Focus on Virus Mode:
(Page 10 of 62)  < Prev  5 6 7 8 9 10 11 12 13 14 15  Next >
RE: Symantec AV reporting metrics. 2006-06-05
Serge Vondandamo (serge vondandamo wanadoo fr)
Sekure and all,

Thanks but we don't have version 10.1 and unfortunately, I have to find a
way to report with the versions we have. I may suggest to upgrade but that
will not be possible now - IT Ops folks and other IS Managers will be
difficult to convince - given the heavy IT Governance and change

[ more ]  [ reply ]
re: Symantec AV reporting metrics. 2006-06-05
paul murgatroyd org uk (1 replies)
resending to due to evil HTML email...

------------------------------

what version of SAV are you running?

Depending on version I can give you ideas on several different reporting solutions.

I'm not trying to sell our products or services... just want to let you know whats available if y

[ more ]  [ reply ]
RE: Symantec AV reporting metrics. 2006-06-05
Shabbar Arsiwala (sarsiwala obleness org)
New SecurityFocus mailing list: Focus-Apple 2006-05-31
Marc Fossi (mfossi securityfocus com) (1 replies)
Objective

The Focus-Apple mailing list discusses security involving hardware and software
produced by Apple or that runs on Apple platforms. Discussion may include
security assessment, planning, and implementation for Apple technologies. This
list is meant as an aid to network and systems admin

[ more ]  [ reply ]
Re: New SecurityFocus mailing list: Focus-Apple 2006-05-31
Marc Fossi (mfossi securityfocus com)
deadline extended for CFP of the IEEE S&P special issue on malware 2006-05-29
Ivan Arce (ivan arce coresecurity com)
Hello,

The deadline for submission of articles for the IEEE S&P magazine's special
issue on malware has been extended to July 15th.

Also, IEEE S&P started running a series of 20-minute podcasts (The Silver
Bullet Security Podcast) hosted by Gary McGraw, CTO at Cigital and author of
several well-kn

[ more ]  [ reply ]
Re: Fwd: Social viruses ? (Hi5, Ringo, etc.) 2006-05-27
robertturner cogeco ca
Ringo absolutely sends invitations to your entire address book without your knowledge or consent. Got an "invitation" from my sister (it was actually an invite to "view her latest photo's online", she didn't send the invite and had just gotten the same email from one of her friends. I didn't sign

[ more ]  [ reply ]
Re: blocking BHX files with MIME 2006-05-17
lsi (stuart cyberdelix net) (1 replies)
Peter,

Good call. A quick search suggests that BinHex is a form of
UUencoding, ie. uuencode for Mac... so I agree the sig might miss
some attachments.

I don't have any other samples, tho, and since my policy is to only
filter on strings in use by malware, not the full set of theoretical
strin

[ more ]  [ reply ]
Symantec AV reporting metrics. 2006-06-03
Serge Vondandamo (serge vondandamo wanadoo fr) (1 replies)
RE: Symantec AV reporting metrics. 2006-06-04
Benny Czarny (benny opswat com)
Indemnifying virus handlers - 'Hold harmless' statements of work? 2006-05-16
Bill Stout (bill stout greenborder com)
How are virus handlers indemnified from the work they perform in either
test labs, or when removing viruses in the field?

Is it common practice for employees, consultants or companies to have
statements of work with 'hold harmless from and against' clauses, and
other statements which indemnify the

[ more ]  [ reply ]
blocking BHX files with MIME 2006-05-16
lsi (stuart cyberdelix net) (2 replies)
..is done by filtering for the following string:

YmVnaW4gNj

This string appears as the first ten bytes of the first line of a BHX
file encoded in MIME (eg. as it appears in an email). So all BHX
files can be filtered by searching for that string.

I forward this info as I've seen some BHX files

[ more ]  [ reply ]
Re: blocking BHX files with MIME 2006-05-17
Nick FitzGerald (nick virus-l demon co uk)
Re: blocking BHX files with MIME 2006-05-17
Peter Kosinar (goober ksp sk)
RE: Extracting signature snippets from AV databases 2006-05-11
Bill Stout (bill stout greenborder com)

That's now my plan.

Based on the feedback I've received here, I'll contact the test labs,
and for show and tell purposes, consider a mobile malware lab. However
I'll use two computers back-to-back, since I'm testing browser
protection. I have to determine what malware I can't carry around in
c

[ more ]  [ reply ]
RE: Extracting signature snippets from AV databases 2006-05-11
Christian Stankevitz (christian neohapsis com)
Bill,

Have you considered third party testing? ForeScout had the same problem
with customers so they engaged ITSLabs.com to perform an independent
validation test. ITSLabs used both real worms and a custom developed
unknown "zero day" worm to demonstrate ForeScout's ability to contain
the multipl

[ more ]  [ reply ]
RE: RE: McAfee 8.0 crashing Dell D620's 2006-05-11
Evan Mann (emann pinnaclefinancial com) (1 replies)
Patch 11 didn't fix it on a single machine I tried it on. I was
installing McAfee with patch 11 integrated in fact, crashed instantly.

It's going to be a blame game. McAfee has apparently ran into this
problem before with the Embassy Trust Suite and another product. I
suspect patch 12 or 13 will

[ more ]  [ reply ]
RE: RE: McAfee 8.0 crashing Dell D620's 2006-05-12
pauls utdallas edu
Re: RE: McAfee 8.0 crashing Dell D620's 2006-05-11
Malick sherkhan tns-global com
Hi,

Mcafee claims it is a Dell issue eventhough they have a workaround solution.

Here you go.

After install the Mcafee, (system will crash)

1. restart the system in safe mode

2. Run Msconfig

3. stop the services

a) Mcafee frame work

b) Network Associates Mcshield

c) Netw

[ more ]  [ reply ]
RE: Extracting signature snippets from AV databases 2006-05-10
Clemens, Dan (Dan Clemens healthsouth com)


>What I'm trying to figure out is how to 'smoke test' new builds, and to

ethically and fully demonstrate >(to the CEO, to outsiders) that the

protection works. We're in alpha test, and beta is approaching fast.

What ethical dilemmas would come up from making sure your av is working

[ more ]  [ reply ]
RE: Extracting signature snippets from AV databases 2006-05-10
Bill Stout (bill stout greenborder com)
The ethical dilemma would be proving it works outside of the lab; to
people and on computers outside the company. Real proof requires
malware.

Bill Stout

-----Original Message-----
From: Clemens, Dan [mailto:Dan.Clemens (at) healthsouth (dot) com [email concealed]]
Sent: Wednesday, May 10, 2006 11:38 AM
To: Bill Stout; ni

[ more ]  [ reply ]
Re: Extracting signature snippets from AV databases 2006-05-10
Kenneth Bechtel (kbechtel teamanti-virus org)
On Wednesday 10 May 2006 02:58 pm, you wrote:
> The ethical dilemma would be proving it works outside of the lab; to
> people and on computers outside the company. Real proof requires
> malware.

WRONG!!!! Real proof, can also be INDEPENDENT, PEER REVIEWED SCIENTIFIC
TESTS, referenced in your do

[ more ]  [ reply ]
RE: Extracting signature snippets from AV databases 2006-05-10
Bill Stout (bill stout greenborder com) (2 replies)

I hear you, thanks.

For internal testing we run publicly sourced live viruses and other
malware in an isolated locked room, where the only media that comes out
is shredded.

What I'm trying to figure out is how to 'smoke test' new builds, and to
ethically and fully demonstrate (to the CEO, to outs

[ more ]  [ reply ]
RE: Extracting signature snippets from AV databases 2006-05-11
Nick FitzGerald (nick virus-l demon co uk)
Re: Extracting signature snippets from AV databases 2006-05-10
Kenneth Bechtel (kbechtel teamanti-virus org)
(Page 10 of 62)  < Prev  5 6 7 8 9 10 11 12 13 14 15  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus