1. Using buffer overruns (or overflows), is it possible malicious mobile code can be executed through mail clients. I understand these issues are (or are being) resolved by the manufacturers (Microsoft, Qualcomm, etc.), but who really knows that as one exploit is addressed another one (or more) pops up unknowingly.
2. Is it possible to transfer malicious code via e-mail by sending executables in UUENCODED format?
3. Spoke with Johnny Martinez at Microsoft technical support (IIS Support Group), who advised me there are viruses that exist in the NT environment (which at one time was considered impossible, based on the way NT manages memory and program execution). He described two viruses, both of which were polymorphic and stealth, and were fortunately fairly benign.
4. Johnny Martinez mentioned a worm that had already been released onto the internet by a student at (help me here, was it Cornell, or some other Ivy League school). There is a book written about the topic, and it almost literally took down the internet. This was a ways back by the way.
Thoughts?
Regards, JB |