Re: virii
- Posted by Steve Mosher <goat at DEVIL.ISN.NET> Feb 29, 2000
- 498 views
Oy, but you've got to use the potentially infected program to make use of sanity.ex! Ever see the login trojan compiled into the compiler? Sweet stuff. Anyhow, maybe you should just post the actual checksums of these files -- or better yet, thier md5 signatures. It's fairly easy to produce the same checksum if you know what you're doing (so I am told). MD5 however isn't easy at all. In fact, I've seen people use MD5 sigs in thier password files instead of simply crypt()ing the passwords. This way, a totally different program could be used to check. I know that this could be overboard, but I don't let anything slip with security. 'Sides, this is the standard way to do it. On Mon, 28 Feb 2000, you wrote: > I should have mentioned that euphoria\demo\sanity.ex > knows the correct checksums for ex.exe and exw.exe. > If you run sanity.ex, using either ex or exw, it will check > both .exe files and tell you if they've been tampered with. > > exu is also a compressed executable. > I'll add it's checksum to sanity.ex in the next release. > I don't hear much about Linux viruses or virus scanners. > > Regards, > Rob Craig > Rapid Deployment Software > http://www.RapidEuphoria.com