TIP: Click on subject to list as thread! ANSI
echo: aust_avtech
to: Rod Gasson
from: Bob Lawrence
date: 2004-04-01 05:27:14
subject: Locking Windows

RG> OK, this discussion now has the potential to be endless.
RG> Exactly what is it that distinguishes "text" from "data" ?

> In this context data could be binary,

RG> As I said, this is going to be an endless discussion. Text on a
RG> computer is just as binary as any other data. ie, they are both
RG> nothing more than a series of 0's & 1's. It *could* be argued
RG> that the difference between text and data/binary is that text
RG> only uses 7bits, where as data/binary uses 8bits, and in fact
RG> this was quite a valid arguement 30 years ago. These days, many
RG> 'text' documents contain 8bit data so that distinction no
RG> longer holds water. 

 Text *is* data, for Christ's sake! What distinguishes text from an
EXE file is the header, the first 60 bytes (from memory). If I put an
EXE header on text, the system will try to run it.

RG> The point I was trying to make is that cookies are NOT
RG> executable files

> a point well made.

RG> OK, so now all we have to do is convince Bob of this fact.

 I said "cookies and other crap" or words to that effect. I know
cookies don't run, but they do have access to the system and are
loaded anywhere the cookie-sender chooses to put them. It gives
another way in for a virus.EXE (or any of the many extensions that
Windows recognises and will try to run). I've lost track of what
runs, or where Windows puts them...

 A virus used to be a brilliant little piece of code hidden on the
hard disk with direct access to the O/S. Now you juse use windows
itself and write a SCRIPT, for god's sake! If I *really* wanted to
ruin the World's computers, I'd load an attachment as a "cookie" that
did nothing, and then after a year activate it. I really do worry that
M$ has *already* done that.

 I talk to Americans in the SF echo, and they don't think like us
human beings. They actually feel threatened by insane things. They
think Bin Laden could destroy America! ROFL! If  drop into their
mindset, it frightens me. I think it is more than possible that the US
has a way to kill every computer on planet Splong, using Intel and M$
(which explains why Gates seems free to flaunt their antitrust
laws). So... is it paranoid if they are *really* out to get you?

RG> No they are not. The MACRO's that may be embeded within the
RG> files are "effectively executables for virus purposes", but the
RG> document files themselves aren't. If you don't make this
RG> distinction then you are going to be in the Bob Lawrence camp
RG> in thinking that ZIP files are also "executable for virus
RG> purposes", and hopefully you know better.

 I don't think *you* understand, Rod. What is the difference between 
a self extracting ZIP file and an EXE file? From memory, six bits in
the header. Not a lot of protection... is it?

RG> He does have a point though, if you don't have a computer, then
RG> you cannot get a computer virus. If you don't have internet
RG> access, then you can't get a virus that is spread from the
RG> internet. Problem is, he seems to forget that computer virus's
RG> existed long before the 'net as we know it came into being.

 I forget nothing. Before Win98 and Explorer, we had an O/S that was
understandable and managable (but pretty-well fucked), and when you
sent data every kilobyte counted. The BBS filtered spam and the
sysops fopund the viruses. What you say about running EXE's was true.
a virus scan could search for a few specific bytes to find the
nasties. Now... M$ has made it possible to insert a "virus" using
plain text! It's no longer the really clever little code that hid in
the boot sector or the partition information, but who cares? It might
as well me a megabyte in plain sight.

 And Microsoft has *admitted* that they have a backdoor in Windows.
Did they really think that hackers wouldn't know that?

RG> The Internet, Zip files, doc files with embed macro's, and so
RG> for are still nothing more than transport mechanisms - the
RG> virus code STILL needs to be executed before an infection can
RG> take place.

 But Windows makes it *automatic!*

> It seems there was some way to get OE to run stuff wiothout
> asking and there was no way to block it.

RG> Funny, I check for Mickysoft updates on a daily basis and there
RG> haven't been any security updates for nearly a month now. You
RG> must be WAY behind the times.

 That assumes that M$ *want* to fix it.

RG> The reason WHY I've never been infected isn't just because I
RG> keep up to date with security patches (I know plenty of other
RG> people that also do this, and STILL get infected on a regular
RG> basis), the reason why I've not had a single infection is by
RG> doing what I tell other people to do all the time, namely, I
RG> DON'T open attachments unless it is something I was expecting,
RG> and never ever run executables of unknown origin. These two
RG> simple rules is all it takes to remain virus free.

 So, what if I ring you up and tell you I'm sendign you a great
picture of big tits? And I send it but there's a Bob-virus embedded?
That does nothing just then...?

RG> simple rules is all it takes to remain virus free.

 Sure it is... and what if those updates you check daily from
Microsoft are what's infecting your PC? Except it hasn't been
activated yet? You download megabytes, and you don't have a clue
what's there!

RG> I then use Explorer to view the email as plain text - This
RG> eliminates the possiblty of anything actually being executed
RG> and that is usually enough to satisfy my curiosity about the
RG> actual contents.

 You use explorer!!! I use a plain DOS text editor. How can you
possibly trust Explorer?

RG> The SIDE effect of this is that the actual viral message then
RG> gets stored in my cache directory (harmless), but, when I do
RG> run the online virus checker (housecall, by trend micro) it
RG> never fails to report all of these virus tucked away in the
RG> cache. 

 I love the logic behind that. It "never fails to report..." how do
you know? That's the problem with a virus checker... you never know
until someone else finds the super-clever virus.

RG> It is important to realise that simply having a virus on the
RG> computer is NOT enough to cause the computer to be infected -
RG> As I keep saying, the virus code needs to be executed in order
RG> for the infection to occur. 

 There are two kinds of virus... 

 The old-fashioned *clever* kind that used the O/S itself to run them
and self duplicate. Ordinary actions like inserting a floppy copied
the virus to the floppy, and so on. These were relatively easy to
find, with only a few specific commands art risk (a thousand or
so). That still works...

 With WinXP, many other ways have been introduced (XP is *much* more
complex), and the virus is not always recognisable until ti staerts
stuffing the sytem doing weird things. It can be a megabyte.

RG> Oh yeah, I *could* (and do) often "inspect" virus infected
RG> emails simply by using "view source" (CTRL-F3) often combined
RG> with "Quick view plus" (in order to view the contents of any
RG> zip files) - This has the same immunity as viewing them via the
RG> webserver but it means viewing them one at a time as I come
RG> across them. Those that are viewed via the browser have been
RG> automatically filtered and saved as the mail arrives. :-) 

 How do you know they are viruses? Maybe they're just pictures of big
tits. 

Regards,
Bob

--- BQWK Alpha 0.5
* Origin: Precision Nonsense, Sydney (3:712/610.12)
SEEN-BY: 633/104 260 262 267 270 285 640/296 305 384 531 954 1042 690/734
SEEN-BY: 712/610 848 774/605 800/221 445
@PATH: 712/610 640/531 954 633/260 267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.