Page 3 of 3 FirstFirst 123
Results 21 to 25 of 25
  1. #21
    The ******* Shadow dalek's Avatar
    Join Date
    Sep 2005
    Originally posted here by Synja
    So... it gets the malware before it has connected to a vulnerable service?

    And it gets it before the download starts?
    Right on both accounts, it mostly acts like a "firewall" I suppose, it will detect the threat of a network virus and depending on how you have it set up will either quarantine the malware or shutdown the network connection, or both.
    PC Registered user # 2,336,789,457...

    "When the water reaches the upper level, follow the rats."
    Claude Swanson

  2. #22
    If a local process can see it, it has already reached the machine.

    I will post some suggestions about locking down IE through local security policy and file permissions later tonight. I just have to wait for t3h b4by to go to sleep. If I don't get to it tonight, I'll do it tomorrow morning when everyone's still sleeping.

  3. #23
    Senior Member IKnowNot's Avatar
    Join Date
    Jan 2003
    If a local process can see it, it has already reached the machine.
    And your point is ?

    If you connect to it with IE, IE is a local process, and it can see it too. But the question is, what will your system do with it?
    IF you have locked down your system so it won’t run ActiveX components, then you have told it to ignore what it sees.
    If your AV quarantines it, it doesn’t run.
    If you have your system locked down and an ActiveX runs, but doesn’t have permissions to alter or install anything on the system, then you have mitigated damage that way.

    An AV is just another layer. If the AV catches something before it has had a chance to do its damage then where is the difference and what are you talking about?
    It is just a different local process that sees it and prevents it from doing damage. ( we are talking web browsing here, you have not addressed e-mails, etc., although I tried to earlier.)

    Want some examples ( beyond the masses of stupid people who are everyday users of computers? )
    How about you, while browsing and have your kid on your lap, you go to look at something only to find that it has an ActiveX script to run. You are distracted by your kid. You get prompted to run it, you don’t want to, but your kid picks that moment to fling the bottle at your groin; you clicked on accept instead of cancel ... now you are hoping you have something else in place just in case. ( I was going to use the drunk scenario, but thought this would ‘hit home.’ If it didn’t, it will! )

    Or what about when your ‘significant other’ is trying to view something, then can’t? ( or that bastard at work who wants to make your life miserable, and has the ear of your boss’s boss ? ) Or you want to view the new Harleys, but they use off-site images, etc.?

    I posted this ( in disgust ) on another site, think it appropriate here. It exemplifies the mind set of people in general about computers:

    Something caught my eye in the February 16 edition of Network Computing Magazine :

    "AJAX Isn't Squeaky Clean "
    ( the title of the online article is a little different: Is Is AJAX a security risk? )

    What really intrigued me was the last line,
    Is AJAX a security risk? Probably. But let's not drag Web services through the mud just because AJAX is one of today's most commonly used SOA clients.

    Does this chew at anyone else?

    I mean not just the statement, but the underlying concept behind it. It is prevalent throughout the industry, has steered the development of the IT industry for the past decade, but isn't it time that people in general came to grasp that security is everyone's responsibility, and liability?

    Am I off base here? Or doesn't anyone else see what I see?

    Terms used in the article:
    That is the reality of what we are dealing with.

    Don’t get me wrong. AV software is not ( although many believe it is ) an end-all to answer security. Far from it. But it fills a gap, especially when people want to view sites who’s only consideration is usability and convenience and have no concern for security. ( BTW, this is also applicable to software developers, ISPs, etc. )

    The concept has been around for years: Security in Depth, Layered Security, whatever you want to call it. Hopefully, those in the field will eventually be able to understand and overrule when it comes to security, but right now the all mighty dollar and user conveyance rule.

    Education is the key.
    AO has been a place for people to learn this. Hopefully, it will continue to lead in this respect
    " And maddest of all, to see life as it is and not as it should be" --Miguel Cervantes

  4. #24
    Master-Jedi-Pimps0r & Moderator thehorse13's Avatar
    Join Date
    Dec 2002
    Washington D.C. area
    You guys need to get out of your ivory towers more often.
    LOL. Be sure to tell me this when your identity is being used by Dr. Akeem Hoobackaloo, the sole benefactor of the kingdom of Zamunda.

    I think he may still need some additional info from you so he can transfer your 2 million dollars of US.

    Our scars have the power to remind us that our past was real. -- Hannibal Lecter.
    Talent is God given. Be humble. Fame is man-given. Be grateful. Conceit is self-given. Be careful. -- John Wooden

  5. #25
    Dissident 4dm1n brokencrow's Avatar
    Join Date
    Feb 2004
    Shawnee country
    How did you know my real name, horse?

    “Everybody is ignorant, only on different subjects.” — Will Rogers

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts

We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.