Forgot your password?
typodupeerror

Comment: Re:Not that great of a car analogy... (Score 1) 129

by diverman (#34440332) Attached to: Aussie Gov't Decides ISPs Aren't Responsible For Infected Computers

I think the original analogy is very poor, personally. It implies that the responsibility shouldn't lay with the ISPs by comparing them with manufacturers of vehicles. ISPs are much more like the people who manage and regulate the roads and toll booths. Unlike card manufacturers with bad drivers, ISPs actually in an ideal position to effectively address the problems of infected computers. In addition, they provide the resources (which belong to the ISPs) that an infected computer requires in order to be a threat to the Internet at large (and thus other computers). It is the ISPs networks that they sell. And most ISPs actually have in their contracts with their customers (at least in the US) that their networks may not be used for crime, abuse, etc. So, the ISPs likely have legal standing already to enforce the issue.

Although, turning those users "off" without warning and giving alternatives is a bit extreme. It would be nicer (as I've seen with some ISPs in the US) if the user were notified that suspicious malware-related communication is coming from their Internet connection. And if not resolved after a notification or two, disable access until the problem is resolved. Again... it's the ISPs' networks that are also responsible for the problem... not just some end user's computer.

Comment: Re:File under "Dumb Ideas" (Score 1) 413

by diverman (#33842920) Attached to: Microsoft Eyes PC Isolation Ward To Thwart Botnets

Yeah, one problem... Anti-virus is not terribly effective against a lot of the botnets out there! They update themselves more often than most A/V companies update their DATs. And many of them are managing to root-kit the system, so even if it's cleaned, hidden processes (even from the OS) just reinfect.

I work in security. I tracked down 2 systems just this week (a number of others I provided for the local sys admins to track down) that had spam malware (detected and tracked down through outbound traffic monitoring for a 15K+ employee network). One of the systems got a clean bill of health from McAfee... well, actually, it found malware, said it cleaned it, except for some running processes. So, reboot the system... all the malware came back. The system had a root kit that can really only be cleaned by a full re-install of the system (or an off-line boot CD that could possibly clean it if properly identified). And the user who didn't know better just assumed he was clean when the A/V software said he was, and that maybe he kept getting infected... but felt safe because the McAfee "status bar" was green.

So... while it sounds like a neat theory, I am highly skeptical of it being fully successful. It would reduce things greatly to ensure people are running A/V. Although, it also forces people to run A/V, and probably only "supported vendors".... i.e. pay someone to scan your system if you want to use the Internet, in addition to you Internet access fees. Not sure how I feel about the power posturing and shifts in this scenario.

Comment: More downside to malware than just downtime. (Score 4, Informative) 472

by diverman (#31928188) Attached to: McAfee Kills SVCHost.exe, Sets Off Reboot Loops For Win XP, Win 2000

I agree that it raises question as to why one should use them, but "down time" is not the biggest threat out there, if you wanna talk loss/cost. While one's time is valuable, I'm thinking that their bank account information, passwords, etc, might be slightly more valuable to them. Personally, I think good secure end-user practices is the best protection, I do think that a good A/V program is needed.

So, while there is malware out there that is less harmful, more of the malware out there is much MORE harmful... if you disagree, please provide your financial account information, or contact me to transfer all funds to a secured off-shore account... maybe buy me a new car too! ;-)

But seriously... this is really bad, and REALLY stupid. But having no protection for most users risks damaging them in ways worse than a few hours of time to manually fix their issue. And from a corporate perspective, loss of sensitive information is a BIG deal and can cost a LOT more. And that's just talking about data loss. Being part of a botnet to help facilitate financial fraud and other badness... that's also double plus ungood... and irresponsible to not take measures to help keep your computer from playing a part in those crimes.

Anyway... I agree it raises question... but there more downside to malware than just downtime.

Security

Rootkit May Be Behind Windows Blue Screen 323

Posted by kdawson
from the pre-owned dept.
L3sPau1 writes "A rootkit infection may be the cause of a Windows Blue Screen of Death issue experienced by Windows XP users who applied the latest round of Microsoft patches. It appears that the affected Windows PCs had the rootkit infection prior to deploying the Microsoft patches. Researcher Patrick W. Barnes, investigating the issue, has isolated the infection to the Windows atapi.sys file, a driver used by Windows to connect hard drives and other components. Barnes identified the infection as the Tdss-rootkit, which surfaced last November and has been spreading quickly, creating zombie machines for botnet activity."

Comment: Re:Hardly... (Score 5, Interesting) 641

by diverman (#21055943) Attached to: Apple's Missed Opportunity With Leopard Delay
I completely agree. I also think that it can be attributed to a continuing breakdown of the perception that there is a gross incompatibility between Mac users and the rest of the world. While I still do field questions such as "Will I be able to open a Word file someone sends me," they are becoming less frequent. I even hear concern about whether someone with a Mac will be able to receive email from someone with a Windows computer. I think that as the Mac becomes more popular, more people realize that there really isn't a whole lot of compatibility issues for the majority of what they want to do.

There are three kinds of people: men, women, and unix.

Working...