[5839] in cryptography@c2.net mail archive
Re: Internal vs external threats, any references?
daemon@ATHENA.MIT.EDU (Marc Horowitz)
Mon Oct 4 15:45:38 1999
From: Marc Horowitz <marc@mit.edu>
To: Ben Laurie <ben@algroup.co.uk>
Cc: amir.herzberg@il.ibm.com, Jeff.Hodges@stanford.edu, cryptography@c2.net
Date: 04 Oct 1999 12:57:36 -0400
In-Reply-To: Ben Laurie's message of "Mon, 04 Oct 1999 08:57:59 +0100"
Message-ID: <t53vh8nrrlr.fsf@horowitz.ne.mediaone.net>
Ben Laurie <ben@algroup.co.uk> writes:
>> How does this trojan horse or virus get onto the targetted computer? I
>> don't know what you run behind your firewalls, but I certainly don't run
>> anything that could get trojaned or virused.
There are very few interesting sites which don't have large numbers of
clueless users running windows and receiving email from the Internet.
Can you say "Word Macro Virus"?
I am constantly dealing with people (including experts) who forget
about both the awareness and the skill level of the typical user. By
reading this mailing list, you are already highly atypical.
Marc