![]() |
![]() |
![]() |
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() ![]()
November 01, 2005
Truth Is Stranger Than (Science) Fiction
![]() ![]() FaceTime Communications says it has some good news for you. The company feels so confident about some new patent pending technology that it is offering a "worm-free guarantee" to users of its IMAuditor 6.5. FaceTime's confidence stems from new discovery techniques that utilize behavioral attributes such as message frequency, content matching and URL identification, in addition to traditional threat signatures. The thought being that once the threat signatures become available, it's often too late and you're in extermination mode rather than protection mode. Gee, I hope it works. It's an interesting idea, to look at all the attributes that make up a threat profile in addition to the actual code. But I wonder how long it will be before the schmucks out there learn to develop patternless worms. Oh that's right, for the most part they already have. That's the Catch-22 of this fight against malware—there is never any pattern and there is always a pattern, once one is discovered, that is. I couldn't help but think of Frank Herbert's Dune series of sci-fi novels in which the planet's native people, the Fremen (pronounced Free-men) learned to traverse the vast expanses of sand walking without any set rhythms and patterns so the giant worms couldn't detect their movements and devour them. Oh, come on, I know you read Dune. What a reversal we have here. It's the worms that will evolve patternless behavior and us Free-men will never be free until we can detect the patterns. Posted by Mitch Irsfeld at 05:38 PM | Permalink ![]()
Comment on this blog entry
![]() |
![]() |
![]() |
![]()
![]()
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
MESSAGING PIPELINE MARKETPLACE (sponsored links)
|
![]() |
![]() |
![]() |
Digital Warehouse buys, sells, & rents used Cisco networking hardware such as routers & switches, as well as Juniper, Extreme & Foundry at 50-80% off list price. One year warrantee and fast delivery. ![]() Stop spam on your terms with CanIt-PRO, the most flexible and customizable anti-spam solution available for the mail server. Offers per-user or per-group controls and is available as software or hardware appliance. ![]() Use your Intranet to manage Software Licenses, plan for Windows XP/2000 upgrades, do Security Audits and more. Click to try and ask for our white paper - PC Management for the Internet Age. ![]() Analysts at the Tolly Group put a leading Branch Office IT services solution to the test, measuring performance, security and data reliability. Download the results, detailed in this free report, now. ![]() Whether you need temporary or permanent access to remote PCs, LogMeIn has your solution: LogMeIn IT Reach for automatic maintenance of remote and mobile systems, and LogMeIn Rescue for instant, web-based remote access without pre-installing software. ![]() |
![]() |
![]() |
Sponsored Links:
|
![]() |
![]() |
© 2006 | MESSAGING PIPELINE All rights reserved. | |
|
![]() |