[147304] in North American Network Operators' Group
Re: [fyodor@insecure.org: C|Net Download.Com is now bundling Nmap
daemon@ATHENA.MIT.EDU (TR Shaw)
Tue Dec 6 18:56:04 2011
From: TR Shaw <tshaw@oitc.com>
In-Reply-To: <1323215369.82533.YahooMailNeo@web162112.mail.bf1.yahoo.com>
Date: Tue, 6 Dec 2011 18:55:06 -0500
To: "andrew.wallace" <andrew.wallace@rocketmail.com>,
NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
I can't believe this...
Andrew, please check the dictionary second definition of Trojan before =
proceeding.
A "remote access tool" is ssh, VNC and others and these are definitely =
not trojans. Get a grip.
Trojan Horse
noun noun Greek Mythology
a hollow wooden statue of a horse in which the Greeks concealed =
themselves in order to enter Troy.
=95 (also Trojan horse) figurative a person or thing intended secretly =
to undermine or bring about the downfall of an enemy or opponent : the =
rebels may use this peace accord as a Trojan horse to try and take over.
=95 (also Trojan horse) Computing a program designed to breach the =
security of a computer system while ostensibly performing some innocuous =
function.
Tom
On Dec 6, 2011, at 6:49 PM, andrew.wallace wrote:
> A trojan can be used for good if in the right hands as a remote access =
tool for business use.
>=20
>=20
> Andrew
>=20
>=20
> ________________________________
> From: Bryan Fields <Bryan@bryanfields.net>
> To: "nanog@nanog.org" <nanog@nanog.org>=20
> Sent: Tuesday, December 6, 2011 11:24 PM
> Subject: Re: [fyodor@insecure.org: C|Net Download.Com is now bundling =
Nmap with malware!]
>=20
> On 12/6/2011 13:30, andrew.wallace wrote:
>> It could be argued that Nmap is malware, and such software has =
already been called to be made illegal.
>>=20
>> If I was Cnet, I would stop distributing his software altogether.
>>=20
>> Link: http://nmap.org/book/legal-issues.html
>=20
> If this is not trolling and you actually believe this, just wow.....
>=20
> Nmap is just a tool, and any tool can be misused by people for =
criminal acts.
> It's really no different than a gun in that regard. Both are =
incredibly
> useful things in the right hands, mere tools to further security. =
However in
> the wrong hands they can be used to commit crimes and break other =
peoples
> security.
>=20
> --=20
> Bryan Fields
>=20
> 727-409-1194 - Voice
> 727-214-2508 - Fax
> http://bryanfields.net