× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



From: Scott Klement

I dunno... it'd take more refinement to get everything exactly right.  And
it'd be at the mercy of the level of authority granted to whomever is
running it, so it'd have to check authority levels and only carry out it's
actions if it has enough authority -- and keep waiting until it's
eventually run by someone with enough authority to do the deed.

And this is the sticking point.  If you have write access to the software,
then you can pretty much do anything you want anyway; you don't need to use
a virus to do it.

With Windows, the virus can be inserted without the user knowing, and
bypassing whatever security checks Windows has in place.  Hence my note
about Ms. Rutkowska's Vista exploit; this was the Microsoft's overall answer
to all security woes, and a lone hacker whacked it.

To Microsoft's credit, they did send someone to the conference where Ms.
Rutkowska demoed the technique and they have since patched that specific
hole, but the point is that there are very few ways to get that level of
access on the iSeries.

Not zero ways, mind you.  Operating systems are essentially still programs
and programs have flaws.  I'm relatively certain that someone of Leif
Svalgaard's knowledge and skill level might be able to create what would in
effect be a rootkit for the iSeries.  But the pool of potential black hats
for the iSeries is so very, very small that I don't think it's likely to
happen (unlike the Open Source Windows rootkit package that's freely
available for download on the Internet).

Joe



As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:
Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.