G
Guest
Guest
Archived from groups: comp.security.firewalls (More info?)
Hello. I would be grateful for comment on or response to the
inquiries following the general comments below. Thanks.
Assume the following setup.
1. Computer "A" has no physical connection to the internet; and
also has no hardware capable of effective internet connectivity,
i.e., for example, an ethernet card.
2. Computer "B" is connected to the internet.
3. Data and files exchanged between Computer "A" and Computer
"B" occurs only via CD-Rom R/W Disk hand carried between
computers.
Inquiries?
1. Can a trojan horse or other malicious electronic intruder
first, infect Computer "B;" second, "hide" undetected on the CD-
Rom R/W Disk (say within an authorized file copied from
Computuer "B"); third, infect Computer "A;" and fourth, copy
files from Computer "A" to the CD-Rom R/W Disk?
2. If so, could such unauthorized copying of files onto the CD-
Rom R/W Disk from Computer "A" remain undetected, even with an
inspection of the CD-Rom R/W Disk via the "Run" Command of the
Windows operating system?
3. Moreover, if the answer to Inquiry No. 1 is affirmative,
could the trojan horse also first, hide undetected within an
authorized file copied to the CD-Rom R/W Disk (from Computer
"A"); and second, instruct dispatch of the authorized file to
unauthorized locations via Computer "B."
Hello. I would be grateful for comment on or response to the
inquiries following the general comments below. Thanks.
Assume the following setup.
1. Computer "A" has no physical connection to the internet; and
also has no hardware capable of effective internet connectivity,
i.e., for example, an ethernet card.
2. Computer "B" is connected to the internet.
3. Data and files exchanged between Computer "A" and Computer
"B" occurs only via CD-Rom R/W Disk hand carried between
computers.
Inquiries?
1. Can a trojan horse or other malicious electronic intruder
first, infect Computer "B;" second, "hide" undetected on the CD-
Rom R/W Disk (say within an authorized file copied from
Computuer "B"); third, infect Computer "A;" and fourth, copy
files from Computer "A" to the CD-Rom R/W Disk?
2. If so, could such unauthorized copying of files onto the CD-
Rom R/W Disk from Computer "A" remain undetected, even with an
inspection of the CD-Rom R/W Disk via the "Run" Command of the
Windows operating system?
3. Moreover, if the answer to Inquiry No. 1 is affirmative,
could the trojan horse also first, hide undetected within an
authorized file copied to the CD-Rom R/W Disk (from Computer
"A"); and second, instruct dispatch of the authorized file to
unauthorized locations via Computer "B."