Page 2 of 2 FirstFirst 12
Results 11 to 16 of 16
  1. #11  
    Senior Member Zathras's Avatar
    Join Date
    May 2008
    Location
    San Jose, California
    Posts
    6,376
    Wait....I thought the internet was for porn???? At least that's what the song says.
    Solve a man's problem with violence and help him for a day. Teach a man how to solve his problems with violence, help him for a lifetime - Belkar Bitterleaf
    Reply With Quote  
     

  2. #12  
    LTC Member Odysseus's Avatar
    Join Date
    May 2008
    Location
    FT Belvoir, VA
    Posts
    15,638
    Quote Originally Posted by megimoo View Post
    Whats to stop a hostile person or website from 'sticking 'an 'x' rated photo on your drive by embedding it in a terrain map or an innocent string of news text.If a Trojan virus is capable of takeing over a system and downloading data they are surely able to plant false image evidence on your laptop by means of Steganography !

    If a hostile persons intent is to destroy someone's career by planting reputation destroying evidence on your computer whats to stop them ?In the case of child Pronography you are guilty until proven innocent and even then you are forever suspect !
    It's a legitimate concern, but the check that was done at the entry point in Germany was a simple visual check of what was listed as a media file type, based on the extension. Unless the trojan extracted the image prior to the check but after your own check, there'd be nothing to look at. Besides, a trojan would leave a forensic trail, so you'd be able to defend yourself.
    --Odysseus
    Sic Hacer Pace, Para Bellum.

    Before you can do things for people, you must be the kind of man who can get things done. But to get things done, you must love the doing, not the people!
    Reply With Quote  
     

  3. #13  
    PORCUS MAXIMUS Rockntractor's Avatar
    Join Date
    Apr 2009
    Location
    oklahoma
    Posts
    42,423
    Quote Originally Posted by Zathras View Post
    Wait....I thought the internet was for porn???? At least that's what the song says.
    True but originally we thought woman were just for sex but then we discovered they have many other uses!
    Reply With Quote  
     

  4. #14  
    LTC Member Odysseus's Avatar
    Join Date
    May 2008
    Location
    FT Belvoir, VA
    Posts
    15,638
    Quote Originally Posted by Rockntractor View Post
    True but originally we thought woman were just for sex but then we discovered they have many other uses!
    I'd facetiously ask what they are, but I don't feel like getting flamed.
    --Odysseus
    Sic Hacer Pace, Para Bellum.

    Before you can do things for people, you must be the kind of man who can get things done. But to get things done, you must love the doing, not the people!
    Reply With Quote  
     

  5. #15  
    Quote Originally Posted by Odysseus View Post
    I'd facetiously ask what they are, but I don't feel like getting flamed.
    Oh, someone will happen along to enlighten you. :p
    Reply With Quote  
     

  6. #16  
    An Adversary of Linda #'s
    Join Date
    Aug 2005
    Posts
    22,891
    Quote Originally Posted by Odysseus View Post
    It's a legitimate concern, but the check that was done at the entry point in Germany was a simple visual check of what was listed as a media file type, based on the extension. Unless the trojan extracted the image prior to the check but after your own check, there'd be nothing to look at. Besides, a trojan would leave a forensic trail, so you'd be able to defend yourself.
    Do you as a mater of course check your laptop for intrusions.I don't mean a simple virus but something more elegant

    .There are people writing code who are able to insert a Trojan as an intrusion tool without leaving any trail .They are usually written as a future payload to enable access to the computer, if needed, in the future.They by definition keep a very low profile and awaken only when commanded .Sort of an elegant 'back door' available when commanded.

    Most people who actually write malicious code are juveniles with too much time on their hands and a need to be recognized for their skills although I wouldn't put it past those company's who write anti Trojan code to write a few themselves just to stay in business..

    The best creative professional programmers mostly work for the NSA,Hughes, Lockheed Martin or some high level security firm and wouldn't waste their time writing 'kiddie code'.Any computer is vulnerable.I don't care what security you have,someone will be able to circumvent it.
    Reply With Quote  
     

Bookmarks
Bookmarks
Posting Permissions
  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •