SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Pastimes : VIRUS ALERT

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Krikor who wrote (44)7/5/1999 2:21:00 AM
From: Jeff Bond  Read Replies (1) of 47
 
1. Using buffer overruns (or overflows), is it possible malicious mobile code can be executed through mail clients. I understand these issues are (or are being) resolved by the manufacturers (Microsoft, Qualcomm, etc.), but who really knows that as one exploit is addressed another one (or more) pops up unknowingly.

2. Is it possible to transfer malicious code via e-mail by sending executables in UUENCODED format?

3. Spoke with Johnny Martinez at Microsoft technical support (IIS Support Group), who advised me there are viruses that exist in the NT environment (which at one time was considered impossible, based on the way NT manages memory and program execution). He described two viruses, both of which were polymorphic and stealth, and were fortunately fairly benign.

4. Johnny Martinez mentioned a worm that had already been released onto the internet by a student at (help me here, was it Cornell, or some other Ivy League school). There is a book written about the topic, and it almost literally took down the internet. This was a ways back by the way.

Thoughts?

Regards, JB
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext