From: Eugene.Leitl@lrz.uni-muenchen.de
Date: Sat Mar 03 2001 - 15:01:08 MST
"Michael M. Butler" wrote:
>
> FYI to the list: it might be making the rounds again. Don't open .exe
> attachments from anyone you wouldn't accept a transfusion from... :| :)
I don't know, I always open .exe attachements. Unfortunately, they don't
run on my system ;P
As to authentication by sender, that's bogus, as many worms send themselves
on automatically, and morever, headers are easily forged, so ackphtphtphtpht.
I suggest using a mailer written in a buffer-overrun-free language, running
on an OS with decent security, and accept only executables from a trusted
source, as verified by having a good signature. Though a worm could snarf a
PGP/GPG passphrase, that threat model is strictly theoretical.
This archive was generated by hypermail 2.1.5 : Sat Nov 02 2002 - 08:06:12 MST