TEAM-ADA Archives

Team Ada: Ada Programming Language Advocacy

TEAM-ADA@LISTSERV.ACM.ORG

Options: Use Forum View

Use Proportional Font
Show HTML Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Mime-Version:
1.0
Sender:
"Team Ada: Ada Advocacy Issues (83 & 95)" <[log in to unmask]>
X-To:
"Beard, Frank" <[log in to unmask]>
Date:
Tue, 18 Jul 2000 20:27:51 -0500
Reply-To:
jim hopper <[log in to unmask]>
Subject:
From:
jim hopper <[log in to unmask]>
In-Reply-To:
Content-Type:
text/plain; charset="us-ascii" ; format="flowed"
Parts/Attachments:
text/plain (29 lines)
At 9:09 PM -0400 7/18/00, Beard, Frank wrote:
>Rush wrote:
>
>>  God help the Navy when it's enemies discover that they can attach
>>  a VBA or Active-X agent to a datastream and infect the entire system
>>  with some sort of virus.
>
>Rush,
>
>While I agree with the sentiment, it won't be quite that easy.  Unless
>the Navy diverts from using either KG krypto or NES encryption, the
>enemy will have to penetrate one of the two before they can attach
>the virus.  While I'm not a huge Microsoft fan, they do have some
>useful tools, virus prone as they may be.  Since both encryption
>methods are "heavy duty" and rotate keys frequently, you can
>basically use just about anything behind them.  Of course it
>never hurts to have something less vulnerable.


what about if someone sends email from navy shore faciltiy that is
infected?  Our army customers mail system was shut down for about a
week over the iloveyou virus!

Jim
--
If you wish to strive for peace of soul then believe;
if you wish to be a devotee of truth, then inquire.
    -- Friedrich Nietzsche

ATOM RSS1 RSS2