[5838] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Internal vs external threats, any references?

daemon@ATHENA.MIT.EDU (David Honig)
Mon Oct 4 15:44:56 1999

Message-Id: <3.0.5.32.19991004091008.007dd430@pop.sprynet.com>
Date: Mon, 04 Oct 1999 09:10:08 -0700
To: Ben Laurie <ben@algroup.co.uk>, amir.herzberg@il.ibm.com
From: David Honig <honig@sprynet.com>
Cc: Jeff.Hodges@stanford.edu, cryptography@c2.net
In-Reply-To: <37F85E07.FE4D3AAF@algroup.co.uk>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"

At 08:57 AM 10/4/99 +0100, Ben Laurie wrote:
>How does this trojan horse or virus get onto the targetted computer? I
>don't know what you run behind your firewalls, but I certainly don't run
>anything that could get trojaned or virused.

Yes, but you're not the only one on your LAN.  Is everyone as
careful as you?  Consider that some recent malware runs without
explicit user action.

(Not trusting your own LAN is also a good argument for user-to-user
crypto vs. firewall to firewall, BTW.)

DH










  






home help back first fref pref prev next nref lref last post