Results 1 to 4 of 4
  1. #1
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    United Kingdom: Bridlington

    A man of honour?

    I found this tidbit on a government tech site:


    I just found the guy's name rather amusing

    UK coverage of the story here:

    Last edited by nihil; February 26th, 2007 at 02:35 PM.

  2. #2
    AO Curmudgeon rcgreen's Avatar
    Join Date
    Nov 2001
    users who clicked on the links were infected with a Trojan horse
    I can't resist. Maybe that should read "users of Microsoft Windows XP who
    clicked on the links, etc. etc " Or did he mean "users who downloaded the EXE file
    and installed it etc. How do you get a trojan from just clicking a link in your browser?
    Isn't that a bit of an oversimplification? Usually these scams tell you you need a codec
    and then you download it and install the trojan for them. Like yeah, every Pr0n film
    needs its own custom codec, right?
    I came in to the world with nothing. I still have most of it.

  3. #3
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    United Kingdom: Bridlington
    As I see it, the user had to open something?

    Although "drive bys" are certainly technically possible

  4. #4
    Senior Member Aardpsymon's Avatar
    Join Date
    Feb 2007
    St Annes (aaaa!)
    There are many examples of exploits that do NOT require user intervention in any way.

    The entire point of service pack 2 for XP was to fix a lot of these bugs. One example I read was a certain graphics package had a bug where arbitrary code could be executed from a JPG file. There goes the idea that only binary files can carry a virus. I don't really remember the details unfortunately.

Similar Threads

  1. it is an honour
    By owor in forum Roll Call
    Replies: 0
    Last Post: May 12th, 2004, 07:06 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts

We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.