Guy said:
Do you not consider memory to be "on your machine"?
I do not consider any volatile state to be "on my machine". If a virus
makes any change at all to the contents of my hard drive, whether it be a
service, the master boot record, or some other file - then it is on my
machine.
Written to disk is not analogous to execution.
Unless the OS times it just right to save a copy of the virus in the
pagefile, there has to be some method of execution directly or indirectly by
the virus. A virus cannot successfully survive long term if it cannot make
it to hard disk (or some other non-volatile media).
Sophos was runing on the client machine or on the File or AV server?
Or what was the senario?
I imagine:
Client makes a "give me access to a file" request of the Fileserver.
Fileserver scans file or gives the file path and request to AVserver.
The result determines whether the client will receives access to
the file or a report.
Sophos was running on the client machine that was running a 3rd party
utility used to gather information from other clients using full
administrative access without accessing any shares or having any additional
software on the target clients.
Packets must be assembled. Do any AV product use atomic signatures?
One can not "scan the ether",that is the domain of NIDS.
Perhaps I'm wrong?
http://www.pandasecurity.com/new/test/win2000review.html
Panda Antivirus works alongside Win2K's TCP/IP stack
Only one I could find. Perhaps I'm describing this improperly - I suppose
if you have a really good realtime memory scanner then any recognizable
signature coming out of the tcp/ip stack will be... recognized...