Slate On Worms That Plug Security Holes 417
gwernol writes "Slate has a well-written article on 'white knight" worms like Nachi that attempt to automatically patch security holes; Nachi try to patch the hole that MyDoom exploits. The article calls for Google and others to incent White Hat programmers to create better White Knights. But are 'good viruses' really a good idea? Nachi created almost as much bandwidth congestion as MyDoom. Do we really want programs jumping onto our systems and 'fixing' them without permission? What about a socially engineered worm that claims to be doing good?"
No. (Score:2, Insightful)
No.
These could be Trojan.
If I give you some worm that's supposed to cure another but which in fact is another one...
No.
Re:No. (Score:2, Interesting)
Re:No. (Score:2, Insightful)
I'd prefer that no worms existed at all but given the choice I'd much rather have my idiot neighbor to open a good virus then a bad one, there's going to be wasted bandwith either way but atleast the good virus could stop some waste in the future.
Re:No. (Score:2, Funny)
Re:No. (Score:3, Insightful)
Is a there such a thing as "good SPAM" or "good junk mail?" Aren't they just all an unneeded drain on our resources? Same goes with these worms. When are these kids going to get it? Breaking into our networks does not help us!
And, yes, we need to have proactive security (for the most part we do) but just because we have an opening is not an inv
One bad idea (Score:5, Insightful)
There is no "good virus". (Score:3, Insightful)
Re:There is no "good virus". (Score:2)
Here is a related article... (Score:5, Informative)
Re:Here is a related article... (Score:5, Insightful)
Easy. They're all bad, including the good.
It might be justified if "enough is enough!", but if you have to ask, it is never justified. It might be good at the moment, but once the moment is past, it is a bad virus.
Confusing situation - but use biology as a model (Score:5, Interesting)
While there are certain to be real dillemas and dragons here, it seems that exploring the idea of white worms and whatnot is a good idea, after all, is there any other solution for the systems that are not managed? However, white worms should have oversight (e.g. registered source code to some oversight body, managed release into the wilderness, etc..) somewhat akin to oversight for the immune system in an organism..
When in doubt, consult how nature does it - the more complex our systems become, the more similar our solutions look to natures.. Very intriguing..
Nachi was in response to Blaster (Score:5, Informative)
Re:Nachi was in response to Blaster (Score:5, Informative)
******** From Symantec **********
W32.Welchia.B.Worm is a variant of W32.Welchia.Worm. If the version of the operating system of the infected machine is Chinese (Simplified), Chinese (Traditional), Korean, or English, the worm will attempt to download the Microsoft Workstation Service Buffer Overrun and Microsoft Messenger Service Buffer Overrun patches from the Microsoft® Windows Update Web site, install it, and then restart the computer.
The worm also attempts to remove the W32.Mydoom.A@mm and W32.Mydoom.B@mm worms.
Also Known As: W32/Nachi.worm.b [McAfee], W32/Nachi-B [Sophos], Win32.Nachi.B [Computer Associates], WORM_NACHI.B [Trend],
Probably.. (Score:5, Interesting)
For others, who have mission critical application or other extensions on the target OS, such "White Knights" may send a shiver down the spine:
What if it plugs a hole, but breaks something else?
From what I have seen, such socialist stuff doesn't really go down well with corporations. They don't give away things for free, and they don't expect anything given to them for free.
Re:Probably.. (Score:2, Insightful)
Kind of like having robbers in charge of security in a bank.
Re:Probably.. (Score:5, Interesting)
The only problem is that the users who would most benefit from this type of service aren't the type to be proactive in their fight against viruses and would probably never use something like that unless it came preloaded and turned on by default and Micro$oft would never let that happen.
Perhaps the ISPs need to take more responsibility for identifying viral network activity and block it, while notifying the end users. Something like when they go to connect to the internet, they get a page notifying them that their machine is infected and they need to call a certain phone number before they are let back on.
Re:Probably.. (Score:2)
Re:Probably.. (Score:2)
If a 'good' virus manages to get onto your system without you installing it, then you are already fucked and it really doesnt matter.
Of course no one here is going to like this idea, but as you say - its for granny and gramps and others who aren't running firewall and antivirus software and blindly open every damn attachement they get.
I think its a great idea - it can only 'cure' people who are at risk, and even if it does break their system, they
Re:Mission Critical (Score:2, Insightful)
There is no excuse for Corporate security exploits. Unless the corporation just doesn't care about it's computing.
Re:Mission Critical (Score:2)
I think the above statement was made in good faith and with good intentions. We all *know* that corporations should have the best resources - best admins, latest patches to all the workstations/hosts in the network, best firewalls, etc. We all *know* that these corporations should also have a well documented policy to watch out for new threats - viral or security.
Now, how many times have
Re:Probably.. (Score:2)
What is "socialist" about a worm (white knight or otherwise)? Tresspassing a computer system has nothing whatsoever to do with economic theory, be it capitalist, socialist, communist, corporatist, or what have you.
Or are you one of these ignorant idealogues that equates socialism with "something bad" irrespective of the con
Re:Probably.. (Score:2)
Plenty.
Socialism [reference.com]
So"cial*ism\, n. [Cf. F. socialisme.] A theory or system of social reform which contemplates a complete reconstruction of society, with a more just and equitable distribution of property and labor. In popular usage, the term is often employed to indicate any lawless, revolutionary social scheme. See Communism, Fourierism, Saint-Simonianism, forms of socialism.
[Socialism] was first applied in England to Owen's theory of
Re:I don't know about that... (Score:3, Interesting)
However, is it really a divide of the rich and the poor on internet? and what are the criteria for being the rich or the poor? it surely can't be software or AV updates, since there are a number of tools out there that are free..
Viruses to attack Viruses which patch Viruses (Score:5, Insightful)
The answer is to have a secure system, as that's not happening in the Windows world at the moment, then frequent patches to plug the holes and a way to encourage everyone who uses Windows on the net to download them is the way to go, as is installing more secure software (e.g. Firefox rather than Internet Explorer.)
Re:Viruses to attack Viruses which patch Viruses (Score:5, Interesting)
(and no, "White Knight" viruses are not the answer)
If ISPs start taking a hard line against exploits instead of ignoring them then people might pay more attention - it's not rocket science for the ISP to detect the signatures of worms scanning the network and automatically pull the plug on anyone compromised. I favor a "internet rating" system in the same way you get a "credit rating" - if you're shown to repeatedly get compromised then it's clear you can't run a secure system and no ISP should allow you full unrestricted internet access.
I'd also like network-connected software you pay for (e.g. Windows) come with free updates _on CD_ for a reasonable life of the product instead of requireing you to download it. If my car has a fault (e.g. the brakes don't work under some conditions) then the manufacturer writes to me and fixes it at their own expense - they don't quietly put a notice up somewhere out of the way saying that if I want to I can send off for the replacement part and then wait for the media to actually publicise it after a few people crash coz their brakes didn't work.
Before anyone complains, the whole on-CD updates idea wouldn't apply to free linux downloads like Fedora since you're not paying for it in the first place, but quite rightly it should apply to stuff you do pay for like RedHat Enterprise, etc.
Re:Viruses to attack Viruses which patch Viruses (Score:2)
Dial-up users should patch, but they can wait, becaue the amount of damage they can cause is extremely limiting.
It is those DSL, and Cable modem's from which the bulk of he probelms come from. Those people can and should download thoe 70-250 meg patches to update windows. The bulk of virus probelms wil
Re:Viruses to attack Viruses which patch Viruses (Score:2)
Wrong - admittedly I don't use Windows, but a few years ago my old RedHat 6 box got compromised over a pay-per-minute 33k6 dialup (ok, I admit it, I had been lazy and not kept it up to date). A few weeks ago one of my colleagues did a fresh XP install, forgot to enable the firewall and he was virussed wi
Re:Viruses to attack Viruses which patch Viruses (Score:2)
Nifty idea. Which billionaire
Re:Viruses to attack Viruses which patch Viruses (Score:2)
I don't understand why this is any more of a problem and any more corruptible than the current "credit rating" system (and a bad credit rating could screw your life a lot more than a bad "internet rating").
The ISPs can work together to form a single database, and in the long run this will save them mon
Re:Viruses to attack Viruses which patch Viruses (Score:2)
Not really - it isn't rocket science to redirect all web accesses to a page that contains the fixes and block all other IP traffic.
Distributing CDs for every security update is highly impractical.
I don't see that - WinXP Professional is about 220ukp in the shops (yes, I know that microsoft have their dodgy contracts with the OEMs, but that's their problem). The cost of pressing a CD is negligable, but
Like stealing your bike (Score:5, Insightful)
Would you like that?
Re:Like stealing your bike (Score:3, Informative)
Positive compunded interest (Score:2)
Given this assumption, a white knight worm would have a heavy impact intially but after the first day would drop off dramatically in an exponential ma
Are they a good thing? (Score:5, Insightful)
Even valid updates from manufacturers have the odd really bad messup. Making a service crash, modifying a config file so it doesn't work, causing unexpected behaviour.
To give support to those writing such whiteknight worms gives support to any anonymous coder who might wish to fix a problem, with no concept of testing things on a system other than their own or a few others belonging to a "friend of a friend".
re-evaluate your reasoning (Score:2)
It's a bit like the dentist giving you a filing because you teeth are fucked, and will get more and more fucked until the hole is patched.
It would be nice if you could see the source code so that you know nothing else is going to be affected, but then it would also be nice if the dentist told you that the filling contained heavy-metals
Re:re-evaluate your reasoning (Score:2)
If you can read and understand the source code, odds are you are closer to not needing it at all. Much like the heavy-metals in fillings. If you already know they are there, then you know they are an insignificant threat.
Re:re-evaluate your reasoning (Score:2)
If the security folks say that the worm is a 'whiteworm' then the chances are that it is.
Re:re-evaluate your reasoning (Score:2)
Bill, Joe, and Nancy are security experts, they have been working in the security field for 15 years and have disassembled and evaluated almost every worm and virus out there.
They are not known for making mistakes and have a good reputation in the field, there security advise is almost always taken by alert boards and often quoted in the press.
They all work for separate companies and there reputation stands on what they say.
They all agree that XYZ is a 'whiteworm' and only patches a hole i
Push vs Pull (Score:5, Insightful)
Anyway, I should have the right to take attackers and use their own exploit to inform them about their situation. A real world comparision would be me finding a trespasser and instead of just kicking them out, telling them they are doing wrong and then kicking them out.
Granted, this kind of vigilate action can be seen as, say, tracking down the trespasser and going on his property to yell at him. I guess this is where the analogy breaks down, but its a good concept and doesnt waste bandwidth like the "friendly trojan" shotgun approach.
This would only work with worms with machines with open firewalls, but it sure beats nothing.
Re:Are they a good thing? (Score:2, Insightful)
I DO think automatic, "valid" updates can be considered as viruses in the effect they may have. They can actually halt a production system. This is real life experience: I have seen network emulation updates, source code sontrol systems updates fucking up production. More than once. No kidding: even anti-viruses updates broke the prod for some dlls incompatible with XYZ. Isn't it a nightmare? The anti-virus stuff becomes a virus!
The point is, in production you are assumed to know what's on your box. Anyth
How about self-defense? (Score:2)
So if the trojan tries to attack your machine and you subvert it and shutdown the server, wouldn't that be self-defense or "citizen's arrest"?
fixing without permission (Score:2)
why do think alot of these don't outside a broadband connected home??? prob 'cos of change management within companies so they turn it off, but then they don't have a decent test/patch system to replace it...
of course that assumes the patch doesn't break your favourite application.
Again the problem isn't so much patching the holes (which is a problem with any piece of software) as the massive *monoculture* (sorry market dominance) of WIndows and it's security issues t
Re:fixing without permission (Score:2)
I think patching systems need a "rollback" ability so if a specific patch breaks something it should be easy to undo the fix (at least temporarilly until someone fixes the patch).
Re:fixing without permission (Score:2)
Not sure about ones from Redmond..XP's got save points I guess, which helps.
But given the amount of messing with your system a windows patch can do (registry mods etc) I guess it's non-trivial (like most things Windows admin), hence the many years before XP's save points arrived.
How would Anti-virus programs react ? (Score:2, Insightful)
Illegal (Score:2, Informative)
A white kight worm author would end up with the same civil damages to pay only gaining perhaps a small reduction of the criminal charges.
No, no, and no. (Score:2, Insightful)
It's not for someone who "knows better" to decide for me how to "Secure" my computer. What happens if one of these virus-like apps(either from MS or a third part) "patches" my server with my multi-million dollar application system and somehow breaks it, as unintentional as it may be?
If these hackers want to do g
What is a 'white worm' (Score:2)
Other than that, the usual rule applies: The difference between a criminal and a security expert is written permission!
That's just not acceptable (Score:2, Funny)
Wrong approach (Score:2, Insightful)
Being an IT professional, I get on average 1 request per week to remove viruses / spyware / browser hijacks etc from people's computers.
Recently I started turning them down, but offer to install Linux on their computer instead of trying to fix their Window installation.
If I were writing a worm, however, I'd take a different approach. I'd make it spread quietly, and then destroy the Windows install completely 1 day after infection. The whole fucking lot. People who get viruses a
Like linux doesn't get worms. (Score:2, Informative)
Re:Like linux doesn't get worms. (Score:2)
Re:Like linux doesn't get worms. (Score:2)
"In order to install your FREE BonzaiCometCursorBuddyWeatherUpdatesTool, please enter your 'root' password in the box below and click 'next'. (Your 'root' password is the one you use to install programs and perform system configuration tasks)"
That, or you'll simply see people running as root all the time, just as they run as admin under Windows. Since 2k at least it's been perfectly pos
No no no, viruses should... (Score:2)
Re: "People who get viruses are asking for it" (Score:5, Insightful)
"I really am sick of viruses. Being an IT professional, I get on average 1 request per week to remove viruses / spyware / browser hijacks etc from people's computers."
Welcome to the IT club. So far, you aren't sounding special.
"Recently I started turning them down, but offer to install Linux on their computer instead of trying to fix their Window installation."
I hope you like supporting that Linux install... And like fielding questions like: "I just bought a brand new digital camera. How do I get my pictures and video into the computer? Oh, and I bought a new printer, too. I want to print my new pictures with my new printer. Oh, oh, and my cellphone has this cool service where I can download ringtones... I want to do that, too. I need to do XYZ with some application I use for XYZ. How do I get it on my Linux PC?" Face it. Linux is still a second-class citizen in the desktop market. Having one or two category apps isn't the same thing as having 99% of the market.
"If I were writing a worm,
Then I would hope that you got caught and spent a few years in jail to think about it, and have it on your record for the rest of your life. Maybe you'll be branded as a terrorist! Talking about writing worms doesn't get you my respect. Even hypothetically. It has been done before. It has been discussed to death before. There were viruses that damaged your equipment. There were other viruses that repartitioned your hard drive. Plenty of worms can do these things.
"ALL computer users should take reasonable steps to keep their computers secure. ALL computer users who don't take these steps should have their hard disks wiped clean."
A) What are reasonable steps?
B) What is secure? If I get an email from "you" telling me to run the attached security update to my computer, and don't know any better, and I run it, and it is an emailing worm, then I am now hosed. Worms do this all the time. Do I blame you because I thought I could trust you, or do I blame the worm author who masqueraded as you through their program.
If some application I download to do X has a bug that's exploited and does Y, and I don't know it, is it my fault?
C) Your statements are quite harsh. Have you ever had your hard disks wiped clean with all of your hard work on them? Your statement is akin to saying, "People who get diseases should be shot. That'll teach 'em to get sick!"
I can't believe your post was modded insightful. Flaimbait, yes. Insightful, no.
Re: "People who get viruses are asking for it" (Score:3, Insightful)
I hope you like supporting that Linux install... And like fielding questions like: "I just bought a brand new digital camera.
Er, I may be slow, but I fail to see how the grandparent poster's users, in a professional environment, couly justify the need of fancy stuff like digital cameras or downloading ringtones, or installing printers themselves. If there's an IT professional where he works, it is most probably in an environment big enough so that users
Re:Wrong approach (Score:2)
> to remove viruses / spyware / browser hijacks etc from people's computers
Well you're not a very good IT professional then are you because I don't get any. Ever.
> Recently I started turning them down, but offer to install Linux
> on their computer instead of trying to fix their Window installation.
Most good IT professionals would have installed virus scanners and firewalls so their users couldn't get a virus! You've got to have a
Re:Wrong approach (Score:2)
Maybe people are asking others for help instead of you?
It seems inevitable that people will get viruses somehow. There are users who are so thick that they'd try to open an encrypted zip file, enter the password (an image) and _run_ the executable. Gack.
I bet if Linux was dominant the same idiots would be doing tar
Worse- think of the damage obfuscated polymorphic perl scripts could do. I wonder
Simple (Score:2)
Re:Simple (Score:2)
The only good virus is a dead virus... (Score:2)
That would be called a "Virus".
Bleh. To be honest though, I don't see a whole lot of difference between a "good" worm and "good" bacteria. Your hands, skin, blood, etc, already have millions of bacteria feeding off your system. They assist in choking out the "bad" organisms. Eh... poor analogy, but what do you want for 6am?
Noway i need some unauthorized 'patch' (Score:2)
I take care of that myself, thankyouverymuch...
We could axe most of these easily enough... (Score:2)
So obvious answer, rape, pillage and murder anywhere you see a windows box. You will see a d
Re:We could axe most of these easily enough... (Score:2)
Windows viruses are certainly the most common at the moment, but to say that 99.9...% of all viruses are on Windows is inaccurate.
The road to hell is paved with good intentions (Score:5, Insightful)
Blaster had very little impact on our network. Nachi on the other hand caused absolute bloody chaos.
There is absolutely nothing "white hat" about running code on someone elses machine without their permission.
Re:'Proper' white worms (Score:2)
In other words, the author puts the worm on his machine and waits to be attacked... his good worm detects an intrusion attempt by the bad worm, and spreads to the attacking machine - both disabling the bad worm and installing itself in place, waiting for another intrusion attempt.
In this way, you don't get madly multiplying traffic - you get a response to every attack.
As far as I'm concerned, anybody who's computer tries to subvert mine is fa
To minimize the traffic (Score:2, Interesting)
The white worm should also uninstall itself after a predetermined length of time, say 10 days.
I understand the concern people have about auto-patching, however I am certain that none of those people would put themselves into a situation where t
they stuff up networks (Score:5, Informative)
These bloody worms caused us so much bother, our customer terminating (ethernet) routers (Cisco 7206 NPE300 VXR's) really suffered CPU wise against these because the ethernet based services are procssed switch unlike ATM/POS etc unfortunately. And the netflow accounting tables were just out of control.
AND the old legacy routers we have that still ran snmp based ip accounting, the cpu on them went ballistic. It was a big pain in the butt and took a lot of stuffing around to fix/block etc.
Unfortunately just blocking the traffic doesn't help as you have to recieve the traffic in order to block it, so I was dumping netflow tables and getting the support guys to call infected customers. Many hours of work just because some little shit script kiddie/newbie programmer thought it'd be funny.
On the bright side though, it promped management to give me a lot of money to get some more grunty gear so we are now better prepared for the next time it happens, and I'm sure it will.
It would be far simpler... (Score:2)
The only way this could be made any simpler is if you had a happy face for a system with all updates installed, an unhappy face when there were new updates available, and an angry face when no updates had been made
it FUCKING DOES (Score:2)
Teller worm (Score:2)
No thank you (Score:2)
In the physical world, you may be a common carrier but you are not exempt from all control over the things you carry. The US post office is not _allowed_ to carry letters full of anthrax without regard to t
NO! (Score:2)
Re:NO! (Score:2)
Jesus Christ! (Score:2, Informative)
Don't get me wrong. I like the drama of a vulnerable platform as much as anyone. But I prefer to enjoy it from afar. That's why
I stick with Mac and Unix.
On the other hand, there is the cynical satisfaction of watching stupid people bu
Linux isn't secure enough (Score:2)
Remember- there were tons of worms which required victims to type in passwords to open encrypted zip files and then run the executables. AND tons of DUMMIES did, I even recall a columnist saying he was tempted to do it even though he knew he shouldn't.
They were exploiting vulnerabilities and security issues in HUMANS not Windows.
The same HUMANS would run an obfuscated polymorphic perl script from a stranger that did indeterminable th
Subscription system (Score:4, Insightful)
What about a subscription-type system for such a service? I can imagine a variant of the virus definitions auto-update that does this. It wouldn't be kicked off by the user's computer, as it could be disabled by the Blaster-style worm, but would rather be initiated by a remote server. Next time a 'bad worm' spreads across the Internet, the service releases the 'good worm' to patch its customers' systems. My mom would probably appreciate something like that.
Its NOT for Slash readers (Score:2, Interesting)
NO... this is for those Joe Sixpacks, grandmas and - worse of all - the selfish dumbasses who dont know OR CARE if their machine on their spanking new broadband connection is fouling the net for the rest of us.
If ISPs dont employ some kind of active blocking, then the combination of the worlds most used OS (STILL having gaping holes) + users who'll open any attachmen
Paper by Vesselin Bontchev (Score:3, Informative)
http://www.virusbtn.com/old/OtherPapers/GoodVir/ [virusbtn.com]
Well worth a read if you've not seen it before
this strikes me as a no brainer (Score:2)
My computer is my property. You have no right to modify or tamper with my property in any way, even if you think it's for a good cause. Just like you have no right to bust in the windows on my house and install properly working smoke detectors.
Not only that, I've seen a few posters point out the obvious bandwidth suckage issues associated with "good" worms.
But (Score:2)
Re: (Score:2)
Stop beating a dead horse. (Score:2)
Long ago, long before the World Wide Web existed, people were debating the pros and cons of a "good virus". Is there such a thing a s a good virsus? Is it a good idea to even try to write a good virus?
Ultimately the answer is no. People don't want programs running on their computers, multiplying and speading thru a network without their knowledge or consent, even if it supposedly doing something "good".
TMBG said it best (Score:3, Funny)
I'm not a real doctor but I am a real worm
I agree with Schneier (Score:5, Insightful)
Automatically installing code on a user's system without their consent is never a good idea. Virally propegated code, no matter the intent, still generates network traffic, just because the payload is different doesn't mean the virus/worm/whathaveyou isn't adding to the problem of conjested networks. And as someone else pointed out, even if the 'white hat' programmer has good intentions, that doesn't mean they won't make mistakes in their code which could have adverse effects on the systems they are attempting to patch.
While I don't think users should have to directly interface with security protocols/techniques, I do think they should be aware of them. If they are made fully aware of the damages that can be done to them, they're more likely to patch, or back away from the internet in fear, either way, there is a reduction in exploitable hosts.
a virus is a virus is a virus.. (Score:2, Interesting)
As a usually security minded person, I do what I can to keep my system up to date and to keep any non-requested traffic off my network. So.. most of these "white knight" viruses wont even get to my computer. Im sure most
As for the general public, These could be used for good.. but there is much more potential for evil, as is usual with situations
"white knight" viruses can be useful... (Score:2)
The biology analogy (Score:3, Insightful)
So the same should be applied to the software immune system, after all nature knows its shit better than we do.
user edumacation (Score:3, Informative)
So when we got hit by Nachi, I tracked down the weak link. It was our Netware admin, who deliberately went around my firewall so he could peruse porn, logged into his dialup ISP, checked his personal POP mail at said dialup ISP, and within minutes, bam. Nachi in the house. Of course, this wouldn't have been a problem if he (and the 2 dozen other users that got hit because of him) had kept their systems up to date.
I was found to be the blame of this, despite the fact that there was absolutely nothing I could do about it, since he bypassed my security. After a week of TRYING to explain to management why it happened, that nobody should bypass security and so on, I took a long hard look at the incident.
While Nachi was good in concept, it had fatal programming errors in it that caused it to be more harmful than Blaster. We all know this. I chalk it up to a learning experience - whoever wrote Nachi definitely learned from this. Too bad there weren't any real variants of Nachi. Yes, I'm serious. However, people actually learned from Nachi. Three weeks after Nachi infections slammed into my firewall, it stopped. Nachi just went away.
Yet I still get pounded by Codered and Nimda YEARS after information, patches, and global press about it were made highly available and easily accessible.
Everybody bitches about spam and viruses and worms and popups, yet so few people actually do anything about it. Don't complain to me about pop-ups. Use a different browser. Refuse to "learn" a new browser, fine. Get Google toolbar. Don't know how check for viruses? Get AVG. Sick of spam? Fine, I'll adjust your SpamAssassin threshold.
But people don't want to do these things. In their minds, everything should just work, and work the way they want it to work. Everybody at my company knows that we have AVG, AdAware, Spybot S&D and so on. When new software is made available, I pass it on to my users. A user came up to me last week and asked why AdAware never has any updates anymore, for like the last year. Because she disregarded my notice about the new AdAware and kept using the old.
I have strict rules about email, and my SpamAssassin 50_scores.cf file is very, very harsh. My users have been told that some of their email contacts may be tagged as spam, and if that happens, let me know and I'll whitelist them. Not one person has asked me to whitelist anyone, yet everyone bitches behind my back that I'm a lousy admin because *I* somehow personally tagged their email as spam. Even the president asked me to remove all graphic/audio/video attachments, so I complied. Yet he complains that he can no longer get pictures and other non-work-related material through email.
It's an endless cycle. No appreciation for jobs well done. This is why I actually welcome such attempts to clean up the filth on the 'net. I originally despised Nachi. I now praise it.
As long as the end user refuses to heed educational advice about how dangerous the Internet is, the Internet needs vigilanteism.
Bring it on.
Just shutdown infected PCs (Score:2)
If it keeps happening maybe the admins/users might just figure out that something is wrong eh?
There are people who are still running codered and nimda on their machines and are totally clueless. At least this will reduce the amount of wasted bandwidth.
"Well written" my arse (Score:2)
This is how we got hit my MyDoom - a ZIP file turns up with a message to entice the users to open it - this is just social engineering
Its already done for us. (Score:2)
With the estimated number of zombies out there, I think the bandwidth loss would be a small price to pay to secure the net even one iota.
Can we say DRM? (Score:2)
Isn't this exactly what Microsoft (and others) are proposing with integrated DRM? They already offer automated download and installation of patches without user intervention; it is a logical next step to integrate this with DRM.
DRM seems like a big ugly hairball waiting to be compromised.
EULA (Score:2)
If it doesn't have an EULA then the legal industry will have a field day hanging the author from a tree and subjecting him to all sorts of cruel and unusual punishment which doesn't fit the crime.
The key is the EULA.
Make them white knight worms command line utils (Score:2)
Isp's should require the ability to patch systems or disconnect them from the net in the event of a virus/trojan/compromised system.
-- Tim
Please! (Score:2)
Well, Slate *is* still owned by Microsoft. (Score:3, Insightful)
Sometimes I think the whole antivirus industry mostly serves as a diversionary tactic that lets companies keep shipping software with deep, fundamental security problems.
A REALLY black-hat one would be healthier (Score:2, Interesting)
The Big One, anyone taking?
no sig
Re:Hell (Score:2)
Case 2: What would be the point? If the "White Knight" wanted to open a backdoor, it could just spread like the virus it's patching against and not even ask for user input. I suppose the writer might get some perverse gratification out of the social aspect of getting users to click on "Ok" but let's face it--these worms are spreading because of a hole in the target system. There's little use in installing a backdoor along with the patch when you could just install the backdoor.
Re:Why doesn't Windows Update fix all these proble (Score:2)
But if/when they are, the screams about illegal bundling and monopolies will ring throughout the land.