The Insecurity of Security Software 264
H316 writes "BusinessWeek is reporting that, despite a number of software products meant to safeguard Windows PCs from harm, a rising number of them endanger their hosts because of poor design and flaws. From the article: 'A new Yankee Group report, to be released June 20, shows the number of vulnerabilities found in security products increasing sharply for the third straight year -- and for the first time surpassing those found in all Microsoft products.'"
Insecure (Score:5, Funny)
Re:Insecure (Score:4, Insightful)
Sounds like a Soviet Russia joke waiting to happen.
Imagine telling someone you don't run Norton/McAffee/etc... because it's not secure. Now you have to switch to Linux/OS X for both a more secure operating system, and more secure applications.
AVG Free - infinitely better than norton, et al (Score:4, Informative)
www.grisoft.com
It will find a LOT of viruses/trojans etc that the 'big' software won't and is completely free for personal use (including updates, no subscriptions etc).
AVG is one of the 3 main applications (along with zonealarm & firefox) that get put down on any machine that i'm called in 'to fix' - which happens on a weekly basis...average people think that because their computer came with norton or macafee that they should use it, but these programs do nothing but give a false sense of security, take up significant processor & memory resources and are basically useless in actually finding or preventing viruses etc from getting onto their machines.
Re:AVG Free - infinitely better than norton, et al (Score:3, Insightful)
I feel vindicated (Score:3, Interesting)
They're slow for a start. At work we've tried copying the same large directory full of many small source files to a file server, once with Norton Antivirus running on the workstation and once without. Without it takes tens of seconds. With it, it takes slightly over 40 minutes.
And
Re:Insecure (Score:3, Funny)
It's not good enough, it's not smart enough, and gosh darn it, people hate it.
KFG
Re:Insecure (Score:2)
Re:Insecure (Score:5, Funny)
Let's put it this way:
Windows is the Paris Hilton of operating systems.
It looks good, but it's wide open all the time.
Re:Insecure (Score:2)
Re:Insecure (Score:2)
Re:Insecure (Score:2)
Windows, I'm not so sure about. It definitely isn't skinny, it definitely is stupid, but I suppose it looks good to some people.
Re:Insecure (Score:2, Funny)
Do they take air miles?
Re:Insecure (Score:2)
"So there really is a Paris Hilton!"
"Can I get into the Paris Hilton?"
"I'm a celebrity, I might have to enter by the back door."
To which she replied, "I don't care who you are, it's not happening."
it wasn't supposed to be like this! (Score:5, Interesting)
Yeah, don't know if this has changed, but on one of my machines my "virus" protection software absolutely needed Internet Explorer, and would override my default browser setting to use IE for any of it's "transactions"... Considering the history and track record of IE and my long ago decision to eschew any use of IE this was upsetting to say the least. I cancelled my subscription, sent a letter, and re-upped with a different vendor. To this day, I've never gone back to check to see if this vendor has "fixed" their approach, though I never got any response to my letter. (I choose not to name names, it isn't necessarily about "them"... I find this to be a somewhat absurd universe that an entire industry has grown up around an OS stillborn in the context of capable security (not perfect, just capable!) Heavy sigh...
Not to worry, though, maybe an industry will spring up around the security software industry... providing us with meta-security software...! (even heavier sigh.)
Aside: (but related), I wonder, has anyone ever investigated, researched, done any benchmarks about how many/what percentage of CPU cylces are allocated just for virus checking (and other security checks)?
Re:it wasn't supposed to be like this! (Score:3, Funny)
What happens if your antivirus software is attacked? If it goes down you are vulnerable. Here is a $20 program to protect it.
Goodbye I'm off to get rich.
Re:it wasn't supposed to be like this! (Score:3, Insightful)
In a sense (pun intended) it's already happening. Not only is the virus called "anti" sold, it often even comes pre-installed.
Have you ever heard of a patched roof being sounder than the original?
Re:it wasn't supposed to be like this! (Score:2)
Have you ever heard of a patched roof being sounder than the original?
Apache?It was supposed to be like this - yikes! (Score:2)
Both Netscape and MS gave away their browsers dreaming of the marketing potential of networked computers. There really are people who dream of a brave new world run by marketers.
What is even more amusing is that many of the antispyware programs are developed by spyware firms. Some are simply trojans for spyware, while others have the admirable goal of protecting the spyware's programs from other spyware programs. "We will ke
Re:it wasn't supposed to be like this! (Score:5, Insightful)
Norton Antivirus, despite regular updates by LiveUpdate, does not give full scans in that it does not find certain very frikkin' major trojans on any Windows system. The Shinwow virus that still resides on my XP system is a case in point, as is the Java byte exploit which allowed another user on the system to accidentally have it put there by some scurrilous website,
On Mac Norton Antivirus lost a lot of respect, and a lot of Mac users will just tell you that AV is for suckers anyway, but Norton pissed off people when their existing disk utilities (Speed Disk, Disk Doctor I think) which handled drive optimization was not Panther compatible. Certain people (those running the 10.2 Norton on Panther 10.3) lost complete functionality on their hard drives ("churning" is how I saw it described) requiring formatting with (AFAIK) no chance of file recovery. Same goes with using Norton 9 on Tiger - don't.
When using Norton Antivirus year on year the 'upgrades' mean that your boot time, and logon times increase. See my first point that this does not mean that you are more protected as at least one older known trojan is still undetected by a full system scan.
If you enable Program Launch Monitoring then Norton will tell you about absolutely every little thing that accesses the internet. This is a good thing, but from what I can see, they've taken out the damn option to "Don't show me this bullshit again, of course Firefox is going online!" and it keeps happening.
Just earlier today, I let Norton integrate itself into my Dad's mail client, Outlook Express, then I got 5 warnings that NORTON was being called by another program, and accessing the internet. This isn't even the veil of a false sense of protection. I increasingly think this junk is being coded by morons. Compared to each other, EZ Armour, eTrust Antivirus whatever it's called runs a scan faster, finds more, and I trust it more. It's not any worse to boot speeds. And while 'the devil you know is better than the devil you don't' I'm looking to return to some sort of honeymoon period so that you don't feel cheated and abused for spending on a program which you need due to stupid security holes and ignorant malicious script kiddies.
My antivirus experience is getting so bad, and so resource intensive, that I have taken to schooling every member of my family who use the computer and who will listen, and I am showing them how everything can be done as promptly on SuSE 9.1 Pro in KDE with Firefox and KMail. This switch is nothing to do with Windows frustrations which are relatively minor, this is just to do with lugubrious boot times and all those lost proc cycles.
Re:it wasn't supposed to be like this! (Score:2)
Switch to either Grisoft AVG or Avast.
Both are free for home use, and are lightweight on resources. Neither are supposedly as good at catching everything as Norton or McAfee according to the tests, but they're quite good enough for home use where they aren't dealing with thousands of emails at a time.
I've used one or the other for over two years with no problems on my 2GHz AMD system. I switched from AVG to Avast when AVG suddenly started turning off its email scanner for no known reason after two years,
Re:it wasn't supposed to be like this! (Score:2)
My boss's laptop developed some sort of flaky problem. (It's been a couple of years and I don't rememeber details.) After several days of poking around in newsgroups and Google, I finally found the problem described in Symantec's knowledge base.
It arose when a particular flawed update to Norton AV was downloaded and install
Re:it wasn't supposed to be like this! (Score:3, Interesting)
Re:it wasn't supposed to be like this! (Score:3, Interesting)
Aside on an aside (Score:3, Interesting)
On a related note - aren't some of those cpu-cycle-eating virus scan options rather redundant? (Serious question) if you've enabled on-the-fly virus scanning of reads/writes from/to the disk, aren't the other options - incoming email scans, for instance - unnecessary? I guess I'm wondering which "adde
Re:Aside on an aside (Score:2)
Nope - best way is not to use Outlook. AND keep the scanning on.
Of course, in a corporate environment, you may not have such a choice.
Re:it wasn't supposed to be like this! (Score:3, Informative)
Realtime virus scans are triggered whenever an application is launched. It literally runs the application in an virtualized sandbox for a designated number of cycles while scanning the memory for heuristic patterns of virus behavior. After the designated time the checker gives up and no longer analyzes the running applicati
Re:it wasn't supposed to be like this! (Score:2)
Re:it wasn't supposed to be like this! (Score:2)
Re:it wasn't supposed to be like this! (Score:2)
Somehow the figured it would be a good idea to code their entire interface in DHTML. Occasionally you'll see Jscript errors crop up with a dialog, and something will puke in the interface.
Mcafee may be bad, but that's beyond stupid....
McAfee and Symantec are out there to make money. (Score:3, Insightful)
Re:McAfee and Symantec are out there to make money (Score:2)
Re:Sense of security = profit (Score:2)
Re:McAfee and Symantec are out there to make money (Score:2)
Total rip-off considering Windows is just as insecure as ever and IE is the default web browser when you open the box.
I've always said, when a new version of Windows is coming out to buy Symantec stock as everyone has to rush out and buy all new versions of anti-virus. (Not that there isn't free alternatives, but it
Re:McAfee and Symantec are out there to make money (Score:2)
This also perfectly applies to Microsoft's attitude toward security. If it isn't making Bill money, he just doesn't give a shit.
The other problem is programmer quality: if you don't have corporate standards - and quality control people who know enough about code security to enforce them - you get security problems. Most quality control people are just testing the program to see if it WORKS. They need to have people testing it to see if it can be BROKEN - or broken INTO.
Re:McAfee and Symantec are out there to make money (Score:5, Insightful)
Re:McAfee and Symantec are out there to make money (Score:2)
The case that cures are just as lucrative for pharmaceuticals as treatments is even clearer for for diseases that mainly plague developing nations, such as malaria and TB, since (a) there's not much money in treatmen
Re:McAfee and Symantec are out there to make money (Score:2)
Even the most optomistic AIDS researchers only hope that it can eventually bec
Re:McAfee and Symantec are out there to make money (Score:2)
Re:McAfee and Symantec are out there to make money (Score:2)
Do a Google search for "IP6." It's a substance found in a number of food crops. Check this guy's [knowledgeofhealth.com] website for the article. Sardi is one of that rare breed called "the anti-AMA doctor."
The AMA and
Re:McAfee and Symantec are out there to make money (Score:2)
Here is an old Arab proverb that goes something like this:
"Five percent of the people think. Ten percent of the people think they think. And eighty-five percent of the people would rather die than think."
I chuckled the first time I heard that
From the dumbasses. (Score:2)
Meta-patches (Score:4, Insightful)
On the plus side, the patch cycle is probably a lot shorter with the security products and automated patching is less of an issue than with the OS itself, which is much more complicated and requires a ton more testing.
Chocolate Sprinkles (Score:4, Interesting)
"If you put chocolate sprinkles on shit, all you have is shit with sprinkles on top."
The point being, the software that runs on top of any OS can only be as secure as the OS itself.
Re:Chocolate Sprinkles (Score:2)
Verisign (Score:5, Insightful)
If hackers (crackers?) are getting smarter, and the security industry isn't catching up with them, then I'd say it's definitely the industry's fault.
windows (Score:5, Informative)
posted originally at groklaw:
All of the marketing hype in the world cannot make Micro$oft a better system
http://finance.messages.yahoo.com/bbs?action=m&bo
&sid=1600684464&mid=274625
A Tucson Arizona credit card processor has been implicated in a security breach
which resulted in fraudlent charges and the exposure of 40 MM accounts.
CardSystems Solutions has helpfully posted a Computer Operator job listing. This
makes it clear that the system breached was running M$ OS.
www.cardsystems.com/careers/ComputerOperator
A seperate database developer job posting has a VBScript experience requirement,
leading to the presumption that VBScripts were at the heart of the card
processors data management.
A quality assurance job posting required experience in Windows NT and Windows
2000. Using these obsolete systems was part of the innovative "security
through obscurity" policy of the part of the card processors.
http://toolbar.netcraft.com/netblock?q=UU-63-83-9
3330975
www.cardsystems.com
CardSystems Solutions, Inc., 6390 East Broadway, Tucson, 85710, United
States April 1997
Microsoft-IIS/5.0 Windows 2000
Mastercard is running Apache on Solaris
http://toolbar.netcraft.com/site_report?url=http:
Mastercard International
2200 MasterCard Blvd OFallon MO US 63366
Solaris 8 Apache/1.3.27 Unix mod_ssl/2.8.12 OpenSSL/0.9.7
mod_perl/1.27 29-Jul-2003
Was Mastercard to blame running a decent OS
Or was CardSystems to blame for running Micro$oft crapware.
Re:windows (Score:5, Informative)
As to MasterCard running Apache on Solaris, what makes you think their web server has much at all to do with back-end credit card processing?
Re:windows (Score:2)
Nothing, but if they care about web server security, then chances are that they also care about the security of their credit card transaction systems.
Re:windows (Score:2, Informative)
Looking through Cardsystems job section, the clearly [cardsystems.com] advertise [cardsystems.com] for non-MS expertise; UNIX scripting, Oracle and a bunch of other stuff besides. From the job descriptions of other jobs, it's clear that they run systems on NT and VMS servers, which - sorry to disappoint you here - is pretty standard for credit card processing. It's not security through obscurity at all, it's security through not having the lastest Swiss cheese OS.
It's also important to point out that the
Re:windows (Score:2)
Netcraft reports that the Server string last changed almost 2 years ago!
And this report is funded by whom? (Score:4, Interesting)
So who funded this report?
Doesn't make any difference in this case. (Score:2)
If you're using Windows or any product developped for and/or with Windows, you're vulnerable.
Basically, the problem is with the approach to software develpment. It wouldn't matter whether you were using a Microsof product or a product developped with the development tools.
The end result is you're vulnerable.
Re:And this report is funded by whom? (Score:2)
Re:And this report is funded by whom? (Score:2)
"Security software" is an oxymoron (Score:4, Funny)
Linux is somewhat ahead in this in that protected memory is part of its "DNA", unlike Windows which ultimately comes from the culture of DOS, which has no protected memory and is not multi-user.
But still, Linux is only just a little bit better. We need to move to real secure designs such as:
Re:"Security software" is an oxymoron (Score:3, Funny)
Re:"Security software" is an oxymoron (Score:2)
Yes, Windows 2000 and XP CAN be brought dead to the metal in certain circumstances NOT involving hardware failure. I've seen it.
Besides, the OP's point was that Windows was ORIGINALLY not multiuser or secure and the DESIGN flaws from that are STILL present in the current versions, regardless of their current multiuser and memory protection capabilities. IE (a fucking WEB BROWSER) and its integration into the OS is just one example.
Re:"Security software" is an oxymoron (Score:3, Informative)
A condition not caused by bad hardware or bad third party drivers or an admin user trying to kill it on purpose? How? You left out all the details.
The only thing that IE is integrated into is the shell environment. It has no integration with the security system or the kernel or anything else. IE is i
For secure applications, don't use a PC. (Score:5, Interesting)
Indeed, VMS offers the best combination of security through security and security through obscurity. The system itself is inherently rock-solid, stable and secure. Combined with the fact that most script kiddie crackers, and even some of the more seasoned pros, lack basic VMS knowledge, you're looking at very reliable systems from a security standpoint. The chance of becoming the victim of crackery is very minor.
Re:For secure applications, don't use a PC. (Score:4, Insightful)
Security by obscurity, security nontheless. But, as some wise man once said something like this: you can increase a system's security right down to unusability. Security only makes sense when you gain from using it. Personally i do not see the point using vms as a webserver, when you could run it for example on openbsd, which would probably decrease security a bit, but improve your productivity a lot. I'm sorry, the DCL-hating person speaks from me.
OpenBSD would not improve our productivity. (Score:2)
Re:OpenBSD would not improve our productivity. (Score:2)
If you're still running legacy COBOL apps on a legacy OS, you have worse problems with productivity than security, I'd say.
You're working for a company which will shortly be out of business (unless of course your company dominates your industry - other factors than IT do apply in the real world) - I suggest posting your resume now.
LOL! (Score:2)
A switch to a non-VMS, non-COBOL solution would markedly decrease
Re:LOL! (Score:2)
What is it costing you to develop Web solutions in a language and platform never intended for Web solutions? That's GOT to be costing you more than some script kiddie managing to break a newer platform and defacing your Web site.
I can believe the Windows 2003 Server platforms are inadequate, but a properly hardened Linux platform - running on an IBM mini-mainframe or large SUN systems if necessary - should be quite scalable enough for your needs and would allow you to develop more
Re:OpenBSD would not improve our productivity. (Score:2)
It'd be like using DOS in place of OpenBSD for a secure web server. Sure, it's an PC operating system and can potentially perform the task at hand. But it's just not good enough for the "Big Leagues".
Re:For secure applications, don't use a PC. (Score:2)
Maybe there's something wrong with your admin? (Score:2)
>> Server were cracked on a weekly basis
Microsoft runs a shitload of web presence on W2K3, and the only case when they had a breach was when admins simply ignored applying patches. Maybe your admin is incompetent? Mind you, I run Linux on my servers myself, but having apps broken into on "a weekly basis" indicates that someone is not doing their job. VMS ain't gonna change that.
This may surprise you (Score:2)
Re:This may surprise you (Score:2)
In my Windows 2003 server class, the teacher (who is a consultant as his primary job) complained how many of the Windows command line tools - things like migrating user accounts in Active Directory and the like - tend to screw up, so he avoids them like the plague.
While Windows seems to have a lot of command line tools, it pales against the UNIX shells and utilities that are much easier to use with each other
Re:For secure applications, don't use a PC. (Score:2)
Re:For secure applications, don't use a PC. (Score:2)
Have you looked at the documentation [hp.com] for OpenVMS? Is is most definitely not security through obscurity in the sense that you appear to mean.
This [cert.org] is the last really major security problem OpenVMS had. Unlike Microsoft there weren't a million and one variants of this, or occurrences of the same problem in different places.
Now, if OpenVMS seems obscure to you, I'm sure t [vistech.net]
Just moves the goalposts of 'Trust' (Score:4, Insightful)
As time goes by I am becoming fascinated by the whole 'security software industry'. It doesn't take a leap of tin foil hat conspiracy theory to get to wonder whether large companies with a vested interest in there being malware in the environment, and who admittedly employ virus writers, might not be playing with an entirely straight bat when it comes to ethics. I wonder if someday soon we will see 'proof' of this in some form when it becomes apparent that a 'security' company had apriori knowledge (ie they wrote it) of a nasty virus which then went on to cause a lot of damage out there. Holes in their software comes as no suprise. In fact when you use a security product you are handing over huge amounts of trust to the writers. Do I trust Symantec et al. No way, for one I haven't seen their source.
Re:Just moves the goalposts of 'Trust' (Score:5, Insightful)
If you look at the computer viri there were in the last 20 or 25 years, there's of course many trends, but one in particular stands out: there has been a huge shift from destructive to non-destructive viri. Remember things like Michelangelo, Stoned and so on? Many of these were actually doing damage - they'd delete your harddisk on certain dates, or overwrite files on access, or other such things.
However, things have changed: these days, at least 99% of all viri, worms, trojans and other malware seem to be content to simply reproduce as much as possible instead of carrying an actually destructive payload. Some might be used to send spam, perform (distributed) DoS attacks and the like and thus cause economic damage, true; but the individual users' boxes are typically unaffected (except for slowdowns and similar things).
Why did this happen? One might argue that the reason is simply that virus writers don't want to bite off the hand that distributes them anymore, or that dead zombies are useless for launching attacks against third parties. But it could also conceivably be an indication that it's different people who write viri these days, with different motivations, different limits, and different morals. And the idea that (some) anti-virus companies are secretly helping out with the creation of new malware doesn't seem so far-fetched anymore when you take into account that with a non-destructive worm, it's much easier to convince yourself that you're not doing *real* damage - especially if there's also the prospect of making money, which probably already has weakened your morals.
Walk through Best Buy (Score:3, Insightful)
On the other side, you have companies like Symantec and McAfee whose best written and supported products have been known to totally hose business PCs at the drop of a hat. Secure? I don't trust them to run correctly, never mind actually do what they were installed for.
None of this is very new, most of it seems obvious, and it is truly sad that it so many will read this and think it a groundbreaking notice instead of an afterthought by the IT world which it is. The horses are out of the barn, and now people are realizing that they got out because the tried using screen doors to hold them in, and they will predictably go look for spline and a tool to put more screening in.
More products... (Score:2, Funny)
This is surprising? (Score:4, Interesting)
Basic problem with them is that they're just more complex code above already complex code, that tries to fix the problems that is mainly caused by that complexity in the first place.
Result is much slower computer that the anti-virus software inadvertly affects like a viruses would.
Stopping programms, and causing something not work correctly.
All virus programs are basically parasites, anti-virus programs are just bigger parasites far as I'm concerned.
They have their place, but they should be simple, free and not be the answer for security. When they are not, they're themselves a risk.
Re:This is surprising? (Score:2)
And the spyware scam is no more than organized c
I find it supremely ironic (Score:3, Insightful)
Now Zone Alarm, Black Ice Defender, Symantec, and more have found serious flaws in their security products that actually make them VECTORS for infection by executing the viruses they are designed to detect and safely remove or block. It doesn't make me feel bad at all for using a naked computer all those years, as I may have had fewer unpatched/unknown vectors for infection than if I was running something like Zone Alarm all the time [although to be fair to them, the Windows hole count is far from over].
Re:I find it supremely ironic (Score:2)
Although I see your point, I have to ask: without any antivirus program installed, how did you know if you weren't infected?
Re:I find it supremely ironic (Score:2)
Re:I find it supremely ironic (Score:2)
There are a lot of people claiming to run uninfected naked machines for years.
Invariably what it means it they don't run ANY Microsoft products that access the Net - no IE, no Outlook, no Outlook Express, no nothing. AND they patch everything anyway.
They also never indicate their volume of email, volume of Web site access, nature of Web site access (do you access sports sites, porn sites?), etc.
To suggest that anybody else who RUNS Microsoft software on the Net can do the same just by not installing secu
Re:I find it supremely ironic (Score:2)
This is the result of a monoculture (Score:2)
Now bugger off and sort yourself out. In the meantime I'll be undercutting your prices.
Simple, use the windows firewall and MS antivirus (Score:5, Interesting)
Re:Simple, use the windows firewall and MS antivir (Score:3, Informative)
Ahem - they BOUGHT their software from a third party.
And yes, they WILL be charging for their full security package. Maybe not the antispyware one alone, though.
Read this from back in January of this year (if the plans have changed, I didn't hear of it):
Microsoft Readies 'A1' Security Subscription Service
By Mary Jo Foley
January 4, 2005
Publicly, Microsoft continues to be cagey about packaging and pricing plans for its anti-spyware and anti-virus solutions. But privately, Microsoft has begun informing par
No profit motive (Score:2, Insightful)
When MS bundles AV software with the OS, it is too easy for Joe Sixpack to adopt that as his AV solution. Then it's MS de facto standards for Windows, Office, and computer security. Even harder to get people to switch.
When MS offers another "secure computing" initiative that 'natively' integrates with MS AV, adoption is immediate an
Re:No profit motive (Score:2)
I agree that Microsoft probably doesn't see this as a huge money-maker like Office or the OS itself.
But to suggest they're "spending a lot of money building their own" is disingenuous. They BOUGHT these products and are re-engineering them to fit into their product line. Then they intend to CHARGE for them - presumably at a price-point where they at least break-even.
The bottom line: they're charging for products to fix their own mistakes.
OTHER security companies are charging for providing a service that
Doesn't surprise me... (Score:2, Informative)
Re:Doesn't surprise me... (Score:2)
If you don't get hundreds of virus-laden emails a day, switch to the free-for-home-use Grisoft AVG or Avast. They're light on resources, do automatic updates, and while they're not as good as McAfee or Norton at detecting 100% of viruses, they're adequate for home use. I've used one or the other for over two years with no problems. Of course, I don't run IE or Outlook or Outlook Express either which helps.
This is very true (Score:2, Interesting)
Of course since this was found out. Microsoft has been holding security software conferences a
Update on My Client's Trojan Problems (Score:5, Interesting)
I loaded a thirty-day trial version of TDS-3 on her machine and found there were only a couple trojans left.
One of them was that goddamn crap that names a file "t?skmgr.exe" - so that you can't delete it from the XP Recovery Console because stupid Microsoft won't let the RC delete command run wildcards (for "security" reasons, right?), and you can't SEE it in Explorer because it looks just like taskmgr.exe, so you can only tell which one it is by looking at where they appear in the file listing. Then they make it a hidden, system and read-only file and of course it's in use by a process, so Windows won't let you touch it.
Bart's PE and Knoppix couldn't help me with this one.
Acting on a tip from the Net, I loaded Winfile, the old Windows NT file manager, and managed to rename it, move it to another directory, so it couldn't be run, and after rebooting into safe mode, I could delete it.
The other trojan was the one that originally was driving me nuts. I forget how I finally got rid of that one.
There was still at least one spyware somewhere, so I loaded HijackThis on and got rid of some more crap.
And finally I found a "Security Agent" from "CastleCops" which was actually a trojan. The service was running but the rest of it had already been cleaned, so I disabled the service.
Plus I went into the Registry and clobbered everything I could find that wasn't a known user, Microsoft or Dell installed program. I think I cleaned out a lot iof spyware keys that even all the other antispyware programs didn't find.
Then I checked the client's account status and found she was running as Administrator, so I switched her to limited. That caused TDS-3 to stop working under her account (apparently it needs not only Admin status to install, but to run, no surprise given what it does). I got confused by XP's stupid "tri-mod flag" technigue of labeling all file folders faux "read-only" into thinking somehow the disk was screwed, but I finally determined that was not the case. So she's back to running as Administrator until I can tell her to create a new account (because I don't know what's been installed by her as Administrator so I don't think it's safe to just change her back to limited - something other than TDS-3 might break) and move her desktop icons over to the new profile.
She seems to be clean now - no system error messages, no popups, and the system seems stable.
It only took me another eight hours - mostly because I don't have a Bart's PE and Knoppix that's REALLY loaded with anti-trojan, AV, spyware and other tools. That's my next project - buff up my bootable tools so I can access ANY file ANYWHERE and kill it.
I get my hands on the asshole wrote that "PurityScan" adware trojan, I'm gonna nail his knees to the floor with railroad spikes - so he stays put while I really do some damage to him.
Somebody needs to start scanning Web sites where this crap comes from, report the assholes to the law, and get the lot thrown in jail. NONE of this stuff came in through email because my client uses Web mail exclusively. That means it came from Web sites. So why not set up a Web scanner that visits suspicious Web sites, downloads this crap into a sandbox, logs everything as evidence, then publishes it as a blacklist - a "reverse honeypot"?
Re:Update on My Client's Trojan Problems (Score:2)
The only solution is to set up a RIS system on Linux and do a network install of WinXP via PXE - what a fucking nightmare. After 3 days, I am now at the point where the setup program starts and then halts due to a path problem... Aaaaaarggggghhhh!
I hate fucking windows.
Re:Update on My Client's Trojan Problems (Score:3, Interesting)
Consumers are still the problem (Score:2, Informative)
The whole anti-virus model is flawed (Score:2)
The sheer rage on the MDs face when he met the IT director was amazing. How co
Complex systems have more potential attack vectors (Score:3, Insightful)
Why is this such a mystery?
Non-Security (Score:3, Interesting)
But it is the security firms that promote this idea that if you run their software, your box is "bullet proof". The truth is that these companies are mercenary, and would say just about anything to get people to buy the latest version and than subscribe to updates. I'm not a tinfoil hat type, but there are some who have said such companies have no interest at all in reduction of threats, because it results in lower
Re:Told you so! (Score:2)
And of course, 99.9% of Windows users are quite happy to do this.
</sarcasm>
WTF is the point in an operating system if you have to understand every single damn byte?? If I wanted to do that, I'd go back in time 40 years and toggle my bootstrap in by hand.
Re:Told you so! (Score:2)
I need to be MUCH more familiar with every process and file and Registry key on Windows in order to spot trojans and spyware that the security software CAN'T find. And I need to be more familiar with hex editors and tricky ways of getting around the Windows OS to get RID of things.
For end users, however, this is completely hopeless and it's a waste of time to suggest it.
And it's a damn great argument for using Linux - even if you have to know mo
Re:How Anti-Virus Software is working (Score:2)
That's why a tech support person needs stuff like Knoppix and Bart's PE - so you can boot an OS from a CD which is not compromised and run a scan on the file system no matter what file system it is - and preferably with an OS like Linux that has NTFS support so you can bypass NTFS file permissions and kill anything.
Only problem now is getting Knoppix and Bart's to run really industrial-strength tools that can detect and kill stuff effectively.
All in all, though, the security tools aren't doing too bad IF