On Sun, 31 Oct 2004 07:46:00 -0000, Take a wild, friggin guess
<a_change_of_plans_at_yahoo.com> wrote:
> Where there's a will, there's a way. >;)
>
> --JMH, yup, still awake...
Agreed. It usually takes one email to kill a BitTorrent tracker. It
takes a bit of doing to flood a P2P network with fakes and altered
copies, but it can be done by pretty much anyone with access to a
couple of machines with T1-level connectivity. That's more folks than
you'd think, these days.
Personally, what with the new Windows JPEG bug (where a hacker can
modify a JPEG image to break the Windows image display .dll - which
runs *ANY* time you view a JPEG on Windows - and run their own code),
and the fact that most computer users have absolutely no clue what
they're doing or how to protect themselves, P2P is looking scarier and
scarier. What if that zipped file full of pictures has a set of
infected images which splice together a .dll that then rummages
zipfiles and alters all the other images you're sharing? What if that
file could do something like wait two months and then start damaging
all zipped image files?
And if one of the set doesn't get viewed (and the code in it run),
will that .dll be inert or worse, destroy your whole system?
--
Zach Collins (Siege)
Received on Tue Nov 02 2004 - 16:59:01 CST