mail2and said:
sree i fail to understand that u can't read the fine print.. virex is mainly used for protecting mac fromn spreading pc viruses than for mac viruses itself.
Also all the 4 viri mentioned there are for MAc OS Classic... and NOT for os x....
also they aren't even viruses.... they are sort of dependent on other software....
hmmmm...i see that u have not read anything about the virus that i quoted for mac OSX and u carefully stepped aside from it....
and now u r changing tact here...u have been blowing the trumpet around of OSX not having a single virus...and i pointed out a virus for the same OS, and the virus was released as near as october 2004. what did i want to do? show that i won here? no man...i just wanted to tell yes, viruses are possible on a mac (but u said in conf that it was not possible, if my memory serves me right)
i provided that macosx forum site here to so that u can understand that viruses r possible on osX, even its not "that" safe
mail2and said:
anna i think you have very little knowledge of the market share... apple commands a good 5% share in the market(equal to the share of firefox in the browser market).... then tell me why isn't there even ONE main line virus????
see this about the virus that i earlier mentioned:
Symantec said:
When the virus is executed, it does the following:
1. Deletes some UNIX commands and modifies preferences for other additional commands.
2. Launches a keystroke-mapping application (if installed) called Krec, to record the keyboard entry of passwords.
3. Modifies the hostconfig file, allowing Write access to all users and SSH access from the intruder's computer.
4. Gathers hash files (mathematical strings used to represent passwords and other sensitive data) to scan for passwords for every user, compares these hash files to a dictionary file to try to generate the appropriate passwords.
5. Turns on file sharing and remote login, then puts passwords and other sensitive data into an invisible folder named .info on each user's Public folder.
6. When active, the Activity Monitor shows a process called "john" eating almost an entire processor.
7. Requires one or more of the following to install this script and to copy itself to the startup items folder:
* Admin or physical access (boot from a CD or firewire/usb, ignore permissions on the internal drive).
* Write access to either /Library/StartupItems /System/Library/StartupItems.
* Write access to any existing StartupItem (which is replaced with this script).
* Write access to the rc, crontab, or periodic files.
8. Creates the startup item /System/Library/StartupItems named "opener."
9. Runs "john" (we assume as in "the Ripper").
10. Turns on some services and turns off others (including firewall services).
11. Runs as root, as no "sudo" commands are needed.
12. Copies itself to any mounted startup volume, before it kills utmp. When the virus connects, it is invisible to the user.
Note: The utmp file allows one to discover information about who is currently using the system. There may be more users currently using the system, because not all programs use utmp logging.
13. After disabling the Macintosh OS firewall, it changes the File Server preferences to make sure the Mac File Server does not log any Mac File Sharing.
14. Prevents Software update from auto-updating.
15. Looks for LittleSnitch software (a shareware Firewall program with application control) and tries to terminate the process, when LittleSnitch attempts to perform network access.
16. Searches throughout the computer for the following:
* Serial numbers of installed applications.
* Various preference files of installed applications.
* Various user-specific preferences, including Classic files.
17. Modifies the LimeWire settings, deletes log files, and creates an admin level user named:
"LDAP-daemon"
so the machine can then be accessed in the future by a hacker who knows about this script. This user name will appear in the NetInfo Manager.
18. Installs a daily script to look for more passwords on the system that runs at 3 A.M.
19. Installs and runs two programs named:
* "John the Ripper"
* "dsniff"
which will gather data and attempt to isolate passwords contained within them, as well as any other 10.2 and 10.3 hashes.
20. Gathers data and attempts to isolate passwords contained within them, as well as any other 10.2 and 10.3 hashes.
21. Reviews the logs for any passwords found.
There appears to be no attempt by the script to send the passwords to an email address or FTP site. However, the computer's state is compromised to the extent that anyone with knowledge of the script could login and access the log files containing serial numbers and passwords.
*securityresponse.symantec.com/avcenter/venc/data/hacktool.rootkit.html
a perfect little virus isnt it? and there was no fine print here...
Systems Affected: Macintosh OS X
mail2and said:
anna i think you have very little knowledge of the market share... apple commands a good 5% share in the market(equal to the share of firefox in the browser market).... then tell me why isn't there even ONE main line virus????
FYI, i perfectly knew that mac has a 5% penetration, but how big is that? alhough gamefreak has answered u on this, 5% share is too meagre....and yes, in that case, virus writers wont target it as they do for windows, but even then, it doesnt mean that there wont be viruses for it, does it?
and if u will remember, there was recently a competition announced to create a virus for a mac, and it was pulled off...well, it cud as well serve as a catalyst.
mail2and said:
neways am not gonna post here... because u speak on theories.. go try out a mac.. therez an apple store in bandra... and 5 dealers in andheri.... go try out a mac first.... and then talk.... get ur facts straight
hell man, for what should i try it? yes, i wud like to try it, but will my trying it mean that there wont be viruses for mac? will my trying it change the fact that the number of windows users wont increase? cmon yaar...
mail2and said:
u even said that tiger isn't 64 bit? how bad is that? the last time i heard.. panther was fully 64-bit complaint.... then how do they use g5's anna?
u even said linux duznt run on a MAC.... thats why i said...get ur facts right.... then talk....
yes, i do agree that i made a mistake on 64 bit proc in that conf, but i never said anything abt linux not running on mac....i did specifically mention that there if not mac, then some other linux for powerpc. i do know abt ubuntu and other linux that runs on mac FYI.
mail2and said:
"half knowledge is dangerous"
now thats a bit rich coming from u...u said there wasnt a single virus for osX, u still say so and i gave link to show a virus. so....
"look before u leap"