A
Anonymous Bob
I hereby make a New Years resolution to properly and appropriately thank
those who don't get the appreciation they deserve. Therefore I want to share
a link that I found at dslreports, that referenced a link to Mike Burgess'
blog, that referenced another blog, that referenced a study available on the
honeynet site. I think I got all the thanks and references in there, so here
it is:
http://www.dslreports.com/forum/r19716039-
And here's the killer paragraph:
"When applied on their dataset the very famous hosts file maintained by
winhelp2002 blocked all infections, although it contained only a minority
(12%) of the domains. This means that the majority of bad code out there are
redirectors and that these lists managed to include (at least until now) the
true sources of the infections. This is a very interesting and it shows that
while the number of different points of contact with malicious intent on the
Internet increases very rapidly, their variation doesn't quite as rapidly
and blacklisting technologies are still effective (and by the same logic, AV
systems can still be effective)."
Thank you Randy.
Bob Vanderveen
those who don't get the appreciation they deserve. Therefore I want to share
a link that I found at dslreports, that referenced a link to Mike Burgess'
blog, that referenced another blog, that referenced a study available on the
honeynet site. I think I got all the thanks and references in there, so here
it is:
http://www.dslreports.com/forum/r19716039-
And here's the killer paragraph:
"When applied on their dataset the very famous hosts file maintained by
winhelp2002 blocked all infections, although it contained only a minority
(12%) of the domains. This means that the majority of bad code out there are
redirectors and that these lists managed to include (at least until now) the
true sources of the infections. This is a very interesting and it shows that
while the number of different points of contact with malicious intent on the
Internet increases very rapidly, their variation doesn't quite as rapidly
and blacklisting technologies are still effective (and by the same logic, AV
systems can still be effective)."
Thank you Randy.
Bob Vanderveen