"G. Morgan" <G_Morgan@easy.com> wrote in message
news:ljhi67l3sq3kb2r7u9jinnbg3prd75okqh@Osama-is-dead.net...
> Dustin wrote:
>
>>G. Morgan <G_Morgan@easy.com> wrote in
>>news:ni3g671ke1higu7tbuo80pte43rjc9t4h5@Osama-is-dead.net:
>>
>>> Hmmm. Are you going to reveal everything you have learned about the
>>> code here? I'd be interested in your findings.
>>
>>Nope. If I decide to compile my notes into something techie readable,
>>it'll go on the site where everybody hangs out and disects these little
>>baddies. Oh wait... you don't know the site eh? LOL.
>
> No Dustin, I don't know where the blackhats hang out. You got me there!
> I also don't know where the NAMBLA meetings are, do tell.
I think you've got it kinda backwards. These things get dissected in
the manner BD had asked about. Remember when he asked how
anyone would know if a purportedly 'good' program had some other
hidden nefarious purpose? The answer was that there are people
that investigate such things and it is inevitable that such ulterior
purpose would be discovered.
Sometimes a blackhat mentality is needed to see how a program
such as LoJack for Laptops can be defeated or worse subverted
and to warn the public about the possibility before anyone actually
puts exploits ITW. You probably won't see many "programmers"
are able to do this, but many "coders" are for sure. Fighting fire
with fire so to speak.
He's talking about the "good guys", not the blackhats, in his above
reference.


Reply With Quote