|
Authored by: Anonymous on Friday, June 08 2012 @ 09:30 AM EDT |
You're still missing the human element and the creative element of those that
wish to author viruses.
Human element: Individual leaves the switch set
to write, or changes it to write as soon as they boot up Windows so they don't
have to keep toggeling it every few minutes (system needs to write to download
email, needs to write when someone wants to rip a music cd,
etc).
Creative element: Virus gathers it's info and lies in wait till the
toggle is switched, then writes.
RAS[ Reply to This | Parent | # ]
|
|
Authored by: Anonymous on Friday, June 08 2012 @ 11:55 AM EDT |
And I think I've provided enough examples to show how people can code around
the suggested solutions being presented. I'll pass on responding to anymore
suggested solutions with how easy they will be to work around.
The bottom
line is the very basic logic:
If I, the user, have authorization to do
something to the computer
then
A software program "pretending" to be me
is authorized to do that something
The difference being whether or not I,
the user, actually intended to do that something.
Even if all you can do
is query... then a virus can be authored which can then flood said system with
queries - a DOS.
Since the logic above is in-escapable, the only
virus-proof computer is one where no one has authorization to do
anything!
RAS[ Reply to This | Parent | # ]
|
- flaws in logic - Authored by: Anonymous on Friday, June 08 2012 @ 03:52 PM EDT
|
|
|
|