Re: Re: online hackers Attn: Shane

From: Punch (2punch.crash2000@rogers.com)
Date: Sun Feb 03 2002 - 07:47:01 EST


sub7 is a Trojan horse program that has been around for a few years , when
your computer is infected it has complete control of it, even passwords,
recording from mic, screen shot's, uploads,downloads, etc....

never versions are hard to detect, and remove, and contain chat programs,
port scanners (scan for infected computers),etc... basically anything you
can do on your computer, a client can do!

----- Original Message -----
From: "rashort" <rashort@swbell.net>
To: <dakota-truck@buffnet.net>
Sent: Saturday, February 02, 2002 12:59 PM
Subject: DML: Re: online hackers Attn: Shane

> Hey Shane,
> You seem to know quite a bit about this subject, so I want to ask you
> this. What is a "Sub 7 Trojan Horse"? That seems to be the tool that
> most hackers use to try to access my hard drive. I'll bet 9 out of 10
> attempts I get are useing it.
> I've been running the Norton IS 2002 because it controlss popups and has
> a firewall, how does it rate in your opinion?
> Thanks,
> Alan S.
>
> > Date: Fri, 01 Feb 2002 10:43:24 -0600
> > From: Shane Moseley <smoseley@ix.netcom.com>
> > Subject: DML: Re: online hackers
>
> There is not really a big difference between the hardware and software
> firewalls (depending on implementation). The hardware versions (Cisco
> PIX for example) is just a glorified PC w/Cisco's own OS (IOS) that has
> the same kind of rule-based configuration. It does have special ASIC's
> that can speed up rule processing but still is based on software. Once
> comprimised, it will only let you through faster 8).
>
> The problem is that people like to download little "personal firewalls"
> that run under an already vulnerable OS like ANY of Microsoft's
> products. Any firewall software running on top of any Microsoft product
> is kinda like an oxymoron.
>
> Some hardened versions of Linux and BSDI for example can provide more
> protection that what Cisco has to offer.
>
> We have many customers whose systems are comprimised all the time
> utilizing a PIX. They run into the same problem as the "personal
> firewall" bunch. Easy to understand, easy to install, easy to configure
> = easy to comprimise.
>
> Just my $0.02,
>
> Shane
>
>



This archive was generated by hypermail 2b29 : Fri Jun 20 2003 - 12:03:57 EDT