Re: What to do with a vulerability?

From: H C (keydet89at_private)
Date: Thu Jan 23 2003 - 10:29:49 PST

  • Next message: Jason Coombs: "RE: What to do with a vulerability?"

    TB,
    
    The request to the OP is to provide proof of concept
    code that shows how a process can be hidden from view.
     That proof of concept code does not need to be viral
    in order to work properly.
    
    --- The Blueberry <acr872kat_private> wrote:
    > >If you're wondering if a process hidden in this way
    > can be detected, then 
    > >release a simple proof-of-concept program, and
    > invite the list readers to 
    > >come up with a countermeasure.  *****Your code
    > needn't be viral or designed 
    > >to spread in any way.*****
    > 
    > Please explain yourself a bit more because a
    > non-viral code is easily turned 
    > into a viral one...
    > 
    > ~TB
    > 
    >
    _________________________________________________________________
    > Add photos to your e-mail with MSN 8. Get 2 months
    > FREE*. 
    > http://join.msn.com/?page=features/featuredemail
    > 
    
    
    __________________________________________________
    Do you Yahoo!?
    Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
    http://mailplus.yahoo.com
    



    This archive was generated by hypermail 2b30 : Thu Jan 23 2003 - 14:26:45 PST