SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Pastimes : VIRUS ALERT -- Ignore unavailable to you. Want to Upgrade?


To: Krikor who wrote (44)7/5/1999 2:21:00 AM
From: Jeff Bond  Read Replies (1) | Respond to of 47
 
1. Using buffer overruns (or overflows), is it possible malicious mobile code can be executed through mail clients. I understand these issues are (or are being) resolved by the manufacturers (Microsoft, Qualcomm, etc.), but who really knows that as one exploit is addressed another one (or more) pops up unknowingly.

2. Is it possible to transfer malicious code via e-mail by sending executables in UUENCODED format?

3. Spoke with Johnny Martinez at Microsoft technical support (IIS Support Group), who advised me there are viruses that exist in the NT environment (which at one time was considered impossible, based on the way NT manages memory and program execution). He described two viruses, both of which were polymorphic and stealth, and were fortunately fairly benign.

4. Johnny Martinez mentioned a worm that had already been released onto the internet by a student at (help me here, was it Cornell, or some other Ivy League school). There is a book written about the topic, and it almost literally took down the internet. This was a ways back by the way.

Thoughts?

Regards, JB