On 14:59, michaelquig...@theway.org wrote:
> "In a properly secured O/S an application program can't do any damage"
>
> No damage, yes. *But additional alterations can happen*. Software
> installations alter the base O/S--especially the Windows registry.
> Keep in mind things such as Anti-virus
> - Message from Mike Acker on Thu, 28
> Apr 2011 10:49:13 -0400 -
>
> To:
>
> "Robert J. Hansen"
>
> cc:
>
> gnupg-users@gnupg.org, Faramir
>
> Subject:
>
> Re: Re: Keylogers
>
> On 14:59, Robert J. Hansen wrote:
On 14:59, Robert J. Hansen wrote:
> On Wed, 27 Apr 2011 12:56:19 -0400, Mike Acker
> wrote:
>
>> > This is why we need the Software Audit Tool I've discussed at times on
>> > various boards. The Software Audit Tool will need to be on a separate,
>> > read-only, bootable media such as a DVD. On b
Mike Acker wrote (in part):
> this is the only way to certify a system: a running system cannot be
> used to certify itself. for those who don't understand this an old and
> common malware trick is to replace the directory list program. when the
> system owner types dir c:\windows\*.* the modifi
On Wed, 27 Apr 2011 12:56:19 -0400, Mike Acker
wrote:
> This is why we need the Software Audit Tool I've discussed at times on
> various boards. The Software Audit Tool will need to be on a separate,
> read-only, bootable media such as a DVD. On boot-up it would mount the
> C: drive of the targ
On 04/27/2011 09:10, Robert J. Hansen wrote:
>> yep. Phil Zimmerman noted that in his original essay on PGP. If you
>> > have a malware infection you can no longer speak to what your computer
>> > is or is not doing.
> In fact, it's quite a bit worse than that. Your traffic is secure only so
> l
> yep. Phil Zimmerman noted that in his original essay on PGP. If you
> have a malware infection you can no longer speak to what your computer
> is or is not doing.
In fact, it's quite a bit worse than that. Your traffic is secure only so long
as both endpoints are secure. Depending on who doe