Using worms to find vulnerable machines and patch them

Discussion in 'other security issues & news' started by lucas1985, Feb 15, 2008.

Thread Status:
Not open for further replies.
  1. lucas1985

    lucas1985 Retired Moderator

    Joined:
    Nov 9, 2006
    Posts:
    4,047
    Location:
    France, May 1968
    Another brilliant Microsoft idea :rolleyes:
     
  2. ccsito

    ccsito Registered Member

    Joined:
    Jul 27, 2006
    Posts:
    1,579
    Location:
    Nation's Capital
    If you can't beat 'em, join 'em. :D ;) :p :rolleyes:
     
  3. ThunderZ

    ThunderZ Registered Member

    Joined:
    May 1, 2006
    Posts:
    2,459
    Location:
    North central Ohio, U.S.A.
    ......and just how long to you think it will take the Crackers :ninja: to use this latest and greatest :eek: MS idea :rolleyes: to their advantage? :argh:
     
  4. LoneWolf

    LoneWolf Registered Member

    Joined:
    Jan 2, 2006
    Posts:
    3,408
    Oh yeah, I see nothing going wrong here. :rolleyes:
     
  5. ThunderZ

    ThunderZ Registered Member

    Joined:
    May 1, 2006
    Posts:
    2,459
    Location:
    North central Ohio, U.S.A.
    Really do not see the need. Has`t it already been proven and documented that MS downloaded, without EU`s permission "updates" of some sort. Was discussed on this very Forum as well. Just to lazy to do a search for the thread. :p
     
  6. SystemJunkie

    SystemJunkie Resident Conspiracy Theorist

    Joined:
    Mar 3, 2006
    Posts:
    1,500
    Location:
    Germany
    So you like to be omega(flee), I prefer alpha(fight).
     
  7. lucas1985

    lucas1985 Retired Moderator

    Joined:
    Nov 9, 2006
    Posts:
    4,047
    Location:
    France, May 1968
    Perhaps I'm jumping to conclusions too early, but this looks really bad:
    - What will impede the bad guys to reverse engineer the worm and use its propagation engine in their own creations?
    - Doesn't this open new avenues for social engineering?
    - Will we have to have open ports, services listening to allow this worm to work?
    - What if this worm carries other payload than patches? I can imagine Microsoft trying to validate Windows installs with this worm.
    - If we don't accept it, will it waste our bandwidth trying to patch our machines?
     
  8. ThunderZ

    ThunderZ Registered Member

    Joined:
    May 1, 2006
    Posts:
    2,459
    Location:
    North central Ohio, U.S.A.

    All good questions, and there will probably be more that may never get answered at least by MS. Stay tuned to As the MS Worm Turns. o_O
     
  9. Tunerz

    Tunerz Registered Member

    Joined:
    Jun 12, 2007
    Posts:
    96
    Location:
    Philippines
    They have a good idea on this. The problem is, crackers will always find ways to get into a vulnerable, yet profitable machines. If they ever get hands with this, then the worm history will repeat itself. Making a good and secure worm is somethin' MS can take ages to perfect, as much as their OSes.
     
  10. ccsito

    ccsito Registered Member

    Joined:
    Jul 27, 2006
    Posts:
    1,579
    Location:
    Nation's Capital
    The flight versus fight question has been a constant behaviorial choice issue for many. Some wish to run away and then fight another day while some want to take a stand right now and suffer the consequences at that time. It all depends on the situation and whether delaying the inevitable will prove to be of any use. MS apparently wants to try to employ a tactic that others have used to defeat their software and instead to turn it into a beneficial purpose. That may or may not be a good decision.
     
  11. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    57,721
    Location:
    Texas
    Story
     
  12. lucas1985

    lucas1985 Retired Moderator

    Joined:
    Nov 9, 2006
    Posts:
    4,047
    Location:
    France, May 1968
    I had my (little) hopes that Microsoft still has some amount of sense. This correction to the original story proves that.
     
Loading...
Thread Status:
Not open for further replies.