Z
Zvi Netiv
Laura Fredericks said:-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Perhaps YOU wrote it, Kurt?
After a transplant of a sense of humor.
Laura Fredericks said:-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Perhaps YOU wrote it, Kurt?
Zvi said:After a transplant of a sense of humor.
Laura said:-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Perhaps YOU wrote it, Kurt?
Robert said:It isn't all in lower case.
Nicky said:Cool! I'd forgotten about this! Some real blasts from the past there..I
still reckon it was 4q wot dun it.
Talking of him.. when's he gonna update
the site? Get off your arse and make me laugh Paulie
Nicky
It isn't all in lower case.
Stuart said:Let's say you came up with a product that didn't do pattern matching
and didn't need constant updates. How would you ensure a continuing
revenue stream?
Someone can certainly purchase product X with a 1-year subscription
to the pattern updates and continue using it beyond the year.
However, the product rapidly becomes useless.
You could simply change your business model so that you're only
selling a _license_ to use the product for one year. Then you either
expect people to stop using it if they don't pay for another year,
or you design the software to stop working.
It boils down to the same thing. There are ongoing costs to
producing an AV package and you have to stay one step ahead of the
virus writers. It's perhaps a bit different than producing something
like a word processor.
Now how do you ensure continuing revenue?
Stuart said:Laura Fredericks wrote: [snip]Perhaps YOU wrote it, Kurt?
It isn't all in lower case.
sara was the one with all lower case.
The funniest person I ever saw was back in the Fido days. Some guy
kept posting these diatribes about "clankworks engines" or something
like that.
I don't remember the details, but it consistently had me
rolling on the floor laughing. What was even funnier than what he
posted was that I kept getting the feeling that he was serious....
I've always been interested in the "generic" detection methods.
It
seems to me that there are a number of things that viruses do, and
if you can watch for those then you'll be able to detect "all"
viruses. Integrity checkers like Tripwire (or Wolfgang Stiller's
Integrity Master),
and some firewall and IDS systems also use some
of these same ideas.
I have a pet conspiracy theory. At one time there were quite a few
companies that were working on "generic" methods of detection. They
were mostly purchased by Symantec and disappeared. Pattern matching
scanners continue to be the commonly sold solution.
Let's say you came up with a product that didn't do pattern matching
and didn't need constant updates. How would you ensure a continuing
revenue stream?
Someone can certainly purchase product X with a 1-year subscription
to the pattern updates and continue using it beyond the year.
However, the product rapidly becomes useless.
You could simply change your business model so that you're only
selling a _license_ to use the product for one year. Then you either
expect people to stop using it if they don't pay for another year,
or you design the software to stop working.
It boils down to the same thing. There are ongoing costs to
producing an AV package and you have to stay one step ahead of the
virus writers. It's perhaps a bit different than producing something
like a word processor.
Now how do you ensure continuing revenue?
What I suspect is that companies decided that it is easier to sell
pattern updates than to sell a limited license to use software.
(It's the same thing really, just the perception differs.)
So, all the AV companies made sure that the playing field was level
and they all have the same business model - selling pattern updates.
And that's why you don't see "generic" AV products.
^^Zvi is a favorite target for abuse in some people's eyes.
He basically comes right out and says that all other AV products are
junk. That's sure to provoke a fight.
Ok, so I've basically said that the majority of the AV vendors are
crooks and scamming everyone. I've also said that Zvi is an arrogant
SOB. Can I be the official clown now?
Zvi has also helped a lot of people over the years. I'm sure his
product has helped people, but I'm thinking more of all the times
I've seen him respond to someone who had a virus infection or other
problem and give them advice on how to fix it.
I've always been interested in the "generic" detection methods. It
seems to me that there are a number of things that viruses do, and
if you can watch for those then you'll be able to detect "all"
viruses. Integrity checkers like Tripwire (or Wolfgang Stiller's
Integrity Master), and some firewall and IDS systems also use some
of these same ideas.
I have a pet conspiracy theory. At one time there were quite a few
companies that were working on "generic" methods of detection. They
were mostly purchased by Symantec and disappeared. Pattern matching
scanners continue to be the commonly sold solution.
What I suspect is that companies decided that it is easier to sell
pattern updates than to sell a limited license to use software.
(It's the same thing really, just the perception differs.)
So, all the AV companies made sure that the playing field was level
and they all have the same business model - selling pattern updates.
And that's why you don't see "generic" AV products.
I've always suspected that Zvi had something with his IV product.
Some of what he said makes sense.
And he fits in with my description of the different business models.
He sells only a license to use IV for a time period. It's logical;
you have to do _something_ to keep people paying you.
Zvi is a favorite target for abuse in some people's eyes.
He basically comes right out and says that all other AV products are
junk. That's sure to provoke a fight.
I've tried to question him a bit about details on his product, and
he basically replies that, if you don't already understand it,
you're too stupid to understand it. What can I say? I'm stupid.
Just to bring things back to reality, the mainstream AV packages
really have helped a lot of people. They do work. They also fit in
well with general security "best practices." That's worth something.
Zvi has also helped a lot of people over the years. I'm sure his
product has helped people, but I'm thinking more of all the times
I've seen him respond to someone who had a virus infection or other
problem and give them advice on how to fix it.
Stuart said:Laura Fredericks wrote: [snip]
Perhaps YOU wrote it, Kurt?
It isn't all in lower case.
sara was the one with all lower case.
yes, and if you ever read her explanation of that you'd know that there
are a lot more where she came from...
[snip]The funniest person I ever saw was back in the Fido days. Some guy
kept posting these diatribes about "clankworks engines" or something
like that.
his name is dale f. beaudoin... like sarah gordon and rod fewster and
countless others he has been immortalized in viral form
(http://tinyurl.com/4pwyk)...
not me... i've only been interested in them since zvi introduced me to
the concept...
indeed... i read an interesting article from bruce schneier's
cryptogram blog today about real security needing human intelligence in
the mix... applying this here, known virus scanning obviously tries to
take the human intelligence out of the user side environment (by
packaging as much knowledge about viruses as possible in an automated
form) but in so doing fail to catch many newly emerging threats...
generics have the potential to be much better at detecting the newly
emerging threats but that potential cannot be fully realized without an
intelligent operator applying and maintaining those generics...
the business types will tell you that if you want a successful company
you should probably go where the money is... and since the masses tend
to follow the path of least resistance (aka the path of least
interaction/thought/etc - they just want to get on with their *real*
work, after all) it's not hard to understand why the big names put so
much more focus on known virus scanning....
i think it's more likely that the companies decided that it was easier
to sell a product that (seemingly) required less thought on the part of
the user...
people want to 'install and forget'... never mind the fact that
companies who sell to that mindset are snake-oil salesmen...
there have been and continue to be a number of generic av products...
they just aren't as mainstream...
indeed... and he does it in multiple languages too... those acts make
me say (internally of course) hurray for zvi...
Zvi said:I didn't make such extreme claims, although many pretend that I did.
Who says I
did simply recycles others' opinions, without checking the source. My declared
position toward AV scanners always was, and still is, that they have their value
as offline tools and second line of defense.
As to provoking, I prefer seeing it as challenging for a debate. Unfortunately,
some primitive minds misinterpreted my challenging as a personal attack and
started a fight. ;-)
You got the wrong impression since I don't think of users that way.
I admit
that the understanding and use of my product requires more from the users than
the use of conventional AV. Yet if you check the NG archives you'll see that I
never evaded explaining the internals of my product, when asked.
Why is there need to choose between the two approaches and mutually exclude the
other one? Why not use both, each one to the best of it's capabilities? You
could use InVircible (my apologies for mentioning just IV, but there is no other
product for the moment that would fit that role) as your first line of defense,
and conventional AV to resolve localized problems, which mainstream AV do best.
The benefits of the above strategy are best performance on detection and
alerting, without depending on critical updates, and with the smallest impact on
computer resources and applications' performance. The above scheme also leaves
you total freedom to choose the best AV solutions for your particular problem,
without binding yourself to any specific AV product. Real life proves that no
particular AV product always was the best solution, to any particular malware,
if at all. Then why get stuck with anything less than the best?
Stuart said:Stuart said:Laura Fredericks wrote: [snip]
Perhaps YOU wrote it, Kurt?
It isn't all in lower case.
sara was the one with all lower case.
yes, and if you ever read her explanation of that you'd know that there
are a lot more where she came from...
I think I did, but it's been a long time.
Thanks for the reference.
not me... i've only been interested in them since zvi introduced me to
the concept...
I exaggerated. I've been interested in generic methods since my PC
DOS days (I'm a newbie, I became interested in computers with the
Apple ][). It just seems like "always."
Zvi certainly had an influence on me, but there were other people
and companies working on similar concepts. It was an approach that
"clicked" for me because it seemed the right way to do things.
Some are, and know it. It's likely that ome truly believe that they
can package all the intelligence needed and remove the need for the
consumer to think.
I just noticed yesterday that Panda is now pushing TruPrevent, and
that seems to be more generic than their other products.
Can you give me a list of other generic av products? I'd be
interested in taking a look at them.
I once said it in public and Rod accused me of being one of Zvi's
lackeys or alter egos, then threatened bodily damage.
Zvi Netiv said:Hello Stuart! Glad to see that you are well and kicking!
The only such case that I remember is the sell out of Fifth Generation, and
their "Untouchable" generic product, that Symantec killed and buried.
Untouchable (conceived and patented by four Israeli that formed BRM, and later
on funded what became "CheckPoint") was able to restore binary objects with
incredibly severe alterations, from a relatively small integrity database. If
Symantec hadn't killed that product, then its algorithm could be the perfect
solution for restoring from all PE infections, based on an integrity database of
reasonable size (there exists no such solution for PE objects, at this time!
InVircible will do that for 16 bit binaries, but not for 32 bit ones, only alert
on *viral* alteration, without restoring).
That's not true. I know of an old application, written several years
back which does restore infected PE executables; as well as os2 and
msdos executables. It was written by your old friend, Raid I do
believe. ToadAV As he called it.
Development never was finished, it
lacks a nice interface like your applications; but unlike your
"restoration" programs, it actually does work. It's database of
integrity allowed it to restore from most overwriting based viruses as
well; So long as you had the history of the file before damage
occured.
yeah, at the time i seem to recall wolfgang stiller and dmitri mostovoy
both had more conventional integrity checkers that demonstrated the
basic concept more plainly... not to mention tbav...
yeah, i gather he has a bit of a reputation for being a hardass... i
never really noticed it too much myself, though...
The only such case that I remember is the sell out of Fifth Generation, and
their "Untouchable" generic product, that Symantec killed and buried.
Untouchable (conceived and patented by four Israeli that formed BRM, and later
on funded what became "CheckPoint") was able to restore binary objects with
incredibly severe alterations, from a relatively small integrity database. If
Symantec hadn't killed that product, then its algorithm could be the perfect
solution for restoring from all PE infections, based on an integrity database of
reasonable size (there exists no such solution for PE objects, at this time!
InVircible will do that for 16 bit binaries, but not for 32 bit ones, only alert
on *viral* alteration, without restoring).
I didn't make such extreme claims, although many pretend that I did. Who says I
did simply recycles others' opinions, without checking the source. My declared
position toward AV scanners always was, and still is, that they have their value
as offline tools and second line of defense. Especially of value are self
contained cleaning tools, such as Stinger and Trend Micro's Sysclean.
As to provoking, I prefer seeing it as challenging for a debate. Unfortunately,
some primitive minds misinterpreted my challenging as a personal attack and
started a fight. ;-) For such an example see the thread that follows article
<[email protected]> (post #3 in the thread with "File
change detection utility for Win 9X/ME" as its subject)
You got the wrong impression since I don't think of users that way. I admit
that the understanding and use of my product requires more from the users than
the use of conventional AV. Yet if you check the NG archives you'll see that I
never evaded explaining the internals of my product, when asked. In my posts, I
took care of simplifying and abstracting my explanations to the level that even
laymen could understand what I am talking about. Why would I do that effort if
I thought that low of users? You are also invited to browse the knowledge base
on www.invircible.com. I assure you that you will learn a lot about the product
internals an working, as well as on general techniques and methods in dealing
with malware. If really interested in my product's internals and working, then
it could be worth reading the white paper at
http://invircible.com/papers/IV4Enterprise.pdf
Why is there need to choose between the two approaches and mutually exclude the
other one? Why not use both, each one to the best of it's capabilities? You
could use InVircible (my apologies for mentioning just IV, but there is no other
product for the moment that would fit that role) as your first line of defense,
and conventional AV to resolve localized problems, which mainstream AV do best.
Zvi Netiv said:Rubbish. ToadAV was a pathetic attempt of your friend, Raid (a virus writer) > to demonstrate that he could write something similar to the IV integrity
restorer.
ToadAV only dealt with 16 bit executables and it failed miserably when tested.
Can you provide reference to substantiate your claim? I doubt it.
Zvi Netiv said:
Sammi More said:Zvi Netiv <support@replace_with_domain.com> wrote in message http://groups.google.com/groups?&[email protected]
and
After much researching; Robert Greene later admitted he didn't use the
program as it was intended, and as was mentioned in the documentation;
The results he got were expected. I do indeed blame Raid for the poor
GUI design. The GUI doesn't help, and can lead to data loss; But if
you use it correctly, your files are not harmed. As for ToadAV being
restricted to 16bit files, it isn't. ToadAV isn't aware of the file
your working with, it only sees raw data. As was mentioned in a
previous post sir, I will provide full source code for peer review.
I'm not a programmer, but even I can follow what's going on inside the
program. I have it's source code here someplace on a floppy disk. We
can also do a simple test if you'd like. Perhaps even invite some
patrons here.