View Single Post
  #44 (permalink)  
Old July 23rd, 2006
Hyper-kun Hyper-kun is offline
flame-retardant
 
Join Date: November 22nd, 2005
Posts: 196
Hyper-kun is a great assister to others; your light through the dark tunnel
Default

I believe Gunsou err Sgt. is just a joker. We all know that filenames are rather irrelevant. You can't tell from the filename whether a file is good or evil. Though there's still some spam that's easy to recognize by simply looking at the filename. I guess that's called overkill. Even the stupider users recognize these files by now. The trick has been overused, people are more cautious and Gnutella clients have rudimentary spam filters which catches most of the simple spam anyway. It would be fairly idiotic to mark dangerous files.

Anyway, your advice, foolofthehill, to use a proxy or whatever isn't really clever. If someone has signed a NDA - which is fairly normal nowadays in many business areas and IT anyway. By saying too much one could easily expose his identity. Not to you, but to those who he is or was working for. Many business contracts nowadays have a clause that says you're not allowed to work for a business in the same area for a couple months. And of course you're not supposed to tell your next boss the trade secrets of you learned at the other business. Telling these to the public is several degrees worse of course. That has little to do with being an "secret agent" or whatever. Of course, for some people it's pretty hard to keep a secret. It's well-known that stupid hackers expose themselves and get caught this way.

Rest assured those who work against Gnutella skim through these forums too.

Further, sometimes people ridicule a topic so that it isn't taken seriously anymore. I doubt that businesses already "attack" Linux users but it might be time to get started. "file permissions" and "user privileges" are not a huge obstacle when it comes to Joe Average. The only real obstacle is that Linux is not as stream-lined as Windows and any known exploit will only work for a small portion of all Linux installations. That said, there was Mac version of the SonyBMG rootkit too and now that Apple switched to the x86, everybody predicts a huge increase in exploits for Macs simply because it's less work and x86 has some inherent flaws that make it easier exploitable than other architectures like PPC or SPARC etc.
Reply With Quote