M
Mark Hill wrote:
<clip>
>During the past two weeks I've received dozens of forwarded messages
>from [email protected]
>
>Each of these messages originated from the Automation List archives and
>contains a virus.
>
>My software is able to spot and immediately delete these intrusions, but
>I'm wondering if the List couldn't do something about tracking down this
>source and putting an end to it.
<clip>
I have also received dozens of messages from this fellow. These are sent directly from the originator - they do not pass through the mail list. The forwarded mail you are getting is coming from his own mailboxes (i.e. past list postings he received). The only person who can stop the messages from being sent is the one who owns the computer in question. I suppose that
being subject to problems like this is one of the "benefits" of modern communications.
This raises a rather interesting question though. Some people are building control systems using Windows and various bits of common Windows
software (e.g. the Outlook mail system, Excell) duct taped together. Some of these machines are now able to send (and receive) e-mail. Once these systems are connected to the internet (or even just to a large intranet), and they become widely known, how long will it be before people start writing viruses which are intended to attack control systems? We may also find that a
conventional office oriented virus does a nice job on machines as well.
I don't think the firewall/virus scanner approach is really all that secure. This doesn't really seem to provide defence in depth. The control systems themselves need to be at least somewhat immune to attack. Windows and typical office type software seem to be ridiculously easy to crack. Is there some fairly reliable means of addressing this problem?
**********************
Michael Griffin
London, Ont. Canada
[email protected]
**********************
<clip>
>During the past two weeks I've received dozens of forwarded messages
>from [email protected]
>
>Each of these messages originated from the Automation List archives and
>contains a virus.
>
>My software is able to spot and immediately delete these intrusions, but
>I'm wondering if the List couldn't do something about tracking down this
>source and putting an end to it.
<clip>
I have also received dozens of messages from this fellow. These are sent directly from the originator - they do not pass through the mail list. The forwarded mail you are getting is coming from his own mailboxes (i.e. past list postings he received). The only person who can stop the messages from being sent is the one who owns the computer in question. I suppose that
being subject to problems like this is one of the "benefits" of modern communications.
This raises a rather interesting question though. Some people are building control systems using Windows and various bits of common Windows
software (e.g. the Outlook mail system, Excell) duct taped together. Some of these machines are now able to send (and receive) e-mail. Once these systems are connected to the internet (or even just to a large intranet), and they become widely known, how long will it be before people start writing viruses which are intended to attack control systems? We may also find that a
conventional office oriented virus does a nice job on machines as well.
I don't think the firewall/virus scanner approach is really all that secure. This doesn't really seem to provide defence in depth. The control systems themselves need to be at least somewhat immune to attack. Windows and typical office type software seem to be ridiculously easy to crack. Is there some fairly reliable means of addressing this problem?
**********************
Michael Griffin
London, Ont. Canada
[email protected]
**********************