Okay, I know that I can sometimes be too literal in responding to things.
And I know that I am insufficiently devious when thinking about computer
security threats. I also have this orientation towards using a risk-benefit
analysis approach to addressing security threats that does not seem to be
popular among people who believe in barring all the doors, locking all the
gates, bricking in all the windows, then throwing a big tarp over the whole
edifice and burying it 100 feet underground (in soft peat; thank you
Douglas Adams) in an effort to block every single real and theoretical
threat that may ever have, may now, or may ever exist....
But...
Can anyone tell me how a passworded zip file can be a threat?
If the zip file contains malware, it has to be unzipped before the malware
can operate, right?
And how can a user unzip a file for which he does not have the password?
And how would a user get a password for a malware zip file mailed to him by
a bot?
What am I missing here, again, as usual?
Ken Dibble
www.stic-cil.org
_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://mail.leafe.com/mailman/listinfo/profox
OT-free version of this list: http://mail.leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message:
http://leafe.com/archives/byMID/profox/[email protected]
** All postings, unless explicitly stated otherwise, are the opinions of the
author, and do not constitute legal or medical advice. This statement is added
to the messages for those lawyers who are too stupid to see the obvious.