TIP: Click on subject to list as thread! ANSI
echo: aust_avtech
to: John Tserkezis
from: Bob Lawrence
date: 2004-04-01 06:36:16
subject: Locking Windows

JT> You can't. It contains several parameters:

JT> Cookie name: (manditory) the name of the cookie. Content:
JT> (manditory) usually a unique identifier, serial number of
JT> sorts. Exipres: time/date when the cookie is no longer valid
JT> Path: the network path the cookie is valid for. Domain: the
JT> domain the cookie originated from.

JT> None of which are code, or executable, in any way.

 Good Lord! Are you saying that hackers don't lie and cheat? Thank
goodness for that. And here was I, thinking that all I had to do was
call and EXE a cookie, and wait for the first person to open it by
clicking on Explorer...

 You've just finished explaining that "text" can be anything in the
Windows environment. So all I have to do is put a ZIP EXE header on my
cookie, and WinZip will try to run it for me...

JT> A search for "cookies" via google will return many sites that
JT> explain cookies, their structure, and use.

 Assuming that the world is a lovely place where no one cheats.

JT> No, that was Bob's paranoia telling him that cookies are some
JT> evil thing that can hack into your computer. When the fact
JT> remains, that the host could _create_ and _request_ an exising
JT> cookie to see if you've been there before. And then, they can
JT> only be created (or returned) if the *browser* allows it.

 A cookie is one way a remote computer can insert data into *your*
computer. You have no idea what's in the cookie... *they* own it. If
you visit them again, they access your cookie, and if they've cheated
and made it an EXE (with a new header) then hello... the trojan rides
again.

JT> Note however, that many sites *need* cookies to keep track of
JT> where you are, and where you've been, otherwise they won't
JT> work. Those who do, check to see if you have cookies enabled
JT> first, and warn you if you don't. 

 So, you enable cookies and hello... things start to happen as soon
as you do something else. Rod is right. *You* have to run something,
but not necessarily what you think you are running...

JT> I've got one better. Remember the "Good times" virus? The virus
JT> where its sole mechanisim for duplication was the end user
JT> themselves? (I'm calling it a virus because it did indeed
JT> propigate and duplicate). 

 My definition of a virus is something that harms *my* data. By your
definition, Windows itself is a virus.

>> Whoops, that's it, I've just made Bob even more paranoid.

> Is that possible? ;-)

JT> It is now that he knows about the Good times virus. :-)

 I've only ever had one virus. It came with a computer I bought, and
all it did was infect itself onto every media, over and over
(including the floppies I used to load Windows). It is amazing how
many floppies you can infect (not to mention the hard drive), when you
load a new system. By the time I realised what was happening, I'd
infected all my backups (I never use the original discs to load
anything) and I was within an ace of infecting the other computer as
well.  

 I created a fresh system disc, booted, and wiped the whole fucking
thing, partitions and all. Then I did it again.

 BTW, MacAfee virus scan was useless (and then *it* got infected!).
That was one of your *genuine* viruses where you never know where it
came from only what it does. I think it was a boot sector virus, but I
never found it.

Regards,
Bob

 

--- BQWK Alpha 0.5
* Origin: Precision Nonsense, Sydney (3:712/610.12)
SEEN-BY: 633/104 260 262 267 270 285 640/296 305 384 531 954 1042 690/734
SEEN-BY: 712/610 848 774/605 800/221 445
@PATH: 712/610 640/531 954 633/260 267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.