It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by 308
Tristar, you said this in one of your first posts: "Keep in mind, this worm CANNOT BE STOPPED"
Yet crisko makes it abundantly clear that he could isolate the problem if it infected his system and then fix the problem working with the sys admin for that sector. Can you clarify your point?
That is correct as long as its detected, if its not detected then you have no idea. (There is a video link below and download link showing its architecture via visualization of injected computers.
Also have you uploaded the video file, I'm very eager to see your proof that conficker is stealing sensitive data. I'm curious as to why none of the security sites have reported this, if indeed it is happening. They would surely be aware and it would be in the public's best interest to be made aware and how to fix the problem, right?
Here you go, well, there are thousands of cases but the general media is not interested as ratings increase with swine flu reports and jets flying through new york etc etc..
www.thetechherald.com...
www.tgdaily.com...
www.thespec.com...
watch.bnn.ca... < 1 Month to date : D >
The only reason I can think of as to why they don't is that there is a team working for some covert op department which is keeping a lid on this till they've caught the people behind this. Risky business in my opinion, how much data is getting siphoned away before or if they ever do catch the people responsible? You seem to know something we don't about this please spill the beans ...
You're a yellow dot.
rapidshare.com...
It's true Linux is more secure at the moment but not 100% secure and as someone else has already said on this thread it's more the user who lets the virus/worm onto the system usually through some form of social engineering.
My counter point with Linux, revolves around the fact it doesn't have anywhere near the desktop penetration of Windows so virus writers are of course going to focus on Windows for more effective results. If Linux ever starts getting rates of 20-25% on the desktop market you can guarantee people are going to find exploits within the system. I do wonder how quick the various Linux distros will release updates when a big virus bites those OS's.
Originally posted by makeitso
reply to post by hal4511
Sounds great, but in reality full disclosure shows that Linux has its own set of vulnerabilities, as do all OS's.
[edit on 4/26/09 by makeitso]
Originally posted by tristar
reply to post by starapple
Hi,
Was laughing at your last lines, but hey, i wont be flaming you at all. Although i run and maintain both systems and you do have a point as far as linux is concerned but that does not mean that its non prone to some serious attacks, that is if that was your intention. Again, as you mentioned it seriously is up to the end user to familiarize himself with his operating system.
Funny enough last year me and my friend had openly invited one another to attack each other with no restriction, the goal was 1000 dollars and a particular file we each had to place on our computer with encryption, keep in mind we have been buddy's since grade school, now we both have wifes and we still go vacations together to this date.
Back to the point, he did successfully attack and totally trash my laptop which was behind some serious pitbull style guard dog defence. For all intentions as you understand i was running windows and he was running linux. After his successful intrusion and re configuring my system it was my turn to retaliate. It took me about 3 months i too was successful in trashing his laptop. To make a long story short, after 16 months of fun and play between us the score was 7 successful attacks from linux and 5 from ms os. So he one the 1k and we all went out for dinner and celebrated. The moral of the story is nothing is secure, anything that is digital is vulnerable.
P.S. We are in the same type of competition again him running a linux and im currently running a mac , he has already successfully hit me twice but we have only been doing this for the past 4 months.
The prize this time round is the looser will give up his laptop to the other person. There is nothing more entertaining than exercising your intelligence on daily basis. Oh almost forgot even our wifes are getting in on the competition..lol
Peace.
The sensitive information collected by the Torpig/Sinowal botnet over just 10 days could be worth as much as $8.3 million
By Jeremy Kirk , IDG News Service , 05/04/2009
Researchers from the University of California gained control over a well-known and powerful network of hacked computers for 10 days, gaining insight into how it steals personal and financial data.
The botnet, known as Torpig or Sinowal, is one of the more sophisticated networks that uses hard-to-detect malicious software to infect computers and subsequently harvest data such as e-mail passwords and online banking credentials.