|
2008-04-17
, 13:36
|
Posts: 66 |
Thanked: 17 times |
Joined on Apr 2008
|
#52
|
The viruses that do exist can't do any real damage unless executed by the user as root, and the keyloggers that are available on the net are extremely hard to get working.
|
2008-04-17
, 13:48
|
Posts: 66 |
Thanked: 17 times |
Joined on Apr 2008
|
#53
|
|
2008-04-17
, 16:47
|
|
Posts: 4,930 |
Thanked: 2,272 times |
Joined on Oct 2007
|
#54
|
|
2008-04-18
, 15:31
|
Posts: 66 |
Thanked: 17 times |
Joined on Apr 2008
|
#55
|
I have several and always have had.
Almost never means GUI interaction. Anything you can control in any way, can be controlled by any other thing If you have a virus/keylogger/whatever, it is running at the same privilege level as you, so it can control your firewall as well as you can. Maybe even better because it is putting effort into it.
[Using a logically identical case] That is going to an extreme to try and prove an argument. It is nowhere near the same level of importance.
I am referring to knowing what you install on your NiT, and knowing where it came from. You can't be expected to know every line of code running, but you can be expected to know what you have installed, and know what level of trust you give that code.
|
2008-04-18
, 15:36
|
Posts: 66 |
Thanked: 17 times |
Joined on Apr 2008
|
#56
|
Of course the keylogger could just use the web or mail to export the data. A firewall is virtually useless for stopping outgoung data.
Reallistically it's not worth the time... even code that subverted 50% of the NIT's thats still less systems than code that subverted .001% of the windows boxen out there.
|
2008-04-18
, 15:54
|
Posts: 3,841 |
Thanked: 1,079 times |
Joined on Nov 2006
|
#57
|
The Following User Says Thank You to TA-t3 For This Useful Post: | ||
|
2008-04-18
, 16:06
|
Posts: 605 |
Thanked: 137 times |
Joined on Nov 2005
@ La Rochelle, France
|
#58
|
|
2008-04-18
, 16:12
|
|
Posts: 868 |
Thanked: 474 times |
Joined on Oct 2007
@ Capital District, NY, USA
|
#59
|
|
2008-04-18
, 16:35
|
|
Posts: 4,930 |
Thanked: 2,272 times |
Joined on Oct 2007
|
#60
|
Assuming you're talking abouut Windows: that assumes that the keylogger could get control of the browser or mail package. This cold happen as the result of a flaw in implementation of the same, but there's a difference between an obscure flaw which gets patched, and an OS which has no security at all by design. If you're talking about maemo: yes.
ǝɥʇ ʇnoɥʇıʍ sɹǝsʍoɹq uo ʞɐǝɹq
llıʍ ʇı ɥƃnoɥʇ 'looɔ ʎʇʇǝɹd s,ʇı
Anyway, applying that filter would be fairly simple, and complement the image flipping nicely.