[fyodor at insecure.org: C|Net Download.Com is now bundling Nmap with malware!]
tshaw at oitc.com
Tue Dec 6 17:55:06 CST 2011
I can't believe this...
Andrew, please check the dictionary second definition of Trojan before proceeding.
A "remote access tool" is ssh, VNC and others and these are definitely not trojans. Get a grip.
noun noun Greek Mythology
a hollow wooden statue of a horse in which the Greeks concealed themselves in order to enter Troy.
• (also Trojan horse) figurative a person or thing intended secretly to undermine or bring about the downfall of an enemy or opponent : the rebels may use this peace accord as a Trojan horse to try and take over.
• (also Trojan horse) Computing a program designed to breach the security of a computer system while ostensibly performing some innocuous function.
On Dec 6, 2011, at 6:49 PM, andrew.wallace wrote:
> A trojan can be used for good if in the right hands as a remote access tool for business use.
> From: Bryan Fields <Bryan at bryanfields.net>
> To: "nanog at nanog.org" <nanog at nanog.org>
> Sent: Tuesday, December 6, 2011 11:24 PM
> Subject: Re: [fyodor at insecure.org: C|Net Download.Com is now bundling Nmap with malware!]
> On 12/6/2011 13:30, andrew.wallace wrote:
>> It could be argued that Nmap is malware, and such software has already been called to be made illegal.
>> If I was Cnet, I would stop distributing his software altogether.
>> Link: http://nmap.org/book/legal-issues.html
> If this is not trolling and you actually believe this, just wow.....
> Nmap is just a tool, and any tool can be misused by people for criminal acts.
> It's really no different than a gun in that regard. Both are incredibly
> useful things in the right hands, mere tools to further security. However in
> the wrong hands they can be used to commit crimes and break other peoples
> Bryan Fields
> 727-409-1194 - Voice
> 727-214-2508 - Fax
More information about the NANOG