Okay, I know that I can sometimes be too literal in responding to things. And I know that I am insufficiently devious when thinking about computer security threats. I also have this orientation towards using a risk-benefit analysis approach to addressing security threats that does not seem to be popular among people who believe in barring all the doors, locking all the gates, bricking in all the windows, then throwing a big tarp over the whole edifice and burying it 100 feet underground (in soft peat; thank you Douglas Adams) in an effort to block every single real and theoretical threat that may ever have, may now, or may ever exist....

But...

Can anyone tell me how a passworded zip file can be a threat?

If the zip file contains malware, it has to be unzipped before the malware can operate, right?

And how can a user unzip a file for which he does not have the password?

And how would a user get a password for a malware zip file mailed to him by a bot?

What am I missing here, again, as usual?

Ken Dibble
www.stic-cil.org


_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://mail.leafe.com/mailman/listinfo/profox
OT-free version of this list: http://mail.leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message: 
http://leafe.com/archives/byMID/profox/[email protected]
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to