Schneier on Security
A blog covering security and security technology.
« Public Reactions to Terrorist Threats |
| A Useful Side-Effect of Misplaced Fear »
November 16, 2009
Anti-Malware Detection and the Original Trojan Horse
Posted on November 16, 2009 at 1:09 PM
• 6 Comments
To receive these entries once a month by e-mail, sign up for the Crypto-Gram Newsletter.
I don't know why, but the odd phrasing of "The horsey is infected" cracks me up.
Gawd! Thank you. "Remove threat as Cassandra." If she'd had admin privileges...
I sent just the image link to two co-workers, and they both said "you expect me to click on a link named 'trojanhorse'????"
1. Shouldn't the process ID be -1184?
2. If you select Remove as Cassandra, I think that only the Ignore button is enabled.
3. The user interface for Windows 98BC was definitely ahead of its time.
4. If that version of Windows was still being used 14 years after its first release, it's hardly surprising that Troy experienced security problems.
Alan, it was one of the dire consequences of the Y-2K bug. They didn't listen to Cassandra about that one, either.
If they had applied Windows Security version 1500.B.C.
to the Trojan Horse,
would the world have lost a most useful metaphor?
Schneier.com is a personal website. Opinions expressed are not necessarily those of Co3 Systems, Inc.