Full Disclosure mailing list archives

Re: Most common keystroke loggers?


From: foofus () foofus net
Date: Fri, 2 Dec 2005 16:55:02 -0600

On Sat, Dec 03, 2005 at 10:45:02AM +1300, Nick FitzGerald wrote:
Jan Nielsen wrote:

That question opens up a whole lotta other questions, really depends on
what you hope to achieve by doing authentication via a compromised system.
In my book you should instead try to detect a compromised system and deny
them access if they are indeed compromised, ...

Obviously, then, your book does not include the phrase "Halting 
Problem"...

Do you just mean that you think this is an undecidable issue, or is 
there some stronger or more directly applicable lesson to be learned 
here from the Halting Problem?

--Foofus.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: