Results 1 to 5 of 5

Thread: Redundant Checking & malicious consequences

  1. #1
    dzzie
    Guest

    Redundant Checking & malicious consequences

    hiya,

    thought i draw on the experience of others here for somthing...namely

    how common is it to have a programmer code in a redundant check which when fails results in either a malicious function (like drive filling of deleting) or some attempt at author notification (like fireing up your browser to a special cgi script with whatever personal info he could scavange from you) ?

    or am i just paranoid to unplug from the lan when goofing around?

    would be intrested in hearing of any progs know to do this and how common a practice it is.
    I promise that I have read the FAQ and tried to use the Search to answer my question.

  2. #2
    aimless
    Guest
    Hullo,

    Not really. Since the past Win 9X programs, no one does the above mentioned. However, with more and more hackers/crackers/phreakers getting jobs like 'Security Consultant', 'Firewall Admin', or even absorbed into Anti-Virus S/w companies, you can assume that this will be on the rise.

    However, malacious code will be to the extent of internet, not the "delete-the-friggin'-hdd' kind. For the simple reason that the companies indulging in the latter kind of tend to get very clumsy when explaining to the law, or even the local Consumer complaint forum as to why they fried the HDD of a particular person. It is bad publicity. Though the company may then spend millions convincing people, normals will not buy the program and corporates will shy away as a result of the "of-course-its-legal-but-it-COULD-happen-to-me-too" syndrome. Hence, the company will try its utmost to do the malacious code to sending messages on the internet. My idea of breaking is to do it on a machine that's not connected to LAN/Internet, or if you MUST, then atleast disable them by removing the goddam plugs !!

    However, be very careful of the hacker tools, or tools that are really really specialist. The makers of these tools have guaranteed market and would give a rat's ass to complaints from the law and Consumers, if they DID indeed fried your HDD.

    But commerical companies ? Nope. Remove the NET and the LAN, and you're pretty much on good grounds.

    Have Phun
    I promise that I have read the FAQ and tried to use the Search to answer my question.

  3. #3
    Tech19
    Guest
    I've got a program that simply restarts the computer if a check fails. It's kinda annoying >(
    I promise that I have read the FAQ and tried to use the Search to answer my question.

  4. #4
    Tech19
    Guest
    Id recommend tiny personal firewall (websearch it).

    At the click of a button you can save yourself much hassle and prohibit any network traffic from going beyond localhost :-)

    regards

    Carp
    I promise that I have read the FAQ and tried to use the Search to answer my question.

  5. #5
    Carpathia
    Guest
    It seems this board has a nasty cookie problem. I just noticed after making that post that I was logged in as Tech19.

    After I manually log out it then reverted to my usual nick.
    I promise that I have read the FAQ and tried to use the Search to answer my question.

Similar Threads

  1. Help analyzing a malicious PDF
    By Sunk in forum Malware Analysis and Unpacking Forum
    Replies: 1
    Last Post: August 8th, 2011, 15:20
  2. malicious HID
    By dion in forum Off Topic
    Replies: 2
    Last Post: June 30th, 2011, 05:26
  3. Checking Exe Integrity
    By Mishima in forum The Newbie Forum
    Replies: 5
    Last Post: November 13th, 2008, 04:32
  4. Replies: 0
    Last Post: April 24th, 2008, 09:42
  5. Replies: 0
    Last Post: April 24th, 2008, 09:42

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •