(e-mail address removed) wrote: [snip]
If the black hats go to that much trouble to obfuscate dates, the
white hats can counter by analyzing erased files. Then the black hats
will be forced to do a defrag as well
yes, *OR* the white hats could say "y'know, it seems to me this is just
a kind of change detection, and we already *have* good methods for
change detection" and not do anything to fix this problem because this
was the wrong way to do change detection in the first place...
You seem to have missed my smiley. I wasn't being serious about that
insane scenario at all
i generally don't acknowledge smilies (as iolo said years ago, you
don't need them to tell when something is funny, and if it's not funny
then they don't help),
Unfortunately on usenet, humor, especially a subtle and weird sense of
humor like I have, doesn't get communicated. I suggest that you
lighten up, Kurt. You must have a sense of humor, no?
and my response is applicable even if you had
stopped at "If the black hats go to that much trouble to obfuscate
dates"... your technique is vulnerable to date manipulation exploits...
if they're ever used the white hats will very likely recognize that
checking dates is just a change detection technique, and there really
are more reliable methods for doing change detection...
No need to beat a dead horse. Let me explain how my idea came about.
As I've posted several times in the past, I don't have any malware or
spyware problems. For years now, I've been watching my hard drives
wear out while doing full on-demand scans before backing up to my
cloned backup drives. I've had the "is this trip necessary?" feeling
for a long time, and I've often tried to think of alternatives.
I once mentioned an earlier idea, which was to activate KAV's realtime
scanner while the process of copying new or changed files ( XXCOPY
only copies files that don't exist on the destination or which have
changed in file size or date ) is going on. My test using eicar.com
was successful .... KAV immediately blocked copying and asked me what
I wanted to do .... which is exactly what I wanted _it_ to do.
After designing F-RECENT (for reasons mostly unrelated to malware),
it was natural that I'd consider adding the shortcut mentioned in my
OP on the topic. The batch engages two top notch scanners so I
get at least one more good "second opinion" on files with recent
modification dates. Imperfect, yes, but in my case I'm actually
_adding_ to the scanning that I'd otherwise do.
I still scan with Spybot and AdAware in addition to using several
generic Trojan "sniffer" methods during my weekly maintenance
routine. But the days of wearing out my drives doing full av scans
weekly are long gone. I sometimes at random intervals use KAV on
demand to do a scan of only Windows subdirectories .... just out of
curiosity.
Safe hex and my approach of hardening the OS so I don't require
realtime av or frewall/router has proven to work "perfectly" over the
years. I'd like to do away completely with scanners, but as soon as I
do, some vulnerability in the browsers I use will be exploited. I
don't see any way around the use of scanners before backing up.
And my wife is now using IE on her PC more and more frequently.
I jusr yesterday put KAV realtime on her Startup list and showed her
how to udate it. It's kinda fun keeping an eye on her situation and
maintaining both of our machines.
Art
http://home.epix.net/~artnpeg