as a cookie *might* do. The sender is able to download a
file into a known area on your hard drive, and access it later. Jeeze!
Doesn't that worry you?

JT> You have a record of what serial number (that you've invented)
JT> has visited you, what they've done, how long they've done it,
JT> and what you haven't done. 

 I *know* all this.

JT> Virii and trojans don't come into the picture at all. (with
JT> cookies)

 If I wanted to send you a trojan, I'd have to put it in C: or
C:\windows and you could find it there. Or... I could use a cookie.

JT> A search for "cookies" via google will return many sites that
JT> explain cookies, their structure, and use.

 Who explains the illegal uses?

> A cookie is one way a remote computer can insert data into *your*
> computer.

JT> Yes. One remote site can create a cookie with its site name in
JT> it. One site cannot create a cookie on 'behalf' of another site
JT> though.

> You have no idea what's in the cookie...

JT> Nor do you really need to know or care.

 You might, if it's a trojan.

JT> Yes, that's the idea. That's how they know where you've been.

> and if they've cheated and made it an EXE (with a new header)
> then hello... the trojan rides again.

JT> Can't do that. It's just a storage system for data that is
JT> effectively a randomly generated serial number.

 You keep saying that. What it is... is a file inserted by someone
else into a known area of your hard drive. There can be *anything* in
that file, and the file can be *any* size hidden amongst thousands fo
other cookies. The only oen who knows where and what is the one who
originally inserted it.

 AND THAT WORRIES ME...

 In reply, you keep telling me what a cookie is *supposed* to be (and
I already fucking know that!).

JT> It can't just be magically changed into an executable. Even if
JT> the _data_ were a string of assembly code, it would do nothing
JT> except be sent back to the site that created it, if they
JT> requested it back. It never gets run. 

 It never gets run? How does a trojan get run?

> So, you enable cookies and hello... things start to happen as
> soon as you do something else.

JT> Stuff me. That's a little vague Bob. How about you elaborate on
JT> that and tell us _exactly_ what starts to happen when you "do
JT> something else", what's that "something else"?

 You want me to write you a virus? 

 Okay. How about I'm a respected site (like Borland), and I send you
a trojan cookie. And then I decide that it's time to wipe all the
Borland free programs past their use-by (because some bastard has
cracked the codes). Now, when you update I activate my "cookie" and
wipe your hard drive of the pirated software. Is that enough specific 
"somethign else" for you?

> By your definition, Windows itself is a virus.

JT> No, my definition of a "computer" virus is a piece of code that
JT> is self-replicating. The method of self-replication is besides
JT> the point. As is the (likely) malicious intent.

 As I said... Windows is a virus. It certainly keeps on replicating
itself, every three years it upgrades.

> I've only ever had one virus. It came with a computer I bought,
> and all it did was infect itself onto every media, over and over
> (including the floppies I used to load Windows).

JT> You mean you didn't write-protect them?

 I always use copies. Write-protect can be avoided.

JT> Yes, that's why I write protected everything. On software that
JT> wrote back to the disk (say for copy protection purposes), I
JT> made a duplicate disk *first*, then used the copy to install.

 Does the write-protect tab physically prevent writing, or does it
merely rely on the computer? Why not disable the write protect with
your virus (and catch those who believe the tab does something real)? 

> BTW, MacAfee virus scan was useless (and then *it* got
> infected!).

JT> Duh, that's why gynaecologysts don't stick their dicks into
JT> their patients. When you're trying to _cure_ an infection, it
JT> helps if you don't get infected _yourself_...

 And how does that analogy relate to anything real? Of course you
isolate the computer (and floppies) once you realise it's infected,
but by then the virus scan is *also* infected! And you can't load a
new copy because *it* will become infected!

 I get the feeling you don't understand the problem, John.

 What you have to do, is use a virgin system disk just once, to wipe
the hard drive (including the partition information). 

> That was one of your *genuine* viruses where you never know where
> it came from only what it does.

JT> You know where it came from, you can backtrack to the last
JT> known outside source of data/disks. Then you point the finger.
JT> Worked every time. 

 Jeeze, you're good.

 The trouble with a *real* virus, is that it can sit there doing
nothing until miles past you know where it came from. It may not even
be the "last" external data, but ten floppies before that. I had to
assume that my one came with the new computer, but it could have been
on a new formatted floppy just as easily.

JT> What it did demonstrate is the far-reaching implications of
JT> swapping disks, how often people did it, and the lengths they
JT> went to even on normally isolated machines.

 Once was enough for me, but even so, you run risks.

Regards,
Bob


 

  

--- BQWK Alpha 0.5
* Origin: Precision Nonsense, Sydney (3:712/610.12)
SEEN-BY: 633/104 260 262 267 270 285 640/296 305 384 531 954 1042 690/734
SEEN-BY: 712/610 848 774/605 800/221 445
@PATH: 712/610 640/531 954 633/260 267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.