HP3000-L Archives

October 2008, Week 5

HP3000-L@RAVEN.UTC.EDU

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Brice Yokem <[log in to unmask]>
Reply To:
Brice Yokem <[log in to unmask]>
Date:
Thu, 30 Oct 2008 13:44:45 -0400
Content-Type:
text/plain
Parts/Attachments:
text/plain (33 lines)
Yes, I had an aquaintance of mine who kept a 3.5" disk with all of the
viruses he had encoutnered.  He called it his Petri Dish.

On Thu, 30 Oct 2008 08:14:48 -0700, Craig Lalley <[log in to unmask]> 
wrote:

>--- On Thu, 10/30/08, Jeff Kell <[log in to unmask]> wrote:
>
>And yes, to argue the point from a security perspective, there is an
>organization now (not sure if public or still NDA) that keeps an MD5
>registry of all known "malware" - viruses, trojans, botnets,rootkits,
>etc.  We're not "all that far" from a reputation score of an
>attachment.  The debate here then becomes be what sort of reputation
>we're scoring, rather than the scoring itself (or at least the reference
>database).
>
>Compiling similar libraries isn't new, NIST has been doing it (NSRL) for
>years.  http://www.nsrl.nist.gov/
>
>*********************************************************
>How difficult would it be to modify the MD5 value to a benign value... 
camouflage so to speak.
>
>-Craig
>
>
>
>* To join/leave the list, search archives, change list settings, *
>* etc., please visit http://raven.utc.edu/archives/hp3000-l.html *

* To join/leave the list, search archives, change list settings, *
* etc., please visit http://raven.utc.edu/archives/hp3000-l.html *

ATOM RSS1 RSS2