|
Joe, I definately wasn't picking on Bill Regar or WRKDBF; I could have used any number of other freeware authors and utilities as an example. WRKDBF is just so pervasive and such a perfect vehicle for the kind of attack I described. My point, as you grasped, is how many of us are guilty of installing freeware utilities without truly knowing the author or what's in the code and exposing our systems to possible attack. Please note that I recognize a huge difference between freeware and opensource software and the latter is perfectly acceptable to me since I can examine the code and see what it's doing. While I guess there are no guarantees, commercial software vendors are known entities and can be made accountable through the judicial system. They have a vested interest in making sure their products cannot be exploited in this manner and maybe we as a community need to put them on notice that any potential exploits discovered in their products will be made known publicly forum such as this. Kind regards, BJ On 1/3/07, Joe Pluta <joepluta@xxxxxxxxxxxxxxxxx> wrote:
> From: Brian > > Better yet, how about you create and distribute a freeware utility like > WRKDBF with a timer set for a few years into the future so confidence in > the > utility is achieved then when the timer is tripped you start randomly > selecting a record from the file being updated and perform such mischief. > Do > you have a freeware utility like WRKDBF installed? Do you know what's in > the > code? > > This message is not in anyway way meant to suggest that WRKDBF contains > any > malware but just used it as an example of freeware that is installed and > used by those with high-level authority without them really knowing what's > in the code. Your point is well taken, Brian. And while I'm reasonably certain that Bill Reger didn't put any time bombs in WRKDBF <grin>, that's one reason why the more security conscious managers I've met refuse to put ANY freeware on their systems. But then again, what's to stop say, a programmer at an ERP vendor or an AV software vendor from doing the same thing? Or even an IBM i5/OS programmer? This is indeed a slippery slope, and eventually you end up chucking the computer and going back to the abacus... Joe -- This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/midrange-l or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/midrange-l.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.