That still seems a bit "over-the-top". Sure, better safe than sorry, but
I wouldn't just blindly delete any exe that I come into contact with
(via email or otherwise). Especially on Linux, you can get archives
zipped into an exe format that are unzipped via unzip -a. That is quite
a common format in the Windows world, and I haven seen a few times
within the Linux world also. Magic numbers can't tell it is an archive,
so you would think it is just a regular binary, but I know for a fact
Dell does many of their drivers in this format.

With the whole Intel thing, even through emulation, this could be a
stretched argument. Sure, there are architecture-independent viruses,
but I haven't heard of a virus that can attack on any platform through
the architecture itself. I am sure that in the future, these will be
common, but I don't think this is something that we should be worrying
about now. Please correct me if I am wrong in saying this as I am not
pretending to know everything about the virus infections, this is just
from experience.

On Sun, 2008-01-20 at 19:51 -0500, Derick Centeno wrote:
> The point raised by Dennis is extremely relevant to this thread.  The
> exception of course is Linux which runs on the PowerPC or Cell
> architecture.  Only in that environment would Linux executables have no
> effect as the infecting executables are designed for Linux and Windows
> running on Intel compatibles and utilize specific functions, register
> processing and calls to the Intel and compatible processor.
> 
> Keeping in mind that there are emulators of all kinds, including even a
> Linux emulator which functions within Windows, all of them share one
> characteristic, they either run on Intel or emulate Intel. All of these are
> susceptible to these infections and other malware.
> 
> This is a pretty monstrous headache for the current computer system
> marketplace which seems to function nearly entirely by relying on one
> processor.  I can hear the overwhelming sigh from many experts repeating to
> themselves regarding this predicament, "I told them... long ago".  To which
> the only response now is, "Oh well..."
> 
> The solution which Bill Maidment recommended earlier in this thread may be
> the only reasonable approach for users of Intel systems to implement.  If I
> was using an Intel system I'd have to agree with him, better safe "than
> scorched."
> 
> All the best...
> 
> On Jan 20, 2008 6:46 PM, Sarocet <[EMAIL PROTECTED]> wrote:
> 
> > Dennis Peterson wrote:
> > > Nobody has actually tested the files to see if they are Windows
> > executables that I've
> > > seen. It is entirely possible they could be Linux executables. File
> > extensions don't
> > > mean much on a Linux system but it seems from this thread a great way to
> > pass around
> > > Linux viruses is to tack on a .exe extension and a lot of people will
> > ignore them to
> > > their great peril.
> > >
> > > dp
> > Well, if you ignore the file i don't see how it's going to run.
> > Moreover, it's less likely you will write ./Foo.exe as
> > you're already assuming by the extension that it wouldn't work, so why
> > do it?
> > _______________________________________________
> > Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
> > http://lurker.clamav.net/list/clamav-users.html
> >
> _______________________________________________
> Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
> http://lurker.clamav.net/list/clamav-users.html

_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html

Reply via email to