Qusay will agree with me that
bradhicks is an interesting read, but sometimes I just go "gah?" Like the past few days. He’s been doing a three part series about Script Kiddie Botnets and Gangster Supercomputers. Now, I’m no expert in the technology, but reading it just comes across as a wee bit hysterical.
He makes it seem as if every PC in the world is a zombie drone that will be turned upon its owner at any second, spilling his (OR HER!) credit and password information to an international conglomerate of cyber-thieves. And there’s NOTHING YOU CAN DO TO PROTECT YOURSELF.
I’m normally one to listen up when someone is offering a warning. But the sheer fear mongering aspect of this reminds me of the “child abduction hysteria” you get when you log into the website for a missing children’s charity. XX THOUSAND CHILDREN GO MISSING EVERY YEAR! and then you do some poking and find out the vast, vast majority of them are either parental abductions or runaways.
So, does anyone have any more level headed pieces on spam bots and related topics?
He makes it seem as if every PC in the world is a zombie drone that will be turned upon its owner at any second, spilling his (OR HER!) credit and password information to an international conglomerate of cyber-thieves. And there’s NOTHING YOU CAN DO TO PROTECT YOURSELF.
I’m normally one to listen up when someone is offering a warning. But the sheer fear mongering aspect of this reminds me of the “child abduction hysteria” you get when you log into the website for a missing children’s charity. XX THOUSAND CHILDREN GO MISSING EVERY YEAR! and then you do some poking and find out the vast, vast majority of them are either parental abductions or runaways.
So, does anyone have any more level headed pieces on spam bots and related topics?
no subject
Date: 2006-02-22 07:40 pm (UTC)no subject
Date: 2006-02-22 08:34 pm (UTC)1. Run behind a hardware firewall. Disallow everything, then turn on only the services you need to get out. A software firewall is no substitute for a hardware firewall.
2. If you can manage it, run a *nix, not windows. When you're setting up the box, turn off all services except the ones you use (remember: you don't need it). If you can't run personal firewall software behind your hardware firewall.
3. Don't use MSIE or Outlook. Don't use whatever 90% of people out there are using -- that's what will get targetted.
no subject
Date: 2006-02-22 09:20 pm (UTC)The absolute easiest way to do this is to buy a Mac. That's not a bragging thing: nobody writes hostile scripts for Macs.
no subject
Date: 2006-02-22 10:36 pm (UTC)no subject
Date: 2006-02-23 05:13 am (UTC)no subject
Date: 2006-02-23 01:12 pm (UTC)no subject
Date: 2006-02-23 05:01 pm (UTC)The truth of the matter is most hackers don't own Macs (hence they can't write the code) and targeting Macs just isn't worth it to them. Keep in mind 90% of all hacking activity, viruses, etc., is about bragging rights. "Hey, I ruined some guy's Blueberry iMac" just isn't up there with "Hey, I shut down the entire banking system for my state" for a bored 15-year-old.
I'm sure eventually Mac viruses will become far more commonplace. They're as vulnerable as any other computer system; it's really just Unix with some proprietary code tacked onto it at this point. But I just don't see a flood being precipitated by some worm installed in iChat you have to go through several steps to trigger.