B
Bart Bailey
In Message-ID:<[email protected]> posted on Tue, 8 Jun
I believe there are discernable differences between packed executables
with a potential for trouble, and benign compressed archives, regardless
of what they contain.
Something to do with the [mx] header?
They should concentrate on compression algorithms as they relate
to runtime decompression executables so that such executables
can be scanned. A regular compressed or otherwise archived
program file does not present a threat until it is decompressed or
un-archived. Granted, there may be some need to prevent the
clueless from even getting the chance to execute the contained
malware, and automating the process would require some kind
of scanning within archives, but there is a way to attain this through
policy as well.
I believe there are discernable differences between packed executables
with a potential for trouble, and benign compressed archives, regardless
of what they contain.
Something to do with the [mx] header?