On Saturday 25 August 2007 00:43, Jude DaShiell wrote: > Very easily. The very first thing the trojan did after installing itself > was to call home. Home has the address of the trojaned machine. Home can > then check up on its trojan and maintain it and activate it or repair it > as necessary.
Please don't top-post. You will recall that block zero has been wiped, new partition tables have been installed, and new filesystems created. At worst inactive copis of one or more malwares lies in unused portions of the drives where nothing in Debian will voluntarily or accidently activate it. How can "home" check up on its trojan, maintain it, activate it or repair it without the non-existent cooperation of the target system? Your argument seems to be that if I have a dead burglar robot in my house, the dead burglar robot's owner can call up the dead burglar robot and instruct the dead burglar robot to unlock a door of my house so that the dead burglar robot's owner can enter and repair the dead burglar robot. --Mike Bird -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]